instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
boolean isValidSingletonCall(int callingUid, int componentUid) { int componentAppId = UserHandle.getAppId(componentUid); return UserHandle.isSameApp(callingUid, componentUid) || componentAppId == SYSTEM_UID || componentAppId == PHONE_UID || ActivityManager.checkUidPermission(INTERACT_ACROSS_USERS_FULL, componentUid) == PackageManager.PERMISSION_GRANTED; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidSingletonCall File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
isValidSingletonCall
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void navNodeInactive(StringBuffer sb, NavNode node, NavTreeIndex treeIndex, Map parameters, int depth) { if (!canRender(node, depth)) { return; } renderNode(sb, node, treeIndex, parameters, ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: navNodeInactive File: java/code/src/com/redhat/rhn/frontend/nav/DialognavRenderer.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
navNodeInactive
java/code/src/com/redhat/rhn/frontend/nav/DialognavRenderer.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
@Override public void onApplicationActive(String packageName, int userId) { if (DEBUG) { Slog.d(TAG, "onApplicationActive: package=" + packageName + " userid=" + userId); } enforceResetThrottlingPermission(); synchronized (mLock) { if (!isUserUnlockedL(userId)) { // This is called by system UI, so no need to throw. Just ignore. return; } getPackageShortcutsLocked(packageName, userId) .resetRateLimitingForCommandLineNoSaving(); saveUserLocked(userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onApplicationActive File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
onApplicationActive
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0
Analyze the following code function for security vulnerabilities
@Override public void removeOnPermissionsChangeListener(IOnPermissionsChangeListener listener) { mPermissionManagerServiceImpl.removeOnPermissionsChangeListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeOnPermissionsChangeListener File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
removeOnPermissionsChangeListener
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public static List<Definition> exportRoutes(final Jooby app) { @SuppressWarnings("serial") class Success extends RuntimeException { List<Definition> routes; Success(final List<Route.Definition> routes) { this.routes = routes; } } List<Definition> routes = Collections.emptyList(); try { app.start(new String[0], r -> { throw new Success(r); }); } catch (Success success) { routes = success.routes; } catch (Throwable x) { logger(app).debug("Failed bootstrap: {}", app, x); } return routes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exportRoutes File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
exportRoutes
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
protected void fillProperties(final Node node, Properties properties) { if (properties == null) { return; } for (Node n : childElements(node)) { final String name = cleanNodeName(n); final String propertyName = "property".equals(name) ? getTextContent(n.getAttributes().getNamedItem("name")).trim() // old way - probably should be deprecated : name; final String value = getTextContent(n).trim(); properties.setProperty(propertyName, value); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillProperties File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
fillProperties
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void setOCFormDataDNsTypesExpected() { this.unsetTypeExpected(); int i = 1; this.setTypeExpected(i, TypeNames.INT); // event_crf_id ++i; this.setTypeExpected(i, TypeNames.INT); // parent_dn_id ++i; this.setTypeExpected(i, TypeNames.INT); // dn_id ++i; this.setTypeExpected(i, TypeNames.STRING); // description ++i; this.setTypeExpected(i, TypeNames.STRING); // detailed_notes ++i; this.setTypeExpected(i, TypeNames.INT); // owner_id ++i; this.setTypeExpected(i, TypeNames.DATE); // date_created ++i; this.setTypeExpected(i, TypeNames.STRING); // status ++i; this.setTypeExpected(i, TypeNames.STRING); // discrepancy_note_type.name }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOCFormDataDNsTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setOCFormDataDNsTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private boolean isCrossUser(int callingUid, int userId) { return (userId != UserHandle.getCallingUserId() && callingUid != Process.SYSTEM_UID && mContext.checkCallingOrSelfPermission( android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) != PackageManager.PERMISSION_GRANTED); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCrossUser File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
isCrossUser
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Override public boolean getIgnoringElementContentWhitespace() { return ignoringWhite; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIgnoringElementContentWhitespace File: core/src/java/org/jdom2/input/SAXBuilder.java Repository: hunterhacker/jdom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33813
MEDIUM
5
hunterhacker/jdom
getIgnoringElementContentWhitespace
core/src/java/org/jdom2/input/SAXBuilder.java
bd3ab78370098491911d7fe9d7a43b97144a234e
0
Analyze the following code function for security vulnerabilities
@Override public void restoreDelayedRuntimePermissions(@NonNull String packageName, @UserIdInt int userId) { mPermissionManagerServiceImpl.restoreDelayedRuntimePermissions(packageName, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: restoreDelayedRuntimePermissions File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
restoreDelayedRuntimePermissions
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
private boolean isConnectionValid(@Nullable String ssid) { if (TextUtils.isEmpty(ssid) || null == mCurrentTofuConfig) { handleError(null); return false; } if (!TextUtils.equals(ssid, mCurrentTofuConfig.SSID)) { Log.w(TAG, "Target SSID " + mCurrentTofuConfig.SSID + " is different from TOFU returned SSID" + ssid); return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConnectionValid File: service/java/com/android/server/wifi/InsecureEapNetworkHandler.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
isConnectionValid
service/java/com/android/server/wifi/InsecureEapNetworkHandler.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private AsyncContext getAsyncContext() { if (this.asyncContext == null) { this.asyncContext = Utils.getComponent(AsyncContext.class); } return this.asyncContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAsyncContext File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getAsyncContext
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public SysUser getUserByName(@Param("username") String username);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByName File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByName
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public int compare(ResolveInfo r1, ResolveInfo r2) { int v1 = r1.priority; int v2 = r2.priority; //System.out.println("Comparing: q1=" + q1 + " q2=" + q2); if (v1 != v2) { return (v1 > v2) ? -1 : 1; } v1 = r1.preferredOrder; v2 = r2.preferredOrder; if (v1 != v2) { return (v1 > v2) ? -1 : 1; } if (r1.isDefault != r2.isDefault) { return r1.isDefault ? -1 : 1; } v1 = r1.match; v2 = r2.match; //System.out.println("Comparing: m1=" + m1 + " m2=" + m2); if (v1 != v2) { return (v1 > v2) ? -1 : 1; } if (r1.system != r2.system) { return r1.system ? -1 : 1; } return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compare File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
compare
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private boolean shouldBeReadByCurrentNode(URI uri) { boolean sharedStorage = Objects.requireNonNullElse(shared, currentInput.sharedStorageDefault()); if (sharedStorage) { return moduloPredicateImpl(uri, this.readerNumber, this.numReaders); } else { return MATCH_ALL_PREDICATE.test(uri); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldBeReadByCurrentNode File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
shouldBeReadByCurrentNode
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
public String getIdStr() { return chr + "-" + position + "-" + ref + "-" + allele; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIdStr File: src/main/java/object/Variant.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
getIdStr
src/main/java/object/Variant.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
public DefaultHeaders<K, V, T> copy() { DefaultHeaders<K, V, T> copy = new DefaultHeaders<K, V, T>( hashingStrategy, valueConverter, nameValidator, entries.length); copy.addImpl(this); return copy; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
copy
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) { Set<String> roles = getRoles(principals); SimpleAuthorizationInfo simpleAuthorizationInfo = new SimpleAuthorizationInfo(roles); simpleAuthorizationInfo.addObjectPermission(new RolesPermission(roles)); return simpleAuthorizationInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doGetAuthorizationInfo File: dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java Repository: ManyDesigns/Portofino The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-29451
MEDIUM
6.4
ManyDesigns/Portofino
doGetAuthorizationInfo
dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java
8c754a0ad234555e813dcbf9e57d637f9f23d8fb
0
Analyze the following code function for security vulnerabilities
private void forEachShortcutMutate(@NonNull final Consumer<ShortcutInfo> cb) { for (int i = mShortcuts.size() - 1; i >= 0; i--) { ShortcutInfo si = mShortcuts.valueAt(i); cb.accept(si); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forEachShortcutMutate File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
forEachShortcutMutate
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
public InputStream getInputStream(final FileHeader hd) throws RarException, IOException { final PipedInputStream in = new PipedInputStream(32 * 1024); final PipedOutputStream out = new PipedOutputStream(in); // creates a new thread that will write data to the pipe. Data will be // available in another InputStream, connected to the OutputStream. new Thread(new Runnable() { public void run() { try { extractFile(hd, out); } catch (RarException e) { } finally { try { out.close(); } catch (IOException e) { } } } }).start(); return in; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputStream File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2018-12418
MEDIUM
4.3
junrar
getInputStream
src/main/java/com/github/junrar/Archive.java
ad8d0ba8e155630da8a1215cee3f253e0af45817
0
Analyze the following code function for security vulnerabilities
public void setLastHandledNavigation(Location location) { lastHandledNavigation = location; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLastHandledNavigation File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
setLastHandledNavigation
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
protected Set<String> getRoles(Object principal) { HashSet<String> roles = new HashSet<>(); if(principal instanceof Map) { Object rolesList = ((Map) principal).get("roles"); if(rolesList instanceof Collection) { roles.addAll((Collection<? extends String>) rolesList); } } return roles; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRoles File: dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java Repository: ManyDesigns/Portofino The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-29451
MEDIUM
6.4
ManyDesigns/Portofino
getRoles
dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java
8c754a0ad234555e813dcbf9e57d637f9f23d8fb
0
Analyze the following code function for security vulnerabilities
@Override public CharSequence getTitle() { return getBuildContext().getResources().getString(R.string.build_copying); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTitle File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
getTitle
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
public static List<Structure> getStructures(User user, boolean respectFrontendRoles, boolean allowedStructsOnly) throws DotDataException { String condition = ""; String orderBy = "structuretype,upper(name)"; int limit = -1; int offset = 0; String direction = "asc"; return getStructures(user, respectFrontendRoles, allowedStructsOnly, condition, orderBy, limit, offset, direction); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStructures File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructures
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public QName intern(QName qname) { return get(qname.getName(), qname.getNamespace(), qname .getQualifiedName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: intern File: src/main/java/org/dom4j/tree/QNameCache.java Repository: dom4j The code follows secure coding practices.
[ "CWE-91" ]
CVE-2018-1000632
MEDIUM
5
dom4j
intern
src/main/java/org/dom4j/tree/QNameCache.java
e598eb43d418744c4dbf62f647dd2381c9ce9387
0
Analyze the following code function for security vulnerabilities
void BleOnProcessStart() { debugLog("BleOnProcessStart()"); Class[] supportedProfileServices = Config.getSupportedProfiles(); //Initialize data objects for (int i=0; i < supportedProfileServices.length;i++) { mProfileServicesState.put(supportedProfileServices[i].getName(),BluetoothAdapter.STATE_OFF); } mRemoteDevices = new RemoteDevices(this); mAdapterProperties.init(mRemoteDevices); debugLog("BleOnProcessStart() - Make Bond State Machine"); mBondStateMachine = BondStateMachine.make(this, mAdapterProperties, mRemoteDevices); mJniCallbacks.init(mBondStateMachine,mRemoteDevices); //FIXME: Set static instance here??? setAdapterService(this); //Start Gatt service setGattProfileServiceState(supportedProfileServices,BluetoothAdapter.STATE_ON); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: BleOnProcessStart File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
BleOnProcessStart
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
protected Client buildHttpClient() { // use the default client config if not yet initialized if (clientConfig == null) { clientConfig = getDefaultClientConfig(); } ClientBuilder clientBuilder = ClientBuilder.newBuilder(); customizeClientBuilder(clientBuilder); clientBuilder = clientBuilder.withConfig(clientConfig); return clientBuilder.build(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildHttpClient File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
buildHttpClient
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void getRemoveWarning(ComponentName comp, final RemoteCallback result, int userHandle) { if (!mHasFeature) { return; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHandle)); Preconditions.checkCallAuthorization(hasCallingOrSelfPermission(BIND_DEVICE_ADMIN)); synchronized (getLockObject()) { ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); if (admin == null) { result.sendResult(null); return; } Intent intent = new Intent(DeviceAdminReceiver.ACTION_DEVICE_ADMIN_DISABLE_REQUESTED); intent.setFlags(Intent.FLAG_RECEIVER_FOREGROUND); intent.setComponent(admin.info.getComponent()); mContext.sendOrderedBroadcastAsUser(intent, new UserHandle(userHandle), null, new BroadcastReceiver() { @Override public void onReceive(Context context, Intent intent) { result.sendResult(getResultExtras(false)); } }, null, Activity.RESULT_OK, null, null); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRemoveWarning File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getRemoveWarning
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void onShowPrevAffiliatedTask() { showRelativeAffiliatedTask(false); }
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-0813 - Severity: MEDIUM - CVSS Score: 6.6 Description: DO NOT MERGE Ensure that the device is provisioned before showing Recents. Bug: 25476219 Change-Id: I5bb9cca74790521de71c0037b4f2421c3d21b3f6 Function: onShowPrevAffiliatedTask File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android Fixed Code: public void onShowPrevAffiliatedTask() { // Ensure the device has been provisioned before allowing the user to interact with // recents if (!isDeviceProvisioned()) { return; } showRelativeAffiliatedTask(false); }
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
onShowPrevAffiliatedTask
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
1
Analyze the following code function for security vulnerabilities
public Locale getLocalePreference() { return this.xwiki.getLocalePreference(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalePreference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getLocalePreference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public void updateLockTaskPackages(int userId, String[] packages) { mActivityTaskManager.updateLockTaskPackages(userId, packages); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLockTaskPackages File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateLockTaskPackages
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected Item addItem(Context c, List<Collection> mycollections, String path, String itemname, PrintWriter mapOut, boolean template) throws Exception { String mapOutputString = null; System.out.println("Adding item from directory " + itemname); // create workspace item Item myitem = null; WorkspaceItem wi = null; WorkflowItem wfi = null; if (!isTest) { wi = workspaceItemService.create(c, mycollections.iterator().next(), template); myitem = wi.getItem(); } // now fill out dublin core for item loadMetadata(c, myitem, path + File.separatorChar + itemname + File.separatorChar); // and the bitstreams from the contents file // process contents file, add bistreams and bundles, return any // non-standard permissions List<String> options = processContentsFile(c, myitem, path + File.separatorChar + itemname, "contents"); if (useWorkflow) { // don't process handle file // start up a workflow if (!isTest) { // Should we send a workflow alert email or not? if (useWorkflowSendEmail) { wfi = workflowService.start(c, wi); } else { wfi = workflowService.startWithoutNotify(c, wi); } // send ID to the mapfile mapOutputString = itemname + " " + myitem.getID(); } } else { // only process handle file if not using workflow system String myhandle = processHandleFile(c, myitem, path + File.separatorChar + itemname, "handle"); // put item in system if (!isTest) { try { installItemService.installItem(c, wi, myhandle); } catch (Exception e) { workspaceItemService.deleteAll(c, wi); log.error("Exception after install item, try to revert...", e); throw e; } // find the handle, and output to map file myhandle = handleService.findHandle(c, myitem); mapOutputString = itemname + " " + myhandle; } // set permissions if specified in contents file if (options.size() > 0) { System.out.println("Processing options"); processOptions(c, myitem, options); } } // now add to multiple collections if requested if (mycollections.size() > 1) { for (int i = 1; i < mycollections.size(); i++) { if (!isTest) { collectionService.addItem(c, mycollections.get(i), myitem); } } } // made it this far, everything is fine, commit transaction if (mapOut != null) { mapOut.println(mapOutputString); } //Clear intermediary objects from the cache c.uncacheEntity(wi); c.uncacheEntity(wfi); return myitem; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addItem File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
addItem
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
7af52a0883a9dbc475cf3001f04ed11b24c8a4c0
0
Analyze the following code function for security vulnerabilities
@Override public String getPassword() { return (String) get(PersistenceUnitProperties.JDBC_PASSWORD); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPassword File: src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java Repository: KrailOrg/krail-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15018
MEDIUM
5.2
KrailOrg/krail-jpa
getPassword
src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java
c1e848665492e21ef6cc9be443205e36b9a1f6be
0
Analyze the following code function for security vulnerabilities
@Override public void setAppVisibility(IBinder token, boolean visible) { if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, "setAppVisibility()")) { throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); } AppWindowToken wtoken; synchronized(mWindowMap) { wtoken = findAppWindowToken(token); if (wtoken == null) { Slog.w(TAG, "Attempted to set visibility of non-existing app token: " + token); return; } if (DEBUG_APP_TRANSITIONS || DEBUG_ORIENTATION) Slog.v(TAG, "setAppVisibility(" + token + ", visible=" + visible + "): " + mAppTransition + " hidden=" + wtoken.hidden + " hiddenRequested=" + wtoken.hiddenRequested + " Callers=" + Debug.getCallers(6)); mOpeningApps.remove(wtoken); mClosingApps.remove(wtoken); wtoken.waitingToShow = false; wtoken.hiddenRequested = !visible; // If we are preparing an app transition, then delay changing // the visibility of this token until we execute that transition. if (okToDisplay() && mAppTransition.isTransitionSet()) { // A dummy animation is a placeholder animation which informs others that an // animation is going on (in this case an application transition). If the animation // was transferred from another application/animator, no dummy animator should be // created since an animation is already in progress. if (!wtoken.mAppAnimator.usingTransferredAnimation && (!wtoken.startingDisplayed || mSkipAppTransitionAnimation)) { if (DEBUG_APP_TRANSITIONS) Slog.v( TAG, "Setting dummy animation on: " + wtoken); wtoken.mAppAnimator.setDummyAnimation(); } wtoken.inPendingTransaction = true; if (visible) { mOpeningApps.add(wtoken); wtoken.startingMoved = false; wtoken.mEnteringAnimation = true; // If the token is currently hidden (should be the // common case), then we need to set up to wait for // its windows to be ready. if (wtoken.hidden) { wtoken.allDrawn = false; wtoken.deferClearAllDrawn = false; wtoken.waitingToShow = true; if (wtoken.clientHidden) { // In the case where we are making an app visible // but holding off for a transition, we still need // to tell the client to make its windows visible so // they get drawn. Otherwise, we will wait on // performing the transition until all windows have // been drawn, they never will be, and we are sad. wtoken.clientHidden = false; wtoken.sendAppVisibilityToClients(); } } } else { mClosingApps.add(wtoken); wtoken.mEnteringAnimation = false; } if (mAppTransition.getAppTransition() == AppTransition.TRANSIT_TASK_OPEN_BEHIND) { // We're launchingBehind, add the launching activity to mOpeningApps. final WindowState win = findFocusedWindowLocked(getDefaultDisplayContentLocked()); if (win != null) { final AppWindowToken focusedToken = win.mAppToken; if (focusedToken != null) { if (DEBUG_APP_TRANSITIONS) Slog.d(TAG, "TRANSIT_TASK_OPEN_BEHIND, " + " adding " + focusedToken + " to mOpeningApps"); // Force animation to be loaded. focusedToken.hidden = true; mOpeningApps.add(focusedToken); } } } return; } final long origId = Binder.clearCallingIdentity(); wtoken.inPendingTransaction = false; setTokenVisibilityLocked(wtoken, null, visible, AppTransition.TRANSIT_UNSET, true, wtoken.voiceInteraction); wtoken.updateReportedVisibilityLocked(); Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAppVisibility File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setAppVisibility
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public int getCount() { return mFilteredItems.size(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCount File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-610" ]
CVE-2023-40133
MEDIUM
5.5
android
getCount
services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
08becc8c600f14c5529115cc1a1e0c97cd503f33
0
Analyze the following code function for security vulnerabilities
private final boolean killPackageProcessesLocked(String packageName, int appId, int userId, int minOomAdj, boolean callerWillRestart, boolean allowRestart, boolean doit, boolean evenPersistent, String reason) { ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>(); // Remove all processes this package may have touched: all with the // same UID (except for the system or root user), and all whose name // matches the package name. final int NP = mProcessNames.getMap().size(); for (int ip=0; ip<NP; ip++) { SparseArray<ProcessRecord> apps = mProcessNames.getMap().valueAt(ip); final int NA = apps.size(); for (int ia=0; ia<NA; ia++) { ProcessRecord app = apps.valueAt(ia); if (app.persistent && !evenPersistent) { // we don't kill persistent processes continue; } if (app.removed) { if (doit) { procs.add(app); } continue; } // Skip process if it doesn't meet our oom adj requirement. if (app.setAdj < minOomAdj) { continue; } // If no package is specified, we call all processes under the // give user id. if (packageName == null) { if (app.userId != userId) { continue; } if (appId >= 0 && UserHandle.getAppId(app.uid) != appId) { continue; } // Package has been specified, we want to hit all processes // that match it. We need to qualify this by the processes // that are running under the specified app and user ID. } else { final boolean isDep = app.pkgDeps != null && app.pkgDeps.contains(packageName); if (!isDep && UserHandle.getAppId(app.uid) != appId) { continue; } if (userId != UserHandle.USER_ALL && app.userId != userId) { continue; } if (!app.pkgList.containsKey(packageName) && !isDep) { continue; } } // Process has passed all conditions, kill it! if (!doit) { return true; } app.removed = true; procs.add(app); } } int N = procs.size(); for (int i=0; i<N; i++) { removeProcessLocked(procs.get(i), callerWillRestart, allowRestart, reason); } updateOomAdjLocked(); return N > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: killPackageProcessesLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
killPackageProcessesLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected Optional<List<String>> parseAudiences(JwtClaims claims) { return parseClaimList(claims, JwtClaims.AUDIENCE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseAudiences File: security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java Repository: micronaut-projects/micronaut-security The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-36820
MEDIUM
6.5
micronaut-projects/micronaut-security
parseAudiences
security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java
9728b925221a0d87798ccf250657a3c214b7e980
0
Analyze the following code function for security vulnerabilities
private void userAutohide() { cancelAutohide(); mHandler.postDelayed(mAutohide, 350); // longer than app gesture -> flag clear }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userAutohide File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
userAutohide
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); if (savedInstanceState != null) { mAddAccountCalled = savedInstanceState.getBoolean(KEY_ADD_CALLED); if (Log.isLoggable(TAG, Log.VERBOSE)) Log.v(TAG, "restored"); } final UserManager um = (UserManager) getSystemService(Context.USER_SERVICE); mUserHandle = Utils.getSecureTargetUser(getActivityToken(), um, null /* arguments */, getIntent().getExtras()); if (um.hasUserRestriction(UserManager.DISALLOW_MODIFY_ACCOUNTS, mUserHandle)) { // We aren't allowed to add an account. Toast.makeText(this, R.string.user_cannot_add_accounts_message, Toast.LENGTH_LONG) .show(); finish(); return; } if (mAddAccountCalled) { // We already called add account - maybe the callback was lost. finish(); return; } final String[] authorities = getIntent().getStringArrayExtra(AccountPreferenceBase.AUTHORITIES_FILTER_KEY); final String[] accountTypes = getIntent().getStringArrayExtra(AccountPreferenceBase.ACCOUNT_TYPES_FILTER_KEY); final Intent intent = new Intent(this, ChooseAccountActivity.class); if (authorities != null) { intent.putExtra(AccountPreferenceBase.AUTHORITIES_FILTER_KEY, authorities); } if (accountTypes != null) { intent.putExtra(AccountPreferenceBase.ACCOUNT_TYPES_FILTER_KEY, accountTypes); } intent.putExtra(EXTRA_USER, mUserHandle); startActivityForResult(intent, CHOOSE_ACCOUNT_REQUEST); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: src/com/android/settings/accounts/AddAccountSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-8609
HIGH
7.2
android
onCreate
src/com/android/settings/accounts/AddAccountSettings.java
f5d3e74ecc2b973941d8adbe40c6b23094b5abb7
0
Analyze the following code function for security vulnerabilities
@GetMapping("/info") public UserDTO getUserInfo() { return baseUserService.getUserDTO(SessionUtils.getUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserInfo File: framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java Repository: metersphere The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-38494
HIGH
7.5
metersphere
getUserInfo
framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java
a23f75d93b666901fd148d834df9384f6f24cf28
0
Analyze the following code function for security vulnerabilities
public Launcher createLauncher(TaskListener listener) { return new LocalLauncher(listener).decorateFor(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createLauncher File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
createLauncher
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
protected boolean processViewIntent(@NonNull Intent intent) { final String inviteUri = intent.getStringExtra(WelcomeActivity.EXTRA_INVITE_URI); if (inviteUri != null) { Invite invite = new Invite(inviteUri); if (invite.isJidValid()) { return invite.invite(); } } final String action = intent.getAction(); if (action == null) { return false; } switch (action) { case Intent.ACTION_SENDTO: case Intent.ACTION_VIEW: Uri uri = intent.getData(); if (uri != null) { Invite invite = new Invite(intent.getData(), intent.getBooleanExtra("scanned", false)); invite.account = intent.getStringExtra("account"); return invite.invite(); } else { return false; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processViewIntent File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
processViewIntent
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
private boolean checkCrossProfilePackagePermissions(String packageName, @UserIdInt int userId, boolean requiresPermission) { final PackageManagerInternal pmInternal = LocalServices.getService( PackageManagerInternal.class); final AndroidPackage androidPackage = pmInternal.getPackage(packageName); if (androidPackage == null || !androidPackage.isCrossProfile()) { return false; } if (!requiresPermission) { return true; } if (!isPackageEnabled(packageName, userId)) { return false; } try { final CrossProfileAppsInternal crossProfileAppsService = LocalServices.getService( CrossProfileAppsInternal.class); return crossProfileAppsService.verifyPackageHasInteractAcrossProfilePermission( packageName, userId); } catch (NameNotFoundException ex) { Slogf.w(LOG_TAG, "Cannot find the package %s to check for permissions.", packageName); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkCrossProfilePackagePermissions File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
checkCrossProfilePackagePermissions
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public Set<String> getAssociatedUserIds() { Set<String> result = new HashSet<>(); getAssociatedUserIds(result); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAssociatedUserIds File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
getAssociatedUserIds
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams highlightExpander(boolean highlight) { this.mHighlightExpander = highlight; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: highlightExpander File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
highlightExpander
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public CodeScanner getCodeScanner() { if(scannerInstance == null) { scannerInstance = new CodeScannerImpl(); } return scannerInstance; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCodeScanner File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getCodeScanner
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void setWifiSsidPolicy(String callerPackageName, WifiSsidPolicy policy) { CallerIdentity caller; if (isPermissionCheckFlagEnabled()) { caller = getCallerIdentity(callerPackageName); } else { caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwnerOfOrganizationOwnedDevice(caller), "SSID denylist can only be controlled by a device owner or " + "a profile owner on an organization-owned device."); } boolean changed = false; synchronized (getLockObject()) { ActiveAdmin admin; if (isPermissionCheckFlagEnabled()) { admin = enforcePermissionAndGetEnforcingAdmin( /* admin= */ null, MANAGE_DEVICE_POLICY_WIFI, caller.getPackageName(), caller.getUserId()).getActiveAdmin(); } else { admin = getProfileOwnerOrDeviceOwnerLocked(caller.getUserId()); } if (!Objects.equals(policy, admin.mWifiSsidPolicy)) { admin.mWifiSsidPolicy = policy; changed = true; } if (changed) saveSettingsLocked(caller.getUserId()); } if (changed) { notifyWifiSsidPolicyChanged(policy); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWifiSsidPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setWifiSsidPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void setInTouchMode(boolean mode) { synchronized(mWindowMap) { mInTouchMode = mode; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setInTouchMode File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setInTouchMode
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private AuditDAO auditDao() { return new AuditDAO(dataSource); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: auditDao File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
auditDao
web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
@UserHandleAware public boolean isAlwaysOnVpnLockdownEnabled() { throwIfParentInstance("isAlwaysOnVpnLockdownEnabled"); if (mService != null) { try { return mService.isAlwaysOnVpnLockdownEnabledForUser(myUserId()); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAlwaysOnVpnLockdownEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isAlwaysOnVpnLockdownEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private File getHashFile(File inputSpecFile) { String name = inputSpecFile.getName(); URL url = inputSpecRemoteUrl(); if (url != null) { String[] segments = url.getPath().split("/"); name = Files.getNameWithoutExtension(segments[segments.length - 1]); } return new File(output.getPath() + File.separator + ".openapi-generator" + File.separator + name + ".sha256"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHashFile File: modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-552" ]
CVE-2021-21429
LOW
2.1
OpenAPITools/openapi-generator
getHashFile
modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java
6445ea6511a6ddab64c86ae263937dc90650c98c
0
Analyze the following code function for security vulnerabilities
private void startIntentSenderWithRestore(@NonNull PendingIntent pendingIntent, @NonNull Intent intent) { if (sVerbose) Slog.v(TAG, "Intercepting custom description intent"); // We need to hide the Save UI before launching the pending intent, and // restore back it once the activity is finished, and that's achieved by // adding a custom extra in the activity intent. final IBinder token = mPendingUi.getToken(); intent.putExtra(AutofillManager.EXTRA_RESTORE_SESSION_TOKEN, token); mListener.startIntentSender(pendingIntent.getIntentSender(), intent); mPendingUi.setState(PendingUi.STATE_PENDING); if (sDebug) Slog.d(TAG, "hiding UI until restored with token " + token); hide(); final LogMaker log = newLogMaker(MetricsEvent.AUTOFILL_SAVE_LINK_TAPPED, mType); log.setType(MetricsEvent.TYPE_OPEN); mMetricsLogger.write(log); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startIntentSenderWithRestore File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-610" ]
CVE-2023-40133
MEDIUM
5.5
android
startIntentSenderWithRestore
services/autofill/java/com/android/server/autofill/ui/SaveUi.java
08becc8c600f14c5529115cc1a1e0c97cd503f33
0
Analyze the following code function for security vulnerabilities
private void processRssiThreshold(byte curRssi, int reason, WifiNative.WifiRssiEventHandler rssiHandler) { if (curRssi == Byte.MAX_VALUE || curRssi == Byte.MIN_VALUE) { Log.wtf(getTag(), "processRssiThreshold: Invalid rssi " + curRssi); return; } for (int i = 0; i < mRssiRanges.length; i++) { if (curRssi < mRssiRanges[i]) { // Assume sorted values(ascending order) for rssi, // bounded by high(127) and low(-128) at extremeties byte maxRssi = mRssiRanges[i]; byte minRssi = mRssiRanges[i - 1]; // This value of hw has to be believed as this value is averaged and has breached // the rssi thresholds and raised event to host. This would be eggregious if this // value is invalid mWifiInfo.setRssi(curRssi); updateCapabilities(); int ret = startRssiMonitoringOffload(maxRssi, minRssi, rssiHandler); Log.d(getTag(), "Re-program RSSI thresholds for " + getWhatToString(reason) + ": [" + minRssi + ", " + maxRssi + "], curRssi=" + curRssi + " ret=" + ret); break; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processRssiThreshold File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
processRssiThreshold
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void setClassId(String classId) { this.classId = classId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClassId File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setClassId
base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static String getDataRepositoryPathForRecord(String pi) throws PresentationException, IndexUnreachableException { String dataRepositoryPath = DataManager.getInstance().getSearchIndex().findDataRepositoryName(pi); return getDataRepositoryPath(dataRepositoryPath); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDataRepositoryPathForRecord File: goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-15124
MEDIUM
4
intranda/goobi-viewer-core
getDataRepositoryPathForRecord
goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java
44ceb8e2e7e888391e8a941127171d6366770df3
0
Analyze the following code function for security vulnerabilities
public static void configureAutoRefresh(HttpServletRequest request, HttpServletResponse response, boolean noAutoRefresh) { if(noAutoRefresh) return; String param = request.getParameter("auto_refresh"); boolean refresh = isAutoRefresh(request); if (param != null) { refresh = Boolean.parseBoolean(param); Cookie c = new Cookie("hudson_auto_refresh", Boolean.toString(refresh)); // Need to set path or it will not stick from e.g. a project page to the dashboard. // Using request.getContextPath() might work but it seems simpler to just use the hudson_ prefix // to avoid conflicts with any other web apps that might be on the same machine. c.setPath("/"); c.setMaxAge(60*60*24*30); // persist it roughly for a month response.addCookie(c); } if (refresh) { response.addHeader("Refresh", System.getProperty("hudson.Functions.autoRefreshSeconds", "10")); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configureAutoRefresh File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
configureAutoRefresh
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public final IBinder onBind(Intent intent) { return new IAccessibilityServiceClientWrapper(this, getMainLooper(), new Callbacks() { @Override public void onServiceConnected() { AccessibilityService.this.dispatchServiceConnected(); } @Override public void onInterrupt() { AccessibilityService.this.onInterrupt(); } @Override public void onAccessibilityEvent(AccessibilityEvent event) { AccessibilityService.this.onAccessibilityEvent(event); } @Override public void init(int connectionId, IBinder windowToken) { mConnectionId = connectionId; mWindowToken = windowToken; // The client may have already obtained the window manager, so // update the default token on whatever manager we gave them. final WindowManagerImpl wm = (WindowManagerImpl) getSystemService(WINDOW_SERVICE); wm.setDefaultToken(windowToken); } @Override public boolean onGesture(int gestureId) { return AccessibilityService.this.onGesture(gestureId); } @Override public boolean onKeyEvent(KeyEvent event) { return AccessibilityService.this.onKeyEvent(event); } @Override public void onMagnificationChanged(@NonNull Region region, float scale, float centerX, float centerY) { AccessibilityService.this.onMagnificationChanged(region, scale, centerX, centerY); } @Override public void onSoftKeyboardShowModeChanged(int showMode) { AccessibilityService.this.onSoftKeyboardShowModeChanged(showMode); } @Override public void onPerformGestureResult(int sequence, boolean completedSuccessfully) { AccessibilityService.this.onPerformGestureResult(sequence, completedSuccessfully); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBind File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
onBind
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
@Override public void startRecentsActivity(Intent intent, IAssistDataReceiver assistDataReceiver, IRecentsAnimationRunner recentsAnimationRunner) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "startRecentsActivity()"); final int callingPid = Binder.getCallingPid(); final long origId = Binder.clearCallingIdentity(); try { synchronized (this) { final ComponentName recentsComponent = mRecentTasks.getRecentsComponent(); final int recentsUid = mRecentTasks.getRecentsComponentUid(); // Start a new recents animation final RecentsAnimation anim = new RecentsAnimation(this, mStackSupervisor, mActivityStartController, mWindowManager, mUserController, callingPid); anim.startRecentsActivity(intent, recentsAnimationRunner, recentsComponent, recentsUid, assistDataReceiver); } } finally { Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startRecentsActivity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startRecentsActivity
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private boolean setHandshakeSuccessIfStillHandshaking(Channel channel) { if (handshaking && !handshakeFuture.isDone()) { setHandshakeSuccess(channel); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHandshakeSuccessIfStillHandshaking File: src/main/java/org/jboss/netty/handler/ssl/SslHandler.java Repository: netty The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-3488
MEDIUM
5
netty
setHandshakeSuccessIfStillHandshaking
src/main/java/org/jboss/netty/handler/ssl/SslHandler.java
2fa9400a59d0563a66908aba55c41e7285a04994
0
Analyze the following code function for security vulnerabilities
@Override public void setBounds(Rect bounds) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBounds File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setBounds
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public List<Block> execute(ContextMacroParameters parameters, String macroContent, MacroTransformationContext context) throws MacroExecutionException { MetaData metadata; if (parameters.getDocument() != null) { metadata = new MetaData(); metadata.addMetaData(MetaData.SOURCE, parameters.getDocument()); metadata.addMetaData(MetaData.BASE, parameters.getDocument()); } else { metadata = null; } String content = macroContent; Syntax syntax = null; if (parameters.getSource() != null) { MacroContentWikiSource wikiSource = this.contentFactory.getContent(parameters.getSource(), context); syntax = wikiSource.getSyntax(); content = wikiSource.getContent(); } XDOM xdom = this.parser.parse(content, syntax, context, false, metadata, context.isInline()); if (xdom.getChildren().isEmpty()) { return Collections.emptyList(); } List<Block> blocks; if (parameters.isRestricted() || parameters.getTransformationContext() == TransformationContextMode.DOCUMENT || parameters.getTransformationContext() == TransformationContextMode.TRANSFORMATIONS) { // Execute the content in the context of the target document blocks = executeContext(xdom, parameters, context); } else { // The content will be executed in the current context blocks = xdom.getChildren(); } // Keep metadata so that the result stay associated to context properties when inserted in the parent // XDOM return Arrays.asList(new MetaDataBlock(blocks, xdom.getMetaData())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-context/src/main/java/org/xwiki/rendering/internal/macro/context/ContextMacro.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
execute
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-context/src/main/java/org/xwiki/rendering/internal/macro/context/ContextMacro.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthPasswordFlow(String username, String password) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).usePasswordFlow(username, password); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthPasswordFlow File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthPasswordFlow
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public String getPosition() { return state.position; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPosition File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
getPosition
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
private void handleFingerprintAcquired(int acquireInfo) { if (acquireInfo != FingerprintManager.FINGERPRINT_ACQUIRED_GOOD) { return; } for (int i = 0; i < mCallbacks.size(); i++) { KeyguardUpdateMonitorCallback cb = mCallbacks.get(i).get(); if (cb != null) { cb.onFingerprintAcquired(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleFingerprintAcquired File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
handleFingerprintAcquired
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override void onDisplayChanged(DisplayContent dc) { if (dc != null && mDisplayContent != null && dc != mDisplayContent && mDisplayContent.getImeInputTarget() == this) { dc.updateImeInputAndControlTarget(getImeInputTarget()); mDisplayContent.setImeInputTarget(null); } super.onDisplayChanged(dc); // Window was not laid out for this display yet, so make sure mLayoutSeq does not match. if (dc != null && mInputWindowHandle.getDisplayId() != dc.getDisplayId()) { mLayoutSeq = dc.mLayoutSeq - 1; mInputWindowHandle.setDisplayId(dc.getDisplayId()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDisplayChanged File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
onDisplayChanged
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Deprecated public int copyWiki(String sourceWiki, String targetWiki, String locale, XWikiContext context) throws XWikiException { return copyWiki(sourceWiki, targetWiki, locale, false, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyWiki File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
copyWiki
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public Route.OneArgHandler promise(final Deferred.Initializer initializer) { return req -> { return new Deferred(initializer); }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: promise File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
promise
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public String getPageUrl(int order) throws IndexUnreachableException { return getPageUrl(Integer.toString(order)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPageUrl File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getPageUrl
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public void removeFromPool(Channel channel) { channelPool.removeAll(channel); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeFromPool File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
removeFromPool
providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public void enqueueParallelBroadcastLocked(BroadcastRecord r) { mParallelBroadcasts.add(r); r.enqueueClockTime = System.currentTimeMillis(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enqueueParallelBroadcastLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
enqueueParallelBroadcastLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public Map<String, Long> getArchives() { List<Timestamp> lo = Db.query("select releaseTime from " + TABLE_NAME + " where rubbish=? and privacy=? order by releaseTime desc", rubbish, privacy); Map<String, Long> archives = new LinkedHashMap<>(); for (Timestamp objects : lo) { if (objects != null) { String key = new SimpleDateFormat("yyyy_MM").format(new Date(objects.getTime())); if (archives.containsKey(key)) { archives.put(key, archives.get(key) + 1); } else { archives.put(key, 1L); } } } return archives; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getArchives File: data/src/main/java/com/zrlog/model/Log.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-17420
MEDIUM
6.5
94fzb/zrlog
getArchives
data/src/main/java/com/zrlog/model/Log.java
157b8fbbb64eb22ddb52e7c5754e88180b7c3d4f
0
Analyze the following code function for security vulnerabilities
void updateCameraCompatStateFromUser(@CameraCompatControlState int state) { if (!isCameraCompatControlEnabled()) { // Feature is disabled by config_isCameraCompatControlForStretchedIssuesEnabled. return; } if (state == TaskInfo.CAMERA_COMPAT_CONTROL_HIDDEN) { Slog.w(TAG, "Unexpected hidden state in updateCameraCompatState"); return; } boolean changed = setCameraCompatControlState(state); mCameraCompatControlClickedByUser = true; if (!changed) { return; } mTaskSupervisor.getActivityMetricsLogger().logCameraCompatControlClickedEventReported( state, info.applicationInfo.uid); if (state == TaskInfo.CAMERA_COMPAT_CONTROL_DISMISSED) { mCompatCameraControlCallback = null; return; } if (mCompatCameraControlCallback == null) { Slog.w(TAG, "Callback for a camera compat control is null"); return; } try { if (state == TaskInfo.CAMERA_COMPAT_CONTROL_TREATMENT_APPLIED) { mCompatCameraControlCallback.applyCameraCompatTreatment(); } else { mCompatCameraControlCallback.revertCameraCompatTreatment(); } } catch (RemoteException e) { Slog.e(TAG, "Unable to apply or revert camera compat treatment", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateCameraCompatStateFromUser File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
updateCameraCompatStateFromUser
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasSummaryInHeader() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasSummaryInHeader File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
hasSummaryInHeader
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public boolean isOverrideApnEnabled(@NonNull ComponentName admin) { throwIfParentInstance("isOverrideApnEnabled"); if (mService != null) { try { return mService.isOverrideApnEnabled(admin); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOverrideApnEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isOverrideApnEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void onSystemReady() { synchronized (mGlobalLock) { final PackageManager pm = mContext.getPackageManager(); mHasHeavyWeightFeature = pm.hasSystemFeature(FEATURE_CANT_SAVE_STATE); mHasLeanbackFeature = pm.hasSystemFeature(FEATURE_LEANBACK); mVrController.onSystemReady(); mRecentTasks.onSystemReadyLocked(); mTaskSupervisor.onSystemReady(); mActivityClientController.onSystemReady(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSystemReady File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
onSystemReady
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private void atomicRenameDocument(XWikiDocument sourceDocument, DocumentReference targetDocumentReference, XWikiContext context) throws XWikiException { // Step 1: Simulate creating a document and deleting a document from listeners point of view // FIXME: currently modifications made by listeners won't be applied XWikiDocument futureTargetDocument = sourceDocument.cloneRename(targetDocumentReference, context); futureTargetDocument.setOriginalDocument(new XWikiDocument(targetDocumentReference)); beforeSave(futureTargetDocument, context); XWikiDocument deletedDocument = beforeDelete(sourceDocument, context); // Step 2: Perform atomic rename in DB this.getStore().renameXWikiDoc(sourceDocument, targetDocumentReference, context); // Step 3: Simulate a created document and a deleted document from listeners point of view afterDelete(deletedDocument, context); afterSave(futureTargetDocument, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: atomicRenameDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
atomicRenameDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
String getWorkingDirectoryAsString() { return workingDir; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWorkingDirectoryAsString File: src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java Repository: apache/maven-shared-utils The code follows secure coding practices.
[ "CWE-116" ]
CVE-2022-29599
HIGH
7.5
apache/maven-shared-utils
getWorkingDirectoryAsString
src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java
2735facbbbc2e13546328cb02dbb401b3776eea3
0
Analyze the following code function for security vulnerabilities
private static boolean handleStreamCopy(InputStream in, OutputStream out) { return handleStreamCopy(in, out, true, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleStreamCopy File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
handleStreamCopy
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
public synchronized GeoMap getGeoMap() throws PresentationException, DAOException, IndexUnreachableException { GeoMap widget = this.geoMaps.get(getPersistentIdentifier()); if (widget == null) { widget = generateGeoMap(getPersistentIdentifier()); this.geoMaps = Collections.singletonMap(getPersistentIdentifier(), widget); } return widget; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGeoMap File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getGeoMap
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public BaseClass getXClass(DocumentReference documentReference, XWikiContext context) throws XWikiException { // Used to avoid recursive loading of documents if there are recursives usage of classes BaseClass bclass = context.getBaseClass(documentReference); if (bclass != null) { return bclass; } return getDocument(documentReference, context).getXClass(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getXClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public static List<Structure> getStructuresByWFScheme(WorkflowScheme scheme, User user, boolean respectFrontendRoles) throws DotDataException { int limit = -1; HibernateUtil dh = new HibernateUtil(Structure.class); try{ String type = ((Inode) Structure.class.newInstance()).getType(); String query = "from inode in class " + Structure.class.getName() + " workflow_scheme_x_structure "; // condition query += " where inode.type ='"+type+"' and structure.inode = workflow_scheme_x_structure.structure_id and workflow_scheme_x_structure.scheme_id = ?"; // order query += " order by name" ; dh.setQuery(query); List<Structure> resultList = dh.list(); List<Structure> retList = new ArrayList<Structure> (); for (Structure st : retList) { if (permissionAPI.doesUserHavePermission(st, PERMISSION_READ, user, respectFrontendRoles)) { retList.add(st); } } return retList; } catch(Exception e){ Logger.error(StructureFactory.class, e.getMessage(), e); throw new DotDataException(e.getMessage()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStructuresByWFScheme File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructuresByWFScheme
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public void setCommentsNum(Integer commentsNum) { this.commentsNum = commentsNum; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCommentsNum File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
setCommentsNum
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
public <T> void get(String table, Class<T> clazz, Criterion filter, boolean returnCount, boolean setId, List<FacetField> facets, Handler<AsyncResult<Results<T>>> replyHandler) { get(null, table, clazz, filter, returnCount, setId, facets, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
get
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public boolean isAppendable() { return this.appendable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAppendable File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
isAppendable
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public void setErrorPassword(String errorPassword) { this.errorPassword = errorPassword; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setErrorPassword File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setErrorPassword
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
public static byte[] read(InputStream is, int size) throws IOException { return read(is, new byte[size]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: src/main/java/net/sf/mpxj/common/InputStreamHelper.java Repository: joniles/mpxj The code follows secure coding practices.
[ "CWE-377", "CWE-200" ]
CVE-2022-41954
LOW
3.3
joniles/mpxj
read
src/main/java/net/sf/mpxj/common/InputStreamHelper.java
ae0af24345d79ad45705265d9927fe55e94a5721
0
Analyze the following code function for security vulnerabilities
@Unstable protected boolean isEntityReferenceNameValid(EntityReference entityReference) { if (this.getEntityNameValidationManager().getEntityReferenceNameStrategy() != null && this.getEntityNameValidationConfiguration().useValidation()) { if (!this.getEntityNameValidationManager().getEntityReferenceNameStrategy().isValid(entityReference)) { Object[] args = {getLocalSerializer().serialize(entityReference)}; XWikiException invalidNameException = new XWikiException(XWikiException.MODULE_XWIKI_STORE, XWikiException.ERROR_XWIKI_APP_DOCUMENT_NAME_INVALID, "Cannot create document {0} because its name does not respect the name strategy of the wiki.", null, args); ScriptContext scontext = getCurrentScriptContext(); scontext.setAttribute("createException", invalidNameException, ScriptContext.ENGINE_SCOPE); return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEntityReferenceNameValid File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
isEntityReferenceNameValid
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
@Override public void onUserUnlocked(@NonNull TargetUser user) { if (user.isPreCreated()) return; mService.handleOnUserUnlocked(user.getUserIdentifier()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserUnlocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
onUserUnlocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override protected void onCreate(Bundle savedInstanceState) { Intent intent = getIntent(); Parcelable targetParcelable = intent.getParcelableExtra(Intent.EXTRA_INTENT); if (!(targetParcelable instanceof Intent)) { Log.w("ChooserActivity", "Target is not an intent: " + targetParcelable); finish(); super.onCreate(null); return; } Intent target = (Intent) targetParcelable; if (target != null) { modifyTargetIntent(target); } Parcelable[] targetsParcelable = intent.getParcelableArrayExtra(Intent.EXTRA_ALTERNATE_INTENTS); if (targetsParcelable != null) { final boolean offset = target == null; Intent[] additionalTargets = new Intent[offset ? targetsParcelable.length - 1 : targetsParcelable.length]; for (int i = 0; i < targetsParcelable.length; i++) { if (!(targetsParcelable[i] instanceof Intent)) { Log.w(TAG, "EXTRA_ALTERNATE_INTENTS array entry #" + i + " is not an Intent: " + targetsParcelable[i]); finish(); super.onCreate(null); return; } final Intent additionalTarget = (Intent) targetsParcelable[i]; if (i == 0 && target == null) { target = additionalTarget; modifyTargetIntent(target); } else { additionalTargets[offset ? i - 1 : i] = additionalTarget; modifyTargetIntent(additionalTarget); } } setAdditionalTargets(additionalTargets); } mReplacementExtras = intent.getBundleExtra(Intent.EXTRA_REPLACEMENT_EXTRAS); CharSequence title = intent.getCharSequenceExtra(Intent.EXTRA_TITLE); int defaultTitleRes = 0; if (title == null) { defaultTitleRes = com.android.internal.R.string.chooseActivity; } Parcelable[] pa = intent.getParcelableArrayExtra(Intent.EXTRA_INITIAL_INTENTS); Intent[] initialIntents = null; if (pa != null) { initialIntents = new Intent[pa.length]; for (int i=0; i<pa.length; i++) { if (!(pa[i] instanceof Intent)) { Log.w(TAG, "Initial intent #" + i + " not an Intent: " + pa[i]); finish(); super.onCreate(null); return; } final Intent in = (Intent) pa[i]; modifyTargetIntent(in); initialIntents[i] = in; } } mReferrerFillInIntent = new Intent().putExtra(Intent.EXTRA_REFERRER, getReferrer()); mChosenComponentSender = intent.getParcelableExtra( Intent.EXTRA_CHOSEN_COMPONENT_INTENT_SENDER); mRefinementIntentSender = intent.getParcelableExtra( Intent.EXTRA_CHOOSER_REFINEMENT_INTENT_SENDER); setSafeForwardingMode(true); super.onCreate(savedInstanceState, target, title, defaultTitleRes, initialIntents, null, false); MetricsLogger.action(this, MetricsLogger.ACTION_ACTIVITY_CHOOSER_SHOWN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
onCreate
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
public static PageParameters paramsOf(CodeComment comment) { return paramsOf(comment.getProject(), getState(comment)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: paramsOf File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
paramsOf
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
@Override public Contentlet convertFatContentletToContentlet(com.dotmarketing.portlets.contentlet.business.Contentlet fatty) throws DotDataException, DotStateException, DotSecurityException { Contentlet con = new Contentlet(); con.setStructureInode(fatty.getStructureInode()); Map<String, Object> contentletMap = fatty.getMap(); try { APILocator.getContentletAPI().copyProperties(con, contentletMap); } catch (Exception e) { Logger.error(this,"Unable to copy contentlet properties",e); throw new DotDataException("Unable to copy contentlet properties",e); } con.setInode(fatty.getInode()); con.setStructureInode(fatty.getStructureInode()); con.setIdentifier(fatty.getIdentifier()); con.setSortOrder(fatty.getSortOrder()); con.setLanguageId(fatty.getLanguageId()); con.setNextReview(fatty.getNextReview()); con.setLastReview(fatty.getLastReview()); con.setOwner(fatty.getOwner()); con.setModUser(fatty.getModUser()); con.setModDate(fatty.getModDate()); con.setReviewInterval(fatty.getReviewInterval()); if(UtilMethods.isSet(fatty.getIdentifier())){ IdentifierAPI identifierAPI = APILocator.getIdentifierAPI(); Identifier identifier = identifierAPI.find(fatty.getIdentifier()); Folder folder = null; if(identifier.getParentPath().length()>1){ folder = APILocator.getFolderAPI().findFolderByPath(identifier.getParentPath(), identifier.getHostId(), APILocator.getUserAPI().getSystemUser(),false); }else{ folder = APILocator.getFolderAPI().findSystemFolder(); } con.setHost(identifier.getHostId()); con.setFolder(folder.getInode()); // lets check if we have publish/expire fields to set Structure st=con.getStructure(); if(UtilMethods.isSet(st.getPublishDateVar())) con.setDateProperty(st.getPublishDateVar(), identifier.getSysPublishDate()); if(UtilMethods.isSet(st.getExpireDateVar())) con.setDateProperty(st.getExpireDateVar(), identifier.getSysExpireDate()); } else { if(!UtilMethods.isSet(con.getStructureInode())) { throw new DotDataException("Contentlet must have a structure type."); } if (con.isSystemHost()) { // When we are saving a systemHost we cannot call // APILocator.getHostAPI().findSystemHost() method, because this // method will create a system host if not exist which cause // a infinite loop. con.setHost(Host.SYSTEM_HOST); } else { con.setHost(APILocator.getHostAPI().findSystemHost().getIdentifier()); } con.setFolder(APILocator.getFolderAPI().findSystemFolder().getInode()); } String wysiwyg = fatty.getDisabledWysiwyg(); if( UtilMethods.isSet(wysiwyg) ) { List<String> wysiwygFields = new ArrayList<String>(); StringTokenizer st = new StringTokenizer(wysiwyg,","); while( st.hasMoreTokens() ) wysiwygFields.add(st.nextToken().trim()); con.setDisabledWysiwyg(wysiwygFields); } return con; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertFatContentletToContentlet File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
convertFatContentletToContentlet
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public static String sanitizeParameter(String parameter){ if(!UtilMethods.isSet(parameter)){//check if is not null return ""; } for(String str : EVIL_SQL_WORDS){ if(parameter.toLowerCase().contains(str)){//check if the order by requested have any other command Exception e = new DotStateException("Invalid or pernicious sql parameter passed in : " + parameter); Logger.error(SQLUtil.class, "Invalid or pernicious sql parameter passed in : " + parameter, e); return ""; } } return parameter; }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2016-2355 - Severity: HIGH - CVSS Score: 7.5 Description: fixes #8848 Function: sanitizeParameter File: src/com/dotmarketing/common/util/SQLUtil.java Repository: dotCMS/core Fixed Code: public static String sanitizeParameter(String parameter){ if(!UtilMethods.isSet(parameter)){//check if is not null return ""; } for(String str : EVIL_SQL_WORDS){ if(parameter.toLowerCase().contains(str)){//check if the order by requested have any other command Exception e = new DotStateException("Invalid or pernicious sql parameter passed in : " + parameter); Logger.error(SQLUtil.class, "Invalid or pernicious sql parameter passed in : " + parameter, e); SecurityLogger.logInfo(SQLUtil.class, "Invalid or pernicious sql parameter passed in : " + parameter); return ""; } } return parameter; }
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
sanitizeParameter
src/com/dotmarketing/common/util/SQLUtil.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
1
Analyze the following code function for security vulnerabilities
public XWikiAttachment setAttachment(XWikiAttachment attachment) { return this.attachmentList.set(attachment); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAttachment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setAttachment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void pointNeighborsToThis() { before.after = this; after.before = this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pointNeighborsToThis File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
pointNeighborsToThis
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Sessional @Override public int count(Criteria<Project> projectCriteria) { CriteriaBuilder builder = getSession().getCriteriaBuilder(); CriteriaQuery<Long> criteriaQuery = builder.createQuery(Long.class); Root<Project> root = criteriaQuery.from(Project.class); criteriaQuery.where(getPredicates(projectCriteria, criteriaQuery, root, builder)); criteriaQuery.select(builder.count(root)); return getSession().createQuery(criteriaQuery).uniqueResult().intValue(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: count File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
count
server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
public boolean isInterestingToUserLocked() { final int size = activities.size(); for (int i = 0 ; i < size ; i++) { ActivityRecord r = activities.get(i); if (r.isInterestingToUserLocked()) { return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInterestingToUserLocked File: services/core/java/com/android/server/am/ProcessRecord.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
isInterestingToUserLocked
services/core/java/com/android/server/am/ProcessRecord.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public InputStream createStorageInputStream(String name) throws IOException { return getContext().openFileInput(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createStorageInputStream File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createStorageInputStream
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformTranslation(Object nativeTransform, float translateX, float translateY, float translateZ) { CN1Matrix4f m = (CN1Matrix4f)nativeTransform; m.reset(); m.translate(translateX, translateY, translateZ); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformTranslation File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformTranslation
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private boolean isVisible(int visibility) { return visibility == AccountManager.VISIBILITY_VISIBLE || visibility == AccountManager.VISIBILITY_USER_MANAGED_VISIBLE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isVisible File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
isVisible
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private void logBeforeException(ParseException pe) { log.info("ParseException: "); log.severe(pe.getLocalizedMessage()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logBeforeException File: AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java Repository: liimaorg/liima The code follows secure coding practices.
[ "CWE-917" ]
CVE-2023-26092
CRITICAL
9.8
liimaorg/liima
logBeforeException
AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java
78ba2e198c615dc8858e56eee3290989f0362686
0