instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@NonNull public static List<Message> getMessagesFromBundleArray(@Nullable Parcelable[] bundles) { if (bundles == null) { return new ArrayList<>(); } List<Message> messages = new ArrayList<>(bundles.length); for (int i = 0; i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessagesFromBundleArray File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getMessagesFromBundleArray
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void removeSession(WrappedSession wrappedSession) { assert VaadinSession.hasLock(this, wrappedSession); removeFromHttpSession(wrappedSession); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeSession File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
removeSession
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
public InputStream getInputStream() throws IOException { return mInputStream; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputStream File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
getInputStream
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
@Override public final DeserializerFactory withValueInstantiators(ValueInstantiators instantiators) { return withConfig(_factoryConfig.withValueInstantiators(instantiators)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withValueInstantiators File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
withValueInstantiators
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public int getReadTimeout() { return readTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getReadTimeout File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getReadTimeout
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, int nb, int start, List<?> parameterValues, XWikiContext context) throws XWikiException { return searchDocuments(wheresql, distinctbylanguage, false, nb, start, parameterValues, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
searchDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public final WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo, Bundle bOptions, int userId) { enforceNotIsolat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityAndWait File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startActivityAndWait
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static Conversation getConversation(Activity activity) { return getConversation(activity, R.id.secondary_fragment); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConversation File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
getConversation
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Nonnull private RequestPartitionId getRequestPartitionId() { if (myRequestPartitionId == null) { if (mySearchEntity.getResourceId() != null) { // If we have an ID, we've already checked the partition and made sure it's appropriate myRequestPartitionId = RequestPartitionId.allPartitions(); } else { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestPartitionId File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getRequestPartitionId
hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
a5e4f56e1c6f55093ff334cf698ffdeea2f33960
0
Analyze the following code function for security vulnerabilities
@Test public void setSmoothParams() throws Exception { assertPlotParam("smooth", "unique"); assertPlotParam("smooth", "frequency"); assertPlotParam("smooth", "fnormal"); assertPlotParam("smooth", "cumulative"); assertPlotParam("smooth", "cnormal"); assertPlotParam("smooth", "bins"); assert...
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2023-36812 - Severity: CRITICAL - CVSS Score: 9.8 Description: Improved fix for #2261. Regular expressions wouldn't catch the newlines or possibly other control characters. Now we'll use the TAG validation code to make sure the inputs are only plain ASCII printabl...
[ "CWE-74" ]
CVE-2023-36812
CRITICAL
9.8
OpenTSDB/opentsdb
setSmoothParams
test/tsd/TestGraphHandler.java
07c4641471c6f5c2ab5aab615969e97211eb50d9
1
Analyze the following code function for security vulnerabilities
@Override public boolean isMapLikeType() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMapLikeType File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
isMapLikeType
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public void setSystemProcess() { try { ServiceManager.addService(Context.ACTIVITY_SERVICE, this, true); ServiceManager.addService(ProcessStats.SERVICE_NAME, mProcessStats); ServiceManager.addService("meminfo", new MemBinder(this)); ServiceManager.addService("gfxin...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSystemProcess File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
setSystemProcess
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public static String serialize(Node node, boolean withXmlDeclaration) { if (node == null) { return ""; } try { LSOutput output = LS_IMPL.createLSOutput(); StringWriter result = new StringWriter(); output.setCharacterStream(result); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serialize File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java Repository: xwiki/xwiki-commons The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-24898
MEDIUM
4
xwiki/xwiki-commons
serialize
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
947e8921ebd95462d5a7928f397dd1b64f77c7d5
0
Analyze the following code function for security vulnerabilities
private static void eventJournalXmlGenerator(XmlGenerator gen, Config config) { Collection<EventJournalConfig> mapJournalConfigs = config.getMapEventJournalConfigs().values(); Collection<EventJournalConfig> cacheJournalConfigs = config.getCacheEventJournalConfigs().values(); for (EventJournalCon...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: eventJournalXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
eventJournalXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void setWindowWallpaperPositionLocked(WindowState window, float x, float y, float xStep, float yStep) { if (window.mWallpaperX != x || window.mWallpaperY != y) { window.mWallpaperX = x; window.mWallpaperY = y; window.mWallpaperXStep = xStep; wi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWindowWallpaperPositionLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setWindowWallpaperPositionLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public View getStaplerFallback() { return getPrimaryView(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStaplerFallback File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getStaplerFallback
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@ApiOperation(value = "删除", notes = "删除") @PostMapping("/remove") @ResponseBody @RequiresPermissions("novel:friendLink:remove") public R remove(Integer id) { if (friendLinkService.remove(id) > 0) { redisTemplate.delete(CacheKey.INDEX_LINK_KEY); return R.ok(); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: remove File: novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java Repository: 201206030/novel-plus The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-7171
LOW
3.3
201206030/novel-plus
remove
novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java
d6093d8182362422370d7eaf6c53afde9ee45215
0
Analyze the following code function for security vulnerabilities
@Override protected void onResume() { super.onResume(); mDevelopmentSettingsListener = new BroadcastReceiver() { @Override public void onReceive(Context context, Intent intent) { updateTilesList(); } }; LocalBroadcastManager.getIns...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onResume File: src/com/android/settings/SettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
onResume
src/com/android/settings/SettingsActivity.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
public synchronized void updateBigDecimal( String columnName, @Nullable BigDecimal x) throws SQLException { updateBigDecimal(findColumn(columnName), x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBigDecimal File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBigDecimal
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
void clearRelaunching() { if (mPendingRelaunchCount == 0) { return; } mPendingRelaunchCount = 0; mRelaunchStartTime = 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearRelaunching File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
clearRelaunching
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public boolean allowAutojoin(int networkId, boolean choice) { if (mVerboseLoggingEnabled) { Log.v(TAG, "Setting allowAutojoin to " + choice + " for netId " + networkId); } WifiConfiguration config = getInternalConfiguredNetwork(networkId); if (config == null) { Lo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: allowAutojoin File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
allowAutojoin
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void setInitialWorkerPort(int initialPort) { prop.setProperty(TS_INITIAL_WORKER_PORT, String.valueOf(initialPort)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setInitialWorkerPort File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
setInitialWorkerPort
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
@Override public void normalize() { for (DomNode child = getFirstChild(); child != null; child = child.getNextSibling()) { if (child instanceof DomText) { final boolean removeChildTextNodes = hasFeature(DOM_NORMALIZE_REMOVE_CHILDREN); final StringBuilder dataBuild...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: normalize File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
normalize
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
public boolean validate() { // Optional: PerProviderSubscription/<X+>/SubscriptionUpdate if (mSubscriptionUpdate != null && !mSubscriptionUpdate.validate()) { return false; } return validateForCommonR1andR2(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validate File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
validate
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public boolean onTouchEvent(MotionEvent event) { if (!mFocused) { mGestureDetector.onTouchEvent(event); return true; } Tab currentTab = mUrlBarDelegate.getCurrentTab(); if (event.getAction() == MotionEvent.ACTION_DOWN && currentTab != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTouchEvent File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onTouchEvent
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
public void setFlags(int flags) { mFlags = flags; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFlags File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setFlags
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private boolean handleL3MessagesWhenNotConnected(Message message) { boolean handleStatus = HANDLED; if (!mIpClientWithPreConnection) { return NOT_HANDLED; } switch (message.what) { case CMD_PRE_DHCP_ACTION: handlePreDhcpSetup(); b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleL3MessagesWhenNotConnected File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleL3MessagesWhenNotConnected
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@GET @Path("/help") @Produces("text/markdown") public InputStream getFileHelp(@QueryParam("f") String fileName, @Context SecurityContext securityContext) { if (!securityContext.isUserInRole(Authentication.ROLE_FILESYSTEM_EDITOR)) { throw new ForbiddenException("FILESYSTEM EDITOR role is ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-40315 - Severity: HIGH - CVSS Score: 8.0 Description: NMS-15702: Only members of ROLE_ADMIN can view/edit users.xml Function: getFileHelp File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java Repository: OpenNMS/opennm...
[ "CWE-Other" ]
CVE-2023-40315
HIGH
8
OpenNMS/opennms
getFileHelp
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
201301e067329ababa3c0671ded5c4c43347d4a8
1
Analyze the following code function for security vulnerabilities
private void copyUploadFile(BulkAssessmentDatas datas, File uploadedFile, List<BulkAssessmentRow> rows) throws IOException { try(FileInputStream inStream = new FileInputStream(uploadedFile)) { if(VFSManager.copyContent(inStream, targetArchive)) { datas.setReturnFiles(targetArchive.getRelPath()); processRet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyUploadFile File: src/main/java/org/olat/course/assessment/bulk/DataStepForm.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
copyUploadFile
src/main/java/org/olat/course/assessment/bulk/DataStepForm.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
@Override public Map<Account, Integer> getAccountsAndVisibilityForPackage(String packageName, String accountType) { int callingUid = Binder.getCallingUid(); int userId = UserHandle.getCallingUserId(); boolean isSystemUid = UserHandle.isSameApp(callingUid, Process.SYSTEM_UID); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountsAndVisibilityForPackage File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAccountsAndVisibilityForPackage
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private void sendSmAcknowledgementInternal() throws NotConnectedException, InterruptedException { packetWriter.sendStreamElement(new AckAnswer(clientHandledStanzasCount)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendSmAcknowledgementInternal File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendSmAcknowledgementInternal
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public void startInPlaceAnimationOnFrontMostApplication(ActivityOptions opts) throws RemoteException { if (opts.getAnimationType() != ActivityOptions.ANIM_CUSTOM_IN_PLACE || opts.getCustomInPlaceResId() == 0) { throw new IllegalArgumentException("Expected in...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startInPlaceAnimationOnFrontMostApplication File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startInPlaceAnimationOnFrontMostApplication
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public boolean isChangeEnabled(long changeId, String packageName, int userId) { return CompatChanges.isChangeEnabled(changeId, packageName, UserHandle.of(userId)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isChangeEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isChangeEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void deploy() { final DeploymentInfo deploymentInfo = originalDeployment.clone(); if (deploymentInfo.getServletStackTraces() == ServletStackTraces.ALL) { UndertowServletLogger.REQUEST_LOGGER.servletStackTracesAll(deploymentInfo.getDeploymentName()); } d...
Vulnerability Classification: - CWE: CWE-862 - CVE: CVE-2019-10184 - Severity: MEDIUM - CVSS Score: 5.0 Description: [UNDERTOW-1578] 401 Unauthorized should be returned when requesting a protected directory without trailing slash Function: deploy File: servlet/src/main/java/io/undertow/servlet/core/DeploymentManagerI...
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
deploy
servlet/src/main/java/io/undertow/servlet/core/DeploymentManagerImpl.java
d2715e3afa13f50deaa19643676816ce391551e9
1
Analyze the following code function for security vulnerabilities
LibraryInfo findLibraryOnClasspathWithZipDirectoryEntryScan(String libraryName, String localePrefix, String contract, FacesContext ctx, boolean forceScan) { return classpathResource...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findLibraryOnClasspathWithZipDirectoryEntryScan File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
findLibraryOnClasspathWithZipDirectoryEntryScan
impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
protected void updateParamsForAuth(String[] authNames, List<Pair> queryParams, Map<String, String> headerParams, Map<String, String> cookieParams, String payload, String method, URI uri) throws ApiException { for (String authName : authNames) { Authentication auth = authen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateParamsForAuth File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateParamsForAuth
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public Map<String, Http.MultipartFormData.FilePart<?>> files() { return Collections.unmodifiableMap( super.files().entrySet().stream() .collect(Collectors.toMap(e -> asNormalKey(e.getKey()), e -> e.getValue()))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: files File: web/play-java-forms/src/main/java/play/data/DynamicForm.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
files
web/play-java-forms/src/main/java/play/data/DynamicForm.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
public void finishInstrumentation(IApplicationThread target, int resultCode, Bundle results) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(target != null ? ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishInstrumentation File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
finishInstrumentation
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private int runList() { String type = nextArg(); if (type == null) { System.err.println("Error: didn't specify type of data to list"); return 1; } if ("package".equals(type) || "packages".equals(type)) { return runListPackages(false); } else if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runList File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runList
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
public static void setCommonOutputProperties(final Transformer transformer, final boolean indentOutput) throws TransformerConfigurationException { transformer.setOutputProperty(OutputKeys.METHOD, XML); transformer.setOutputProperty(OutputKeys.ENCODING, UTF_8); transformer.setOutputPr...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000651 - Severity: HIGH - CVSS Score: 7.5 Description: gh-813 Turn on secure processing feature for XML parsers etc Function: setCommonOutputProperties File: stroom-core-server/src/main/java/stroom/entity/server/util/XMLUtil.java Repository: gchq/stroom F...
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
setCommonOutputProperties
stroom-core-server/src/main/java/stroom/entity/server/util/XMLUtil.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
1
Analyze the following code function for security vulnerabilities
public CELLTYPE getCell(Object propertyId) { CELLTYPE cell = cells.get(propertyId); Set<CELLTYPE> cellGroup = getCellGroupForCell(cell); if (cellGroup != null) { cell = cellGroups.get(cellGroup); } return cell; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCell File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getCell
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public boolean hasUserDemotedInvalidMsgApp(String pkg, int uid) { try { return sINM.hasUserDemotedInvalidMsgApp(pkg, uid); } catch (Exception e) { Log.w(TAG, "Error calling NoMan", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasUserDemotedInvalidMsgApp File: src/com/android/settings/notification/NotificationBackend.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
hasUserDemotedInvalidMsgApp
src/com/android/settings/notification/NotificationBackend.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
private void writeDescriptions(CellReference cell, JsonObject descriptions) { if (cellDescriptionGenerator != null) { String description = cellDescriptionGenerator .getDescription(cell); put(columnKeys.key(cell.getPropertyId()), descrip...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeDescriptions File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
writeDescriptions
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private Publisher<Object> buildCacheInvalidatePublisher( MethodInvocationContext<Object, Object> context, CacheOperation cacheOperation, List<AnnotationValue<CacheInvalidate>> invalidateOperations) { final Flowable<Object> originalFlowable = Publishers.convertPublisher(contex...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildCacheInvalidatePublisher File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
buildCacheInvalidatePublisher
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@JsonProperty("Name") public String getName() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getName
base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { try { return toJSON(); } catch (Exception e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toString
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public Map<String, Object> getData() { return data; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getData File: web/play-java-forms/src/main/java/play/data/DynamicForm.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
getData
web/play-java-forms/src/main/java/play/data/DynamicForm.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { int hashCode = 1; hashCode = 31 * hashCode + sourceUserId; hashCode = 31 * hashCode + uri.hashCode(); hashCode = 31 * hashCode + (prefix ? 1231 : 1237); return hashCode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
hashCode
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public abstract BaseXMLBuilder d(String data);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: d File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
d
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public void endElement(String namespaceURI, String localName, String qName) throws SAXException { appendChar = false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endElement File: src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33950
HIGH
7.5
openkm/document-management-system
endElement
src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java
ce1d82329615aea6aa9f2cc6508c1fe7891e34b5
0
Analyze the following code function for security vulnerabilities
public static void reinitializeSession(VaadinRequest request) { WrappedSession oldSession = request.getWrappedSession(); // Stores all attributes (security key, reference to this context // instance) so they can be added to the new session Set<String> attributeNames = oldSession.getAttr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reinitializeSession File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
reinitializeSession
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
@Override public Object makeTransformPerspective(float fovy, float aspect, float zNear, float zFar) { return CN1Matrix4f.makePerspective(fovy, aspect, zNear, zFar); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeTransformPerspective File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
makeTransformPerspective
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public void saveAttachmentContent(XWikiAttachment attachment, XWikiContext context) throws XWikiException { saveAttachmentContent(attachment, true, true, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAttachmentContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
saveAttachmentContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void updateSilverStatistics(final String componentId, final String function, final T component) { // notify silverstatistics if (componentId != null && function.equals("Main") || function.startsWith("searchResult") || function.startsWith("portlet") || function.equals("GoToFilesTab")) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSilverStatistics File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
updateSilverStatistics
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public static Map<Thread,StackTraceElement[]> dumpAllThreads() { Map<Thread,StackTraceElement[]> sorted = new TreeMap<Thread,StackTraceElement[]>(new ThreadSorter()); sorted.putAll(Thread.getAllStackTraces()); return sorted; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpAllThreads File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
dumpAllThreads
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
protected Number _nonNullNumber(Number n) { if (n == null) { n = Integer.valueOf(0); } return n; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _nonNullNumber File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_nonNullNumber
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
protected String getSidebarUserMenu(Map<String, Object> data) { String html = "<ul class=\"user-menu nav nav-tabs nav-stacked main-menu\">"; if ((Boolean) data.get("is_logged_in")) { User user = (User) data.get("user"); String email = user.getEmail(); if (email == nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSidebarUserMenu File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
getSidebarUserMenu
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_APPS_CONTROL, conditional = true) @SupportsCoexistence public void setUserControlDisabledPackages(@Nullable ComponentName admin, @NonNull List<String> packages) { throwIfParentInstance("setUserControlDisabledPackages"); if (mService !=...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserControlDisabledPackages File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setUserControlDisabledPackages
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKey(String apiKey) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKey(apiKey); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKey File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKey
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void unwhitelistThreads() { whitelistedThreads.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unwhitelistThreads File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
unwhitelistThreads
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
@Test public void resetForgottenPassword(TestUtils setup) throws Exception { setup.loginAsSuperAdmin(); String userName = "testUser" + RandomStringUtils.randomAlphanumeric(6); String password = "password"; String newPassword = "newPassword"; // Create a user set...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2021-32731 - Severity: MEDIUM - CVSS Score: 5.0 Description: XWIKI-18400: Wrong message after reset password Function: resetForgottenPassword File: xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration...
[ "CWE-200" ]
CVE-2021-32731
MEDIUM
5
xwiki/xwiki-platform
resetForgottenPassword
xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java
0cf716250b3645a5974c80d8336dcdf885749dff
1
Analyze the following code function for security vulnerabilities
IPage<SysUser> getUserByDepId(Page page, @Param("departId") String departId, @Param("username") String username);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByDepId File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByDepId
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
protected OortComet findComet(String cometURL) { return _membership.findComet(cometURL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findComet File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
findComet
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
public int getRequestedPasswordMinimumUpperCase(int userId) { return getDevicePolicyManager().getPasswordMinimumUpperCase(null, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestedPasswordMinimumUpperCase File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getRequestedPasswordMinimumUpperCase
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Override protected void afterFeaturesReceived() throws SecurityRequiredException, NotConnectedException, InterruptedException { StartTls startTlsFeature = getFeature(StartTls.ELEMENT, StartTls.NAMESPACE); if (startTlsFeature != null) { if (startTlsFeature.required() && config.getSecurit...
Vulnerability Classification: - CWE: CWE-362 - CVE: CVE-2016-10027 - Severity: MEDIUM - CVSS Score: 4.3 Description: Move TLS Required check at the end of connect() It was a *very* bad idea to perform the SecurityMode.Required check in the connection's reader thread and not at the end of AbstractXMPPConnectin's conne...
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
afterFeaturesReceived
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
1
Analyze the following code function for security vulnerabilities
public void setKeyguardIndicationController( KeyguardIndicationController keyguardIndicationController) { mIndicationController = keyguardIndicationController; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyguardIndicationController File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setKeyguardIndicationController
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void removeAllHelperUtilities() { _helperUtilitiesMaps.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeAllHelperUtilities File: portal-impl/src/com/liferay/portal/template/TemplateContextHelper.java Repository: samuelkong/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2963
MEDIUM
4.3
samuelkong/liferay-portal
removeAllHelperUtilities
portal-impl/src/com/liferay/portal/template/TemplateContextHelper.java
5db1f7622e8e2c9a559ef0145a0f04c5854a1e8b
0
Analyze the following code function for security vulnerabilities
private void readFieldValues(EmulatedFieldsForLoading emulatedFields) throws OptionalDataException, InvalidClassException, IOException { EmulatedFields.ObjectSlot[] slots = emulatedFields.emulatedFields().slots(); for (ObjectSlot element : slots) { element.defaulted = false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readFieldValues File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readFieldValues
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void incrementDownvotes() { if (this.downvotes == null) { this.downvotes = 1L; } else { this.downvotes = this.downvotes + 1L; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: incrementDownvotes File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
incrementDownvotes
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public void setOldestFileModificationTime(long oldestFileModificationTime) { this.oldestFileModificationTime = oldestFileModificationTime; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOldestFileModificationTime File: src/main/java/emissary/pickup/WorkBundle.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
setOldestFileModificationTime
src/main/java/emissary/pickup/WorkBundle.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
@MediumTest @Test public void testAutoSpeakerphoneOutgoingTransmitOnly() throws Exception { // Start an incoming video call. IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212", mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA, VideoProfile.ST...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 2...
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testAutoSpeakerphoneOutgoingTransmitOnly
tests/src/com/android/server/telecom/tests/VideoCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
public int getXWikiPreferenceAsInt(String preference, String fallbackParameter, int defaultValue, XWikiContext context) { return NumberUtils.toInt(getXWikiPreference(preference, fallbackParameter, "", context), defaultValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXWikiPreferenceAsInt File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getXWikiPreferenceAsInt
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private SessionFactory injectInSessionFactory(Configuration config) throws XWikiException { return config.buildSessionFactory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectInSessionFactory File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
injectInSessionFactory
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Beta public static String getNameWithoutExtension(String file) { checkNotNull(file); String fileName = new File(file).getName(); int dotIndex = fileName.lastIndexOf('.'); return (dotIndex == -1) ? fileName : fileName.substring(0, dotIndex); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNameWithoutExtension File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
getNameWithoutExtension
android/guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
@Override public Media createMedia(final String uri, boolean isVideo, final Runnable onCompletion) throws IOException { if (getActivity() == null) { return null; } if(!uri.startsWith(FileSystemStorage.getInstance().getAppHomePath())) { if(!checkForPermission(Manifest....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createMedia File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createMedia
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
boolean removeProcessLocked(ProcessRecord app, boolean callerWillRestart, boolean allowRestart, String reason) { final String name = app.processName; final int uid = app.uid; if (DEBUG_PROCESSES) Slog.d(TAG_PROCESSES, "Force removing proc " + app.toShortString() + " (" + ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeProcessLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
removeProcessLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private static Optional<MemoryAppender> getMemoryAppender(Configuration config) { return config.getAppenders().values().stream().filter(MemoryAppender.class::isInstance).map(MemoryAppender.class::cast).findFirst(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMemoryAppender File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
getMemoryAppender
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder e(String name) { return element(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: e File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
e
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public void setBoundSqlInterceptor(BoundSqlInterceptor boundSqlInterceptor) { this.boundSqlInterceptor = boundSqlInterceptor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBoundSqlInterceptor File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
setBoundSqlInterceptor
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
private final void sendPackageBroadcastLocked(int cmd, String[] packages, int userId) { for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { ProcessRecord r = mLruProcesses.get(i); if (r.thread != null && (userId == UserHandle.USER_ALL || r.userId == userId)) { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendPackageBroadcastLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
sendPackageBroadcastLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void setTradeType(String tradeType) { this.tradeType = tradeType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTradeType File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setTradeType
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@Override public int getImportance(String pkg, int uid) { enforceSystemOrSystemUI("Caller not system or systemui"); return mRankingHelper.getImportance(pkg, uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImportance File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
getImportance
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@POST @Path("discardMediaPackage") @RestQuery(name = "discardMediaPackage", description = "Discard a media package", restParameters = { @RestParameter(description = "Given media package to be destroyed", isRequired = true, name = "mediaPackage", type = RestParameter.Type.TEXT) }, reponses = { @RestRespons...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: discardMediaPackage File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
discardMediaPackage
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
private void notifyStartedWakingUp() { if (DEBUG) Log.d(TAG, "notifyStartedWakingUp"); mHandler.sendEmptyMessage(NOTIFY_STARTED_WAKING_UP); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyStartedWakingUp File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
notifyStartedWakingUp
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public void addImplicitCollection(Class ownerType, String fieldName) { addImplicitCollection(ownerType, fieldName, null, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addImplicitCollection File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
addImplicitCollection
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private String libraryNameFromContracts(String libraryName, List<String> contracts) { // If the library name is equal to one of the contracts, // assume the resource to be found is within that contract for (String contract : contracts) { if (contract.equals(libraryName)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: libraryNameFromContracts File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
libraryNameFromContracts
impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
private static ZygoteState openZygoteSocketIfNeeded(String abi) throws ZygoteStartFailedEx { if (primaryZygoteState == null || primaryZygoteState.isClosed()) { try { primaryZygoteState = ZygoteState.connect(ZYGOTE_SOCKET); } catch (IOException ioe) { throw...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openZygoteSocketIfNeeded File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
openZygoteSocketIfNeeded
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public void changeSendCompression(ICompressor comp) { tc.changeSendCompression(comp); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: changeSendCompression File: src/main/java/com/trilead/ssh2/transport/TransportManager.java Repository: connectbot/sshlib The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
connectbot/sshlib
changeSendCompression
src/main/java/com/trilead/ssh2/transport/TransportManager.java
5c8b534f6e97db7ac0e0e579331213aa25c173ab
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(USE_FINGERPRINT) public List<Fingerprint> getEnrolledFingerprints(int userId) { if (mService != null) try { return mService.getEnrolledFingerprints(userId, mContext.getOpPackageName()); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEnrolledFingerprints File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getEnrolledFingerprints
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public void unlockScreen() { if (wakeLock != null && wakeLock.isHeld()) { wakeLock.release(); wakeLock = null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unlockScreen File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
unlockScreen
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
default Optional<ZonedDateTime> findDate(CharSequence name) { try { return findFirst(name).map((str) -> { LocalDateTime localDateTime = LocalDateTime.parse(str, DateTimeFormatter.RFC_1123_DATE_TIME); return ZonedDateTime.of(localDateTime, ZoneId.of("GMT")); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findDate File: http/src/main/java/io/micronaut/http/HttpHeaders.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
findDate
http/src/main/java/io/micronaut/http/HttpHeaders.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Override public void normalize() { doc.normalize(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: normalize File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
normalize
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
protected boolean isDoubleQuotedExecutableEscaped() { return doubleQuotedExecutableEscaped; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDoubleQuotedExecutableEscaped File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
isDoubleQuotedExecutableEscaped
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
private void addAttachmentAndUpdateView(Uri contentUri) { if (contentUri == null) { return; } try { if (handleSpecialAttachmentUri(contentUri)) { return; } addAttachmentAndUpdateView(mAttachmentsView.generateLocalAttachment(conten...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachmentAndUpdateView File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
addAttachmentAndUpdateView
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void setProviderMetadata(final OIDCProviderMetadata providerMetadata) { this.providerMetadata = providerMetadata; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProviderMetadata File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java Repository: pac4j The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-44878
MEDIUM
5
pac4j
setProviderMetadata
pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
22b82ffd702a132d9f09da60362fc6264fc281ae
0
Analyze the following code function for security vulnerabilities
public ApiClient setDateFormat(DateFormat dateFormat) { this.dateFormat = dateFormat; // also set the date format for model (de)serialization with Date properties this.json.setDateFormat((DateFormat) dateFormat.clone()); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDateFormat File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setDateFormat
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected final void refreshUi() { final long diff = SystemClock.elapsedRealtime() - mLastUiRefresh; if (diff > Config.REFRESH_UI_INTERVAL) { mRefreshUiHandler.removeCallbacks(mRefreshUiRunnable); runOnUiThread(mRefreshUiRunnable); } else { final long next = Config.REFRESH_UI_INTERVAL - diff; mRefresh...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshUi File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
refreshUi
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public void requestSmAcknowledgement() throws StreamManagementNotEnabledException, NotConnectedException, InterruptedException { if (!isSmEnabled()) { throw new StreamManagementException.StreamManagementNotEnabledException(); } requestSmAcknowledgementInternal(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestSmAcknowledgement File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
requestSmAcknowledgement
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public void setLockScreenShown(boolean keyguardShowing, boolean aodShowing) { if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER) != PackageManager.PERMISSION_GRANTED) { throw new SecurityException("Requires permission " + android.Ma...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLockScreenShown File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
setLockScreenShown
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public void pushInputSource(XMLInputSource inputSource) { final Reader reader = getReader(inputSource); fCurrentEntityStack.push(fCurrentEntity); String encoding = inputSource.getEncoding(); String publicId = inputSource.getPublicId(); String baseSystemId = inputSource.getBaseSystemId...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushInputSource File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
pushInputSource
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0