instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void execute(String jobToken, JobContext jobContext) { execute(jobToken, jobContext.getLogger(), jobContext); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
execute
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") final boolean updateOomAdjLocked(ProcessRecord app, boolean oomAdjAll) { final ActivityRecord TOP_ACT = resumedAppLocked(); final ProcessRecord TOP_APP = TOP_ACT != null ? TOP_ACT.app : null; final boolean wasCached = app.cached; mAdjSeq++; // This is the desired cached adjusment we want to tell it to use. // If our app is currently cached, we know it, and that is it. Otherwise, // we don't know it yet, and it needs to now be cached we will then // need to do a complete oom adj. final int cachedAdj = app.curRawAdj >= ProcessList.CACHED_APP_MIN_ADJ ? app.curRawAdj : ProcessList.UNKNOWN_ADJ; boolean success = updateOomAdjLocked(app, cachedAdj, TOP_APP, false, SystemClock.uptimeMillis()); if (oomAdjAll && (wasCached != app.cached || app.curRawAdj == ProcessList.UNKNOWN_ADJ)) { // Changed to/from cached state, so apps after it in the LRU // list may also be changed. updateOomAdjLocked(); } return success; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOomAdjLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
updateOomAdjLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public Optional<String> getDatabase() { return hasPreferredDatabase() ? Optional.of(this.config.getDatabase()) : Optional.empty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDatabase File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
getDatabase
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
protected MapSession updateTTL(MapSession session, boolean updateTTL) { if (updateTTL) { session.setLastAccessedTime(Instant.now()); cache.put(session.getId(), session, session.getMaxInactiveInterval().getSeconds(), TimeUnit.SECONDS); } return session; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTTL File: spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java Repository: infinispan The code follows secure coding practices.
[ "CWE-384" ]
CVE-2019-10158
HIGH
7.5
infinispan
updateTTL
spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java
f3efef8de7fec4108dd5ab725cea6ae09f14815d
0
Analyze the following code function for security vulnerabilities
static void boostPriorityForLockedSection() { if (sIsBoosted.get() == 0) { // boost to prio 118 while holding a global lock Process.setThreadPriority(Process.myTid(), -2); //Log.e(TAG, "PRIORITY BOOST: set priority on TID " + Process.myTid()); } int cur = sIsBoosted.get(); sIsBoosted.set(cur + 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: boostPriorityForLockedSection File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
boostPriorityForLockedSection
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public void waitForAllWindowsDrawn(Runnable callback, long timeout) { synchronized (mWindowMap) { mWaitingForDrawnCallback = callback; final WindowList windows = getDefaultWindowListLocked(); for (int winNdx = windows.size() - 1; winNdx >= 0; --winNdx) { final WindowState win = windows.get(winNdx); final boolean isForceHiding = mPolicy.isForceHiding(win.mAttrs); if (win.isVisibleLw() && (win.mAppToken != null || isForceHiding)) { win.mWinAnimator.mDrawState = WindowStateAnimator.DRAW_PENDING; // Force add to mResizingWindows. win.mLastContentInsets.set(-1, -1, -1, -1); mWaitingForDrawn.add(win); // No need to wait for the windows below Keyguard. if (isForceHiding) { break; } } } requestTraversalLocked(); } mH.removeMessages(H.WAITING_FOR_DRAWN_TIMEOUT); if (mWaitingForDrawn.isEmpty()) { callback.run(); } else { mH.sendEmptyMessageDelayed(H.WAITING_FOR_DRAWN_TIMEOUT, timeout); checkDrawnWindowsLocked(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: waitForAllWindowsDrawn File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
waitForAllWindowsDrawn
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public boolean shouldOverrideUrlLoading(WebView view, String url) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldOverrideUrlLoading File: android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java Repository: mozilla-mobile/mozilla-vpn-client The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-29978
HIGH
10
mozilla-mobile/mozilla-vpn-client
shouldOverrideUrlLoading
android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java
c8440f464a2f5c4e7d4990152ee5850df8b23f42
0
Analyze the following code function for security vulnerabilities
@Override public boolean isUserRunning(int userId, int flags) { if (!mUserController.isSameProfileGroup(userId, UserHandle.getCallingUserId()) && checkCallingPermission(INTERACT_ACROSS_USERS) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: isUserRunning() from pid=" + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() + " requires " + INTERACT_ACROSS_USERS; Slog.w(TAG, msg); throw new SecurityException(msg); } return mUserController.isUserRunning(userId, flags); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUserRunning File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
isUserRunning
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void updateRowId(@Positive int columnIndex, @Nullable RowId x) throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "updateRowId(int, RowId)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateRowId File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateRowId
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public void endHeader(HeaderLevel level, String id, Map<String, String> parameters) { getXHTMLWikiPrinter().printXMLEndElement("span"); getXHTMLWikiPrinter().printXMLEndElement("h" + level.getAsInt()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endHeader File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
endHeader
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
Association startAssociationLocked(int sourceUid, String sourceProcess, int targetUid, ComponentName targetComponent, String targetProcess) { if (!mTrackingAssociations) { return null; } ArrayMap<ComponentName, SparseArray<ArrayMap<String, Association>>> components = mAssociations.get(targetUid); if (components == null) { components = new ArrayMap<>(); mAssociations.put(targetUid, components); } SparseArray<ArrayMap<String, Association>> sourceUids = components.get(targetComponent); if (sourceUids == null) { sourceUids = new SparseArray<>(); components.put(targetComponent, sourceUids); } ArrayMap<String, Association> sourceProcesses = sourceUids.get(sourceUid); if (sourceProcesses == null) { sourceProcesses = new ArrayMap<>(); sourceUids.put(sourceUid, sourceProcesses); } Association ass = sourceProcesses.get(sourceProcess); if (ass == null) { ass = new Association(sourceUid, sourceProcess, targetUid, targetComponent, targetProcess); sourceProcesses.put(sourceProcess, ass); } ass.mCount++; ass.mNesting++; if (ass.mNesting == 1) { ass.mStartTime = SystemClock.uptimeMillis(); } return ass; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startAssociationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startAssociationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
CharSequence toCharSequence() { return sanitizedJson != null ? sanitizedJson : jsonish; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toCharSequence File: src/main/java/com/google/json/JsonSanitizer.java Repository: OWASP/json-sanitizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-13973
MEDIUM
4.3
OWASP/json-sanitizer
toCharSequence
src/main/java/com/google/json/JsonSanitizer.java
53ceaac3e0a10e86d512ce96a0056578f2d1978f
0
Analyze the following code function for security vulnerabilities
protected Record checkoutRecord(Cell[] row, ID defaultOwning) { Record recordHub = EntityHelper.forNew(rule.getToEntity().getEntityCode(), defaultOwning); // 解析数据 RecordCheckout recordCheckout = new RecordCheckout(rule.getFiledsMapping()); Record checkout = recordCheckout.checkout(recordHub, row); if (recordCheckout.getTraceLogs().isEmpty()) { cellTraces = null; } else { cellTraces = StringUtils.join(recordCheckout.getTraceLogs(), ", "); } // 检查重复 if (rule.getRepeatOpt() < ImportRule.REPEAT_OPT_IGNORE) { final ID repeat = findRepeatedRecordId(rule.getRepeatFields(), recordHub); if (repeat != null && rule.getRepeatOpt() == ImportRule.REPEAT_OPT_SKIP) { return null; } if (repeat != null && rule.getRepeatOpt() == ImportRule.REPEAT_OPT_UPDATE) { // 更新 checkout = EntityHelper.forUpdate(repeat, defaultOwning); for (Iterator<String> iter = recordHub.getAvailableFieldIterator(); iter.hasNext(); ) { String field = iter.next(); if (MetadataHelper.isCommonsField(field)) continue; checkout.setObjectValue(field, recordHub.getObjectValue(field)); } } } // Verify new record // Throws DataSpecificationException if (checkout.getPrimary() == null) { new EntityRecordCreator(rule.getToEntity(), JSONUtils.EMPTY_OBJECT, null) .verify(checkout); } return checkout; }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-1613 - Severity: MEDIUM - CVSS Score: 4.0 Description: fix: #596 Function: checkoutRecord File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java Repository: getrebuild/rebuild Fixed Code: protected Record checkoutRecord(Cell[] row, ID defaultOwning) { Record recordHub = EntityHelper.forNew(rule.getToEntity().getEntityCode(), defaultOwning); // 解析数据 RecordCheckout recordCheckout = new RecordCheckout(rule.getFiledsMapping()); Record checkout = recordCheckout.checkout(recordHub, row); if (recordCheckout.getTraceLogs().isEmpty()) { cellTraces = null; } else { cellTraces = StringUtils.join(recordCheckout.getTraceLogs(), ", "); } // 检查重复 if (rule.getRepeatOpt() < ImportRule.REPEAT_OPT_IGNORE) { final ID repeat = findRepeatedRecordId(rule.getRepeatFields(), recordHub); if (repeat != null && rule.getRepeatOpt() == ImportRule.REPEAT_OPT_SKIP) { return null; } if (repeat != null && rule.getRepeatOpt() == ImportRule.REPEAT_OPT_UPDATE) { // 更新 checkout = EntityHelper.forUpdate(repeat, defaultOwning); for (Iterator<String> iter = recordHub.getAvailableFieldIterator(); iter.hasNext(); ) { String field = iter.next(); if (MetadataHelper.isCommonsField(field)) continue; checkout.setObjectValue(field, recordHub.getObjectValue(field)); } } } // Verify new record // Throws DataSpecificationException if (checkout.getPrimary() == null) { new EntityRecordCreator(rule.getToEntity(), JSONUtils.EMPTY_OBJECT, null, Boolean.FALSE) .verify(checkout); } return checkout; }
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
checkoutRecord
src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
d422c1b9c0f6970bf7af0257a2c6b0f8be535963
1
Analyze the following code function for security vulnerabilities
@Override public void onUserInput() { mUpdateMonitor.cancelFaceAuth(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserInput File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
onUserInput
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
@Override public boolean isComplianceAcknowledgementRequired() { final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(isProfileOwnerOfOrganizationOwnedDevice(caller)); enforceUserUnlocked(caller.getUserId()); synchronized (getLockObject()) { final ActiveAdmin admin = getProfileOwnerLocked(caller.getUserId()); return admin.mProfileOffDeadline != 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isComplianceAcknowledgementRequired File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isComplianceAcknowledgementRequired
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean updateIntentVerificationStatus(String packageName, int status, int userId) { mContext.enforceCallingOrSelfPermission( android.Manifest.permission.SET_PREFERRED_APPLICATIONS, null); boolean result = false; synchronized (mPackages) { result = mSettings.updateIntentFilterVerificationStatusLPw(packageName, status, userId); } if (result) { scheduleWritePackageRestrictionsLocked(userId); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateIntentVerificationStatus File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
updateIntentVerificationStatus
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public boolean removeTask(int taskId) { enforceCallerIsRecentsOrHasPermission(REMOVE_TASKS, "removeTask()"); synchronized (this) { final long ident = Binder.clearCallingIdentity(); try { return mStackSupervisor.removeTaskByIdLocked(taskId, true, REMOVE_FROM_RECENTS, "remove-task"); } finally { Binder.restoreCallingIdentity(ident); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
removeTask
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public Response processPrepareTransaction(TransactionInfo info) throws Exception { TransportConnectionState cs = lookupConnectionState(info.getConnectionId()); context = null; if (cs != null) { context = cs.getContext(); } if (cs == null) { throw new NullPointerException("Context is null"); } TransactionState transactionState = cs.getTransactionState(info.getTransactionId()); if (transactionState == null) { throw new IllegalStateException("Cannot prepare a transaction that had not been started or previously returned XA_RDONLY: " + info.getTransactionId()); } // Avoid dups. if (!transactionState.isPrepared()) { transactionState.setPrepared(true); int result = broker.prepareTransaction(context, info.getTransactionId()); transactionState.setPreparedResult(result); if (result == XAResource.XA_RDONLY) { // we are done, no further rollback or commit from TM cs.removeTransactionState(info.getTransactionId()); } IntegerResponse response = new IntegerResponse(result); return response; } else { IntegerResponse response = new IntegerResponse(transactionState.getPreparedResult()); return response; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processPrepareTransaction File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processPrepareTransaction
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
void clearAnimatingFlags() { boolean wallpaperMightChange = false; for (int i = mChildren.size() - 1; i >= 0; i--) { final WindowState win = mChildren.get(i); wallpaperMightChange |= win.clearAnimatingFlags(); } if (wallpaperMightChange) { requestUpdateWallpaperIfNeeded(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearAnimatingFlags File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
clearAnimatingFlags
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
protected void setWasAuthenticated() { // Never reset the flag if the connection has ever been authenticated if (!wasAuthenticated) { wasAuthenticated = authenticated; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWasAuthenticated File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
setWasAuthenticated
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public byte[] read() throws IOException { Closer closer = Closer.create(); try { FileInputStream in = closer.register(openStream()); return ByteStreams.toByteArray(in, in.getChannel().size()); } catch (Throwable e) { throw closer.rethrow(e); } finally { closer.close(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
read
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
void buildFieldDescriptors(Field[] declaredFields) { // We could find the field ourselves in the collection, but calling // reflect is easier. Optimize if needed. final Field f = ObjectStreamClass.fieldSerialPersistentFields(this.forClass()); // If we could not find the emulated fields, we'll have to compute // dumpable fields from reflect fields boolean useReflectFields = f == null; // Assume we will compute the // fields to dump based on the // reflect fields ObjectStreamField[] _fields = null; if (!useReflectFields) { // The user declared a collection of emulated fields. Use them. // We have to be able to fetch its value, even if it is private f.setAccessible(true); try { // static field, pass null _fields = (ObjectStreamField[]) f.get(null); } catch (IllegalAccessException ex) { throw new AssertionError(ex); } } else { // Compute collection of dumpable fields based on reflect fields List<ObjectStreamField> serializableFields = new ArrayList<ObjectStreamField>(declaredFields.length); // Filter, we are only interested in fields that are serializable for (Field declaredField : declaredFields) { int modifiers = declaredField.getModifiers(); if (!Modifier.isStatic(modifiers) && !Modifier.isTransient(modifiers)) { ObjectStreamField field = new ObjectStreamField(declaredField.getName(), declaredField.getType()); serializableFields.add(field); } } if (serializableFields.size() == 0) { _fields = NO_FIELDS; // If no serializable fields, share the // special value so that users can test } else { _fields = serializableFields.toArray(new ObjectStreamField[serializableFields.size()]); } } Arrays.sort(_fields); // assign offsets int primOffset = 0, objectOffset = 0; for (int i = 0; i < _fields.length; i++) { Class<?> type = _fields[i].getType(); if (type.isPrimitive()) { _fields[i].offset = primOffset; primOffset += primitiveSize(type); } else { _fields[i].offset = objectOffset++; } } fields = _fields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildFieldDescriptors File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
buildFieldDescriptors
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void finishSubActivity(IBinder token, String resultWho, int requestCode) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); data.writeString(resultWho); data.writeInt(requestCode); mRemote.transact(FINISH_SUB_ACTIVITY_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishSubActivity File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
finishSubActivity
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
void destroy() { try { if (sDebug) Slog.d(TAG, "destroy()"); throwIfDestroyed(); mListener.onDestroy(); mHandler.removeCallbacksAndMessages(mListener); mDialog.dismiss(); mDestroyed = true; } finally { mOverlayControl.showOverlays(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-610" ]
CVE-2023-40133
MEDIUM
5.5
android
destroy
services/autofill/java/com/android/server/autofill/ui/SaveUi.java
08becc8c600f14c5529115cc1a1e0c97cd503f33
0
Analyze the following code function for security vulnerabilities
public static String xmlEscape(String s) { return Util.xmlEscape(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xmlEscape File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
xmlEscape
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public void setVrThread(int tid) { enforceSystemHasVrFeature(); synchronized (this) { synchronized (mPidsSelfLocked) { final int pid = Binder.getCallingPid(); final ProcessRecord proc = mPidsSelfLocked.get(pid); mVrController.setVrThreadLocked(tid, pid, proc); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVrThread File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setVrThread
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public HashMap<String, Object> getData() { return mData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getData File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3883
MEDIUM
4.3
android
getData
src/java/com/android/internal/telephony/SMSDispatcher.java
b2c89e6f8962dc7aff88cb38aa3ee67d751edda9
0
Analyze the following code function for security vulnerabilities
private String getUpgradeSqlBasePath() { return PathKit.getWebRootPath() + "/WEB-INF/update-sql"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUpgradeSqlBasePath File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getUpgradeSqlBasePath
web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public void updateObject(String space, String page, String className, int objectNumber, Map<String, ?> properties) { gotoPage(space, page, "save", toQueryParameters(className, objectNumber, properties)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateObject File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
updateObject
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public String getOrganizationId(String mediaPackageId) throws NotFoundException, SearchServiceDatabaseException { EntityManager em = null; EntityTransaction tx = null; try { em = emf.createEntityManager(); tx = em.getTransaction(); tx.begin(); SearchEntity searchEntity = getSearchEntity(mediaPackageId, em); if (searchEntity == null) throw new NotFoundException("No media package with id=" + mediaPackageId + " exists"); // Ensure this user is allowed to read this media package String accessControlXml = searchEntity.getAccessControl(); if (accessControlXml != null) { AccessControlList acl = AccessControlParser.parseAcl(accessControlXml); User currentUser = securityService.getUser(); Organization currentOrg = securityService.getOrganization(); if (!AccessControlUtil.isAuthorized(acl, currentUser, currentOrg, READ.toString())) throw new UnauthorizedException(currentUser + " is not authorized to read media package " + mediaPackageId); } return searchEntity.getOrganization().getId(); } catch (NotFoundException e) { throw e; } catch (Exception e) { logger.error("Could not get deletion date {}: {}", mediaPackageId, e.getMessage()); if (tx.isActive()) { tx.rollback(); } throw new SearchServiceDatabaseException(e); } finally { if (em != null) em.close(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrganizationId File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
getOrganizationId
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
private int getAggregatedPasswordComplexityLocked(@UserIdInt int userHandle) { return getAggregatedPasswordComplexityLocked(userHandle, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAggregatedPasswordComplexityLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAggregatedPasswordComplexityLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public CompoundRequestMapper add(IRequestMapper mapper) { if (mapper instanceof ResourceMapper && !(mapper instanceof BaseResourceMapper)) throw new GeneralException("Base resource mapper should be used"); return super.add(mapper); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: add File: server-core/src/main/java/io/onedev/server/web/BaseUrlMapper.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
add
server-core/src/main/java/io/onedev/server/web/BaseUrlMapper.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
@Override void handleReturnCode() { // If mArgs is null, then MCS couldn't be reached. When it // reconnects, it will try again to install. At that point, this // will succeed. if (mArgs != null) { processPendingInstall(mArgs, mRet); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleReturnCode File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
handleReturnCode
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public List<SegmentRecord> queryByTraceId(String traceId) throws IOException { List<SegmentRecord> segmentRecords = new ArrayList<>(); try (Connection connection = h2Client.getConnection()) { try (ResultSet resultSet = h2Client.executeQuery( connection, "select * from " + SegmentRecord.INDEX_NAME + " where " + SegmentRecord.TRACE_ID + " = ?", traceId )) { while (resultSet.next()) { SegmentRecord segmentRecord = new SegmentRecord(); segmentRecord.setSegmentId(resultSet.getString(SegmentRecord.SEGMENT_ID)); segmentRecord.setTraceId(resultSet.getString(SegmentRecord.TRACE_ID)); segmentRecord.setServiceId(resultSet.getString(SegmentRecord.SERVICE_ID)); segmentRecord.setServiceInstanceId(resultSet.getString(SegmentRecord.SERVICE_INSTANCE_ID)); segmentRecord.setEndpointName(resultSet.getString(SegmentRecord.ENDPOINT_NAME)); segmentRecord.setStartTime(resultSet.getLong(SegmentRecord.START_TIME)); segmentRecord.setEndTime(resultSet.getLong(SegmentRecord.END_TIME)); segmentRecord.setLatency(resultSet.getInt(SegmentRecord.LATENCY)); segmentRecord.setIsError(resultSet.getInt(SegmentRecord.IS_ERROR)); String dataBinaryBase64 = resultSet.getString(SegmentRecord.DATA_BINARY); if (!Strings.isNullOrEmpty(dataBinaryBase64)) { segmentRecord.setDataBinary(Base64.getDecoder().decode(dataBinaryBase64)); } segmentRecord.setVersion(resultSet.getInt(SegmentRecord.VERSION)); segmentRecords.add(segmentRecord); } } } catch (SQLException e) { throw new IOException(e); } return segmentRecords; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryByTraceId File: oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2TraceQueryDAO.java Repository: apache/skywalking The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-13921
HIGH
7.5
apache/skywalking
queryByTraceId
oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2TraceQueryDAO.java
ddb6d9a5019a9c1fe31c364485a4e4b5066fefc3
0
Analyze the following code function for security vulnerabilities
public Locale getCurrentLocale(String langname) { Locale currentLocale = langutils.getProperLocale(langname); if (currentLocale == null) { currentLocale = langutils.getProperLocale(langutils.getDefaultLanguageCode()); } return currentLocale; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentLocale File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getCurrentLocale
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public static void execute(String settingsTomlFilePath) { HttpServer server; try { server = HttpServer.create(new InetSocketAddress(9295), 0); } catch (IOException e) { throw ErrorUtil.createCommandException("error occurred while creating the server: " + e.getMessage() + "Access token is missing in " + settingsTomlFilePath + "\nAuto update failed. Please visit https://central.ballerina.io, get token and add it to the" + settingsTomlFilePath + " file."); } server.createContext("/update-settings", new TokenUpdateHandler()); server.setExecutor(null); // creates a default executor server.start(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/TokenUpdater.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
execute
cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/TokenUpdater.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
@Override public long getItemId(int position) { return position; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getItemId File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
getItemId
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
public String getInternalProperty(String propname) { String methodName = "get" + StringUtils.capitalize(propname); try { Method method = getClass().getDeclaredMethod(methodName, (Class[]) null); return (String) method.invoke(this, (Object[]) null); } catch (Exception e) { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInternalProperty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getInternalProperty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Deprecated @InlineMe( replacement = "Files.asCharSource(file, charset).read()", imports = "com.google.common.io.Files") public static String toString(File file, Charset charset) throws IOException { return asCharSource(file, charset).read(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
toString
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public ReferenceDTO getReference(ApiScenarioRequest request) { ReferenceDTO dto = new ReferenceDTO(); dto.setScenarioList(extApiScenarioMapper.selectReference(request)); QueryTestPlanRequest planRequest = new QueryTestPlanRequest(); planRequest.setScenarioId(request.getId()); planRequest.setProjectId(request.getProjectId()); dto.setTestPlanList(extTestPlanMapper.selectTestPlanByRelevancy(planRequest)); return dto; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getReference File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getReference
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public ParceledListSlice<NotificationChannelGroup> getGroups(String pkg, int uid) { try { return sINM.getNotificationChannelGroupsForPackage(pkg, uid, false); } catch (Exception e) { Log.w(TAG, "Error calling NoMan", e); return ParceledListSlice.emptyList(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGroups File: src/com/android/settings/notification/NotificationBackend.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
getGroups
src/com/android/settings/notification/NotificationBackend.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
public PrivateKey generatePrivate(PrivateKeyInfo keyInfo) throws IOException { ASN1ObjectIdentifier algOid = keyInfo.getPrivateKeyAlgorithm().getAlgorithm(); if (algOid.equals(PKCSObjectIdentifiers.dhKeyAgreement)) { return new BCDHPrivateKey(keyInfo); } else if (algOid.equals(X9ObjectIdentifiers.dhpublicnumber)) { return new BCDHPrivateKey(keyInfo); } else { throw new IOException("algorithm identifier " + algOid + " in key not recognised"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generatePrivate File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/KeyFactorySpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-310" ]
CVE-2016-1000339
MEDIUM
5
bcgit/bc-java
generatePrivate
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/KeyFactorySpi.java
413b42f4d770456508585c830cfcde95f9b0e93b
0
Analyze the following code function for security vulnerabilities
public void toXML(OutputTarget out, boolean bWithObjects, boolean bWithRendering, boolean bWithAttachmentContent, boolean bWithVersions, boolean format, String encoding) throws XWikiException { // Input DocumentInstanceInputProperties documentProperties = new DocumentInstanceInputProperties(); documentProperties.setWithWikiObjects(bWithObjects); documentProperties.setWithWikiDocumentContentHTML(bWithRendering); documentProperties.setWithWikiAttachmentsContent(bWithAttachmentContent); documentProperties.setWithJRCSRevisions(bWithVersions); documentProperties.setWithRevisions(false); // Output XAROutputProperties xarProperties = new XAROutputProperties(); xarProperties.setPreserveVersion(bWithVersions); xarProperties.setEncoding(encoding); xarProperties.setFormat(format); xarProperties.setTarget(out); toXML(documentProperties, xarProperties); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toXML File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
toXML
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void setPageInfo(String currentUri, Map<String, Object> data, int currentPage) { setAttr("yurl", currentUri); Integer total = (Integer) data.get("total"); if (total != null) { setAttr("data", data); if (total > 1) { setAttr("pager", PagerUtil.generatorPager(currentUri, currentPage, total)); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPageInfo File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
setPageInfo
web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
private void internalSkipAllMessagesForNonPartitionedTopic(AsyncResponse asyncResponse, String subName, boolean authoritative) { try { validateTopicOwnership(topicName, authoritative); validateTopicOperation(topicName, TopicOperation.SKIP, subName); PersistentTopic topic = (PersistentTopic) getTopicReference(topicName); BiConsumer<Void, Throwable> biConsumer = (v, ex) -> { if (ex != null) { asyncResponse.resume(new RestException(ex)); log.error("[{}] Failed to skip all messages {} {}", clientAppId(), topicName, subName, ex); } else { asyncResponse.resume(Response.noContent().build()); log.info("[{}] Cleared backlog on {} {}", clientAppId(), topicName, subName); } }; if (subName.startsWith(topic.getReplicatorPrefix())) { String remoteCluster = PersistentReplicator.getRemoteCluster(subName); PersistentReplicator repl = (PersistentReplicator) topic.getPersistentReplicator(remoteCluster); if (repl == null) { asyncResponse.resume(new RestException(Status.NOT_FOUND, "Subscription not found")); return; } repl.clearBacklog().whenComplete(biConsumer); } else { PersistentSubscription sub = topic.getSubscription(subName); if (sub == null) { asyncResponse.resume(new RestException(Status.NOT_FOUND, "Subscription not found")); return; } sub.clearBacklog().whenComplete(biConsumer); } } catch (WebApplicationException wae) { if (log.isDebugEnabled()) { log.debug("[{}] Failed to skip all messages for subscription on topic {}," + " redirecting to other brokers.", clientAppId(), topicName, wae); } resumeAsyncResponseExceptionally(asyncResponse, wae); } catch (Exception e) { log.error("[{}] Failed to skip all messages for subscription {} on topic {}", clientAppId(), subName, topicName, e); resumeAsyncResponseExceptionally(asyncResponse, e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalSkipAllMessagesForNonPartitionedTopic File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalSkipAllMessagesForNonPartitionedTopic
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
@Override public void listRemovedRepositories(String projectName, AsyncMethodCallback resultHandler) { handle(() -> projectManager.get(projectName).repos().listRemoved().keySet(), resultHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listRemovedRepositories File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java Repository: line/centraldogma The code follows secure coding practices.
[ "CWE-862" ]
CVE-2021-38388
MEDIUM
6.5
line/centraldogma
listRemovedRepositories
server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("ResultOfMethodCallIgnored") private static void deleteFileQuietly(File file) { file.delete(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteFileQuietly File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java Repository: gradle The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35946
MEDIUM
5.5
gradle
deleteFileQuietly
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
0
Analyze the following code function for security vulnerabilities
@Override public void onIconClicked(boolean rightIcon) { if (mHintAnimationRunning) { return; } mHintAnimationRunning = true; mAffordanceHelper.startHintAnimation(rightIcon, new Runnable() { @Override public void run() { mHintAnimationRunning = false; mStatusBar.onHintFinished(); } }); rightIcon = getLayoutDirection() == LAYOUT_DIRECTION_RTL ? !rightIcon : rightIcon; if (rightIcon) { mStatusBar.onCameraHintStarted(); } else { if (mKeyguardBottomArea.isLeftVoiceAssist()) { mStatusBar.onVoiceAssistHintStarted(); } else { mStatusBar.onPhoneHintStarted(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onIconClicked File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onIconClicked
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
protected void textImpl(String value, boolean replaceText) { // Issue 10: null text values cause exceptions on subsequent call to // Transformer to render document, so we fail-fast here on bad data. if (value == null) { throw new IllegalArgumentException("Illegal null text value"); } if (replaceText) { xmlNode.setTextContent(value); } else { xmlNode.appendChild(getDocument().createTextNode(value)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: textImpl File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
textImpl
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public int getFrontActivityScreenCompatMode() throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); mRemote.transact(GET_FRONT_ACTIVITY_SCREEN_COMPAT_MODE_TRANSACTION, data, reply, 0); reply.readException(); int mode = reply.readInt(); reply.recycle(); data.recycle(); return mode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFrontActivityScreenCompatMode File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getFrontActivityScreenCompatMode
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
protected String parseFilterPaths(final String text, final boolean web, final boolean file) { return split(text, "\n").get(stream -> stream.map(String::trim).filter(StringUtil::isNotBlank).map(s -> { return getFilterPath(s); }).filter(s -> { if (StringUtil.isBlank(s)) { return false; } if (Arrays.stream(webProtocols).anyMatch(p -> s.startsWith(p))) { return web; } if (Arrays.stream(fileProtocols).anyMatch(p -> s.startsWith(p))) { return file; } return true; }).collect(Collectors.joining("\n"))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseFilterPaths File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java Repository: codelibs/fess The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000822
HIGH
7.5
codelibs/fess
parseFilterPaths
src/main/java/org/codelibs/fess/util/GsaConfigParser.java
faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7
0
Analyze the following code function for security vulnerabilities
@Override public void doPost(HttpServletRequest request, HttpServletResponse response) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doPost File: HeatMapServer/src/com/datformers/servlet/HeatMapServlet.java Repository: ssn2013/cis450Project The code follows secure coding practices.
[ "CWE-89" ]
CVE-2015-10020
MEDIUM
5.2
ssn2013/cis450Project
doPost
HeatMapServer/src/com/datformers/servlet/HeatMapServlet.java
39b495011437a105c7670e17e071f99195b4922e
0
Analyze the following code function for security vulnerabilities
public void overridePendingTransition(IBinder token, String packageName, int enterAnim, int exitAnim) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); data.writeString(packageName); data.writeInt(enterAnim); data.writeInt(exitAnim); mRemote.transact(OVERRIDE_PENDING_TRANSITION_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: overridePendingTransition File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
overridePendingTransition
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public List<PolicyConstraintValue> getConstraints() { return constraints; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConstraints File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getConstraints
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public void write(OutputStream stream, String encoding) throws XarException { XMLStreamWriter writer; try { writer = XMLOutputFactory.newInstance().createXMLStreamWriter(stream, encoding); } catch (Exception e) { throw new XarException("Failed to create an instance of XML stream writer", e); } writer = new IndentingXMLStreamWriter(writer); try { writer.writeStartDocument(encoding, "1.0"); write(writer); writer.writeEndDocument(); writer.flush(); } catch (Exception e) { throw new XarException("Failed to write XML", e); } finally { try { writer.close(); } catch (XMLStreamException e) { throw new XarException("Failed to close XML writer", e); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
write
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
private void interceptPowerKeyUp(KeyEvent event, boolean interactive, boolean canceled) { final boolean handled = canceled || mPowerKeyHandled; mScreenshotChordPowerKeyTriggered = false; cancelPendingScreenshotChordAction(); cancelPendingPowerKeyAction(); if (!handled) { // Figure out how to handle the key now that it has been released. mPowerKeyPressCounter += 1; final int maxCount = getMaxMultiPressPowerCount(); final long eventTime = event.getDownTime(); if (mPowerKeyPressCounter < maxCount) { // This could be a multi-press. Wait a little bit longer to confirm. // Continue holding the wake lock. Message msg = mHandler.obtainMessage(MSG_POWER_DELAYED_PRESS, interactive ? 1 : 0, mPowerKeyPressCounter, eventTime); msg.setAsynchronous(true); mHandler.sendMessageDelayed(msg, ViewConfiguration.getDoubleTapTimeout()); return; } // No other actions. Handle it immediately. powerPress(eventTime, interactive, mPowerKeyPressCounter); } // Done. Reset our state. finishPowerKeyPress(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: interceptPowerKeyUp File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
interceptPowerKeyUp
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { int hash = 5; hash = 67 * hash + (this.cacheTimestamp ? 1 : 0); hash = 67 * hash + (this.enableMissingResourceLibraryDetection ? 1 : 0); return hash; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-6950
MEDIUM
4.3
eclipse-ee4j/mojarra
hashCode
impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java
cefbb9447e7be560e59da2da6bd7cb93776f7741
0
Analyze the following code function for security vulnerabilities
public String getSpaceCopyright(XWikiContext context) { return getSpacePreference("webcopyright", "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSpaceCopyright File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getSpaceCopyright
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public IActivityContainer createVirtualActivityContainer(IBinder parentActivityToken, IActivityContainerCallback callback) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(parentActivityToken); data.writeStrongBinder(callback == null ? null : callback.asBinder()); mRemote.transact(CREATE_VIRTUAL_ACTIVITY_CONTAINER_TRANSACTION, data, reply, 0); reply.readException(); final int result = reply.readInt(); final IActivityContainer res; if (result == 1) { res = IActivityContainer.Stub.asInterface(reply.readStrongBinder()); } else { res = null; } data.recycle(); reply.recycle(); return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createVirtualActivityContainer File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
createVirtualActivityContainer
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public void dumpHeapFinished(String path) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeString(path); mRemote.transact(DUMP_HEAP_FINISHED_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpHeapFinished File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
dumpHeapFinished
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public String getDatabase() { return this.database; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDatabase File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getDatabase
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void mergeXClass(XWikiDocument templatedoc) { BaseClass bclass = getXClass(); BaseClass tbclass = templatedoc.getXClass(); if (tbclass != null) { if (bclass == null) { setXClass(tbclass.clone()); } else { getXClass().merge(tbclass.clone()); } } setMetaDataDirty(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeXClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
mergeXClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void join(JoinBy from, JoinBy to, String operation, String joinType, CQLWrapper cr, Handler<AsyncResult<ResultSet>> replyHandler){ String filter = ""; if(cr != null){ filter = cr.toString(); } join(from, to, operation, joinType, filter, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: join File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
join
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public static NativeArray jsFunction_getPerAppSubscribers(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws APIManagementException { NativeArray myn = new NativeArray(0); return myn; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_getPerAppSubscribers File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_getPerAppSubscribers
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
void getTasksLocked(int maxNum, List<RunningTaskInfo> list, int callingUid, boolean allowed) { // Gather all of the running tasks for each stack into runningTaskLists. ArrayList<ArrayList<RunningTaskInfo>> runningTaskLists = new ArrayList<ArrayList<RunningTaskInfo>>(); final int numDisplays = mActivityDisplays.size(); for (int displayNdx = 0; displayNdx < numDisplays; ++displayNdx) { ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks; for (int stackNdx = stacks.size() - 1; stackNdx >= 0; --stackNdx) { final ActivityStack stack = stacks.get(stackNdx); ArrayList<RunningTaskInfo> stackTaskList = new ArrayList<>(); runningTaskLists.add(stackTaskList); stack.getTasksLocked(stackTaskList, callingUid, allowed); } } // The lists are already sorted from most recent to oldest. Just pull the most recent off // each list and add it to list. Stop when all lists are empty or maxNum reached. while (maxNum > 0) { long mostRecentActiveTime = Long.MIN_VALUE; ArrayList<RunningTaskInfo> selectedStackList = null; final int numTaskLists = runningTaskLists.size(); for (int stackNdx = 0; stackNdx < numTaskLists; ++stackNdx) { ArrayList<RunningTaskInfo> stackTaskList = runningTaskLists.get(stackNdx); if (!stackTaskList.isEmpty()) { final long lastActiveTime = stackTaskList.get(0).lastActiveTime; if (lastActiveTime > mostRecentActiveTime) { mostRecentActiveTime = lastActiveTime; selectedStackList = stackTaskList; } } } if (selectedStackList != null) { list.add(selectedStackList.remove(0)); --maxNum; } else { break; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTasksLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
getTasksLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public Configuration getTaskConfiguration() { return taskConfiguration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTaskConfiguration File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-20914
CRITICAL
9.8
sanluan/PublicCMS
getTaskConfiguration
publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae
0
Analyze the following code function for security vulnerabilities
private ArrayMap<String, ArrayList<String>> getOrAllocate(int userId) { ArrayMap<String, ArrayList<String>> map = mUidMap.get(userId); if (map == null) { map = new ArrayMap<String, ArrayList<String>>(); mUidMap.put(userId, map); } return map; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrAllocate File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getOrAllocate
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static boolean isValidFatFilename(String name) { return (name != null) && name.equals(buildValidFatFilename(name)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidFatFilename File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
isValidFatFilename
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public void setMarshallerProperties(Map<String, ?> properties) { this.marshallerProperties = properties; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMarshallerProperties File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
setMarshallerProperties
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
@Override public boolean checkPlaybackActiveState(boolean expected) { if (mPlaybackState == null) { return false; } return mPlaybackState.isActive() == expected; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPlaybackActiveState File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
checkPlaybackActiveState
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
@Override public void topAppWindowChanged(boolean showMenu) { if (SPEW) { Log.d(TAG, (showMenu?"showing":"hiding") + " the MENU button"); } // See above re: lights-out policy for legacy apps. if (showMenu) setLightsOn(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: topAppWindowChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
topAppWindowChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
protected PutMethod executePut(String uri, String string, String mediaType) throws Exception { HttpClient httpClient = new HttpClient(); PutMethod putMethod = new PutMethod(uri); RequestEntity entity = new StringRequestEntity(string, mediaType, "UTF-8"); putMethod.setRequestEntity(entity); httpClient.executeMethod(putMethod); return putMethod; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executePut File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-352" ]
CVE-2023-37277
CRITICAL
9.6
xwiki/xwiki-platform
executePut
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java
4c175405faa0e62437df397811c7526dfc0fbae7
0
Analyze the following code function for security vulnerabilities
public JSONObject put(String key, Object value) throws JSONException { if (key == null) { throw new NullPointerException("Null key."); } if (value != null) { testValidity(value); this.map.put(key, value); } else { this.remove(key); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
put
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
@Nullable public void setSecretKey(String secretKey) { this.secretKey = secretKey; }
Vulnerability Classification: - CWE: CWE-312 - CVE: CVE-2021-29481 - Severity: MEDIUM - CVSS Score: 5.0 Description: Add nullable annotations Function: setSecretKey File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java Repository: ratpack Fixed Code: public void setSecretKey(@Nullable String secretKey) { this.secretKey = secretKey; }
[ "CWE-312" ]
CVE-2021-29481
MEDIUM
5
ratpack
setSecretKey
ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java
4aa8d0e529812144330093aabd788ff1ffecbd9a
1
Analyze the following code function for security vulnerabilities
@Override public void tempAllowWhileInUsePermissionInFgs(int uid, long durationMs) { mFgsWhileInUseTempAllowList.add(uid, durationMs, ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempAllowWhileInUsePermissionInFgs File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
tempAllowWhileInUsePermissionInFgs
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String getLine1AlphaTag() { return getLine1AlphaTagForSubscriber(getDefaultSubscription()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLine1AlphaTag File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getLine1AlphaTag
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
protected final Object _deserializeWithErrorWrapping(JsonParser p, DeserializationContext ctxt, SettableBeanProperty prop) throws IOException { try { return prop.deserialize(p, ctxt); } catch (Exception e) { wrapAndThrow(e, _beanType.getRawClass(), prop.getName(), ctxt); // never gets here, unless caller declines to throw an exception return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _deserializeWithErrorWrapping File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42004
HIGH
7.5
FasterXML/jackson-databind
_deserializeWithErrorWrapping
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
063183589218fec19a9293ed2f17ec53ea80ba88
0
Analyze the following code function for security vulnerabilities
public String getURL(EntityReference reference, String action, String queryString) { return getURL(reference, action, queryString, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURL File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getURL
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public String getHelpFile() { return "/help/security/private-realm.html"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHelpFile File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-2064
MEDIUM
5
jenkinsci/jenkins
getHelpFile
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
fbf96734470caba9364f04e0b77b0bae7293a1ec
0
Analyze the following code function for security vulnerabilities
boolean fetchRemoteUuids(BluetoothDevice device) { enforceCallingOrSelfPermission(BLUETOOTH_PERM, "Need BLUETOOTH permission"); mRemoteDevices.fetchUuids(device); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchRemoteUuids File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
fetchRemoteUuids
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public static boolean shouldShowPackageForIndicatorCached(@NonNull Context context, @NonNull String packageName) { return !getIndicatorExemptedPackages(context).contains(packageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldShowPackageForIndicatorCached File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
shouldShowPackageForIndicatorCached
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public void readSetEnd() throws TException {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readSetEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readSetEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public Version[] getRevisions(XWikiContext context) throws XWikiException { return getVersioningStore(context).getXWikiDocVersions(this, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRevisions File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRevisions
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void handleProcessStartOrKillTimeoutLocked(ProcessRecord app, boolean isKillTimeout) { final int pid = app.getPid(); boolean gone = isKillTimeout || removePidIfNoThreadLocked(app); if (gone) { if (isKillTimeout) { // It's still alive... maybe blocked at uninterruptible sleep ? final ProcessRecord successor = app.mSuccessor; if (successor == null) { // There might be a race, nothing to do here. return; } Slog.wtf(TAG, app.toString() + " " + app.getDyingPid() + " refused to die while trying to launch " + successor + ", cancelling the process start"); // It doesn't make sense to proceed with launching the new instance while the old // instance is still alive, abort the launch. app.mSuccessorStartRunnable = null; app.mSuccessor = null; successor.mPredecessor = null; // We're going to cleanup the successor process record, which wasn't started at all. app = successor; } else { final String msg = "Process " + app + " failed to attach"; Slog.w(TAG, msg); EventLogTags.writeAmProcessStartTimeout(app.userId, pid, app.uid, app.processName); if (app.getActiveInstrumentation() != null) { final Bundle info = new Bundle(); info.putString("shortMsg", "failed to attach"); info.putString("longMsg", msg); finishInstrumentationLocked(app, Activity.RESULT_CANCELED, info); } } synchronized (mProcLock) { mProcessList.removeProcessNameLocked(app.processName, app.uid); mAtmInternal.clearHeavyWeightProcessIfEquals(app.getWindowProcessController()); // Take care of any launching providers waiting for this process. mCpHelper.cleanupAppInLaunchingProvidersLocked(app, true); // Take care of any services that are waiting for the process. mServices.processStartTimedOutLocked(app); if (!isKillTimeout) { mBatteryStatsService.noteProcessFinish(app.processName, app.info.uid); app.killLocked("start timeout", ApplicationExitInfo.REASON_INITIALIZATION_FAILURE, true); removeLruProcessLocked(app); } if (app.isolated) { mBatteryStatsService.removeIsolatedUid(app.uid, app.info.uid); mProcessList.mAppExitInfoTracker.mIsolatedUidRecords.removeIsolatedUid( app.uid, app.info.uid); getPackageManagerInternal().removeIsolatedUid(app.uid); } } final BackupRecord backupTarget = mBackupTargets.get(app.userId); if (!isKillTimeout && backupTarget != null && backupTarget.app.getPid() == pid) { Slog.w(TAG, "Unattached app died before backup, skipping"); final int userId = app.userId; final String packageName = app.info.packageName; mHandler.post(new Runnable() { @Override public void run(){ try { IBackupManager bm = IBackupManager.Stub.asInterface( ServiceManager.getService(Context.BACKUP_SERVICE)); bm.agentDisconnectedForUser(userId, packageName); } catch (RemoteException e) { // Can't happen; the backup manager is local } } }); } if (!isKillTimeout) { if (isPendingBroadcastProcessLocked(pid)) { Slog.w(TAG, "Unattached app died before broadcast acknowledged, skipping"); skipPendingBroadcastLocked(pid); } } else { if (isPendingBroadcastProcessLocked(app)) { skipCurrentReceiverLocked(app); } } } else { Slog.w(TAG, "Spurious process start timeout - pid not known for " + app); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleProcessStartOrKillTimeoutLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
handleProcessStartOrKillTimeoutLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public int getMaxRequestSize() { return getIntProperty(TS_MAX_REQUEST_SIZE, 6553500); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxRequestSize File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getMaxRequestSize
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
final void add(Iterable<? extends Entry<? extends CharSequence, String>> headers) { if (headers == this) { throw new IllegalArgumentException("can't add to itself."); } if (!addFast(headers)) { addSlow(headers); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: add File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
add
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public void onAttachmentDeleted() { mAttachmentsChanged = true; // If we are showing any attachments, make sure we have an upper // divider. mQuotedTextView.setUpperDividerVisible(mAttachmentsView.getAttachments().size() > 0); updateSaveUi(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAttachmentDeleted File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onAttachmentDeleted
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Nullable public abstract Object convertToObject(List<String> strings);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToObject File: server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-94" ]
CVE-2021-21248
MEDIUM
6.5
theonedev/onedev
convertToObject
server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java
39d95ab8122c5d9ed18e69dc024870cae08d2d60
0
Analyze the following code function for security vulnerabilities
public static boolean verifySignature(Response samlResponse) { if ((samlResponse != null) && (!samlResponse.isSigned() || (!samlResponse.isSignatureValid()))) { return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifySignature File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
verifySignature
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
public boolean isJsonMime(String mime) { String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$"; return mime != null && (mime.matches(jsonMime) || mime.equals("*/*")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isJsonMime File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
isJsonMime
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private Syntax getCurrentContentSyntaxInternal(XWikiContext context) { Syntax syntax = null; // Try to find the current syntax if (getRenderingContext() != null) { Block curentBlock = getRenderingContext().getCurrentBlock(); if (curentBlock != null) { MetaDataBlock metaDataBlock = curentBlock.getFirstBlock(new MetadataBlockMatcher(MetaData.SYNTAX), Axes.ANCESTOR_OR_SELF); if (metaDataBlock != null) { return (Syntax) metaDataBlock.getMetaData().getMetaData(MetaData.SYNTAX); } } } // Fallback on secure and current document in the context if (context.get("sdoc") != null) { // The content document syntax = ((XWikiDocument) context.get("sdoc")).getSyntax(); } else if (context.getDoc() != null) { // The context document syntax = context.getDoc().getSyntax(); } return syntax; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentContentSyntaxInternal File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getCurrentContentSyntaxInternal
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public static void initializeObject(Object instance) { if (instance == null) return; Unsafe.getUnsafe0().ensureClassInitialized(instance.getClass()); ObjectInitializer.initializer().accept(instance); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initializeObject File: api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java Repository: Karlatemp/UnsafeAccessor The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-31139
MEDIUM
4.3
Karlatemp/UnsafeAccessor
initializeObject
api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java
4ef83000184e8f13239a1ea2847ee401d81585fd
0
Analyze the following code function for security vulnerabilities
@Override public int getServerPort() { return 80; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServerPort File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getServerPort
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public void reInit(Conversation conversation, Bundle extras) { QuickLoader.set(conversation.getUuid()); this.saveMessageDraftStopAudioPlayer(); this.clearPending(); if (this.reInit(conversation, extras != null)) { if (extras != null) { processExtras(extras); } this.reInitRequiredOnStart = false; } else { this.reInitRequiredOnStart = true; pendingExtras.push(extras); } resetUnreadMessagesCount(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reInit File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
reInit
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public boolean supports(AuthenticationToken token) { return token instanceof JSONWebToken; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supports File: dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java Repository: ManyDesigns/Portofino The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-29451
MEDIUM
6.4
ManyDesigns/Portofino
supports
dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java
8c754a0ad234555e813dcbf9e57d637f9f23d8fb
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition lt(ComparableFunction<T> value) { Condition conditionLocal = new LtCondition<T>(selector, selector.generateParameter(value)); return getOnGoingLogicalCondition(conditionLocal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lt File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
lt
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
public void aliasPackage(String name, String pkgName) { if (packageAliasingMapper == null) { throw new com.thoughtworks.xstream.InitializationException("No " + PackageAliasingMapper.class.getName() + " available"); } packageAliasingMapper.addPackageAlias(name, pkgName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aliasPackage File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
aliasPackage
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private boolean isGlobalSettingsKey(int key) { return getTypeFromKey(key) == SETTINGS_TYPE_GLOBAL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isGlobalSettingsKey File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isGlobalSettingsKey
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
private void writeEndElement(final TransformerHandler th, final String name) throws SAXException { th.endElement("", name, name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeEndElement File: stroom-core-server/src/main/java/stroom/importexport/server/Config.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
writeEndElement
stroom-core-server/src/main/java/stroom/importexport/server/Config.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
@Override public Optional<Runnable> handleNode(StateNode node, JsonObject invocationJson) { assert invocationJson .hasKey(JsonConstants.RPC_TEMPLATE_EVENT_METHOD_NAME); String methodName = invocationJson .getString(JsonConstants.RPC_TEMPLATE_EVENT_METHOD_NAME); if (methodName == null) { throw new IllegalArgumentException( "Event handler method name may not be null"); } JsonValue args = invocationJson .get(JsonConstants.RPC_TEMPLATE_EVENT_ARGS); if (args == null) { args = Json.createArray(); } if (args.getType() != JsonType.ARRAY) { throw new IllegalArgumentException( "Incorrect type for method arguments: " + args.getClass()); } int promiseId; if (invocationJson.hasKey(JsonConstants.RPC_TEMPLATE_EVENT_PROMISE)) { promiseId = (int) invocationJson .getNumber(JsonConstants.RPC_TEMPLATE_EVENT_PROMISE); } else { promiseId = -1; } assert node.hasFeature(ComponentMapping.class); Optional<Component> component = ComponentMapping.getComponent(node); if (!component.isPresent()) { throw new IllegalStateException( "Unable to handle RPC template event JSON message: " + "there is no component available for the target node"); } boolean execute = node.isEnabled(); if (!execute) { ClientCallableHandlers clientDelegate = node .getFeature(ClientCallableHandlers.class); PolymerServerEventHandlers eventHandlers = node .getFeature(PolymerServerEventHandlers.class); if (clientDelegate.hasHandler(methodName)) { execute = DisabledUpdateMode.ALWAYS.equals( clientDelegate.getDisabledUpdateMode(methodName)); } if (eventHandlers.hasHandler(methodName)) { execute = execute || DisabledUpdateMode.ALWAYS.equals( eventHandlers.getDisabledUpdateMode(methodName)); } } if (execute) { invokeMethod(component.get(), component.get().getClass(), methodName, (JsonArray) args, promiseId, node.isInert()); } return Optional.empty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleNode File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25500
MEDIUM
4.3
vaadin/flow
handleNode
flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
1fa4976902a117455bf2f98b191f8c80692b53c8
0