instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { int result = Objects.hash(name); result = 31 * result + Arrays.hashCode(paramTypes); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: server/src/main/java/com/thoughtworks/go/remote/AgentRemoteInvokerServiceExporter.java Repository: gocd The code follows secure coding practices.
[ "CWE-284" ]
CVE-2022-39310
MEDIUM
6.5
gocd
hashCode
server/src/main/java/com/thoughtworks/go/remote/AgentRemoteInvokerServiceExporter.java
a644a7e5ed75d7b9e46f164fb83445f778077cf9
0
Analyze the following code function for security vulnerabilities
private void flushChannelIgnoreFailure(StreamSinkChannel stream) { try { flushChannel(stream); } catch (IOException e) { UndertowLogger.REQUEST_IO_LOGGER.ioException(e); } catch (Throwable t) { UndertowLogger.REQUEST_IO_LOGGER.handleUnexpectedFailure(t); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flushChannelIgnoreFailure File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
flushChannelIgnoreFailure
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
public PageSummary toRestPageSummary(URI baseUri, Document doc, Boolean withPrettyNames) throws XWikiException { PageSummary pageSummary = this.objectFactory.createPageSummary(); toRestPageSummary(pageSummary, baseUri, doc, false, withPrettyNames); String pageUri = Utils.createURI(baseUri, PageResource.class, doc.getWiki(), Utils.getSpacesFromSpaceId(doc.getSpace()), doc.getDocumentReference().getName()).toString(); Link pageLink = this.objectFactory.createLink(); pageLink.setHref(pageUri); pageLink.setRel(Relations.PAGE); pageSummary.getLinks().add(pageLink); return pageSummary; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toRestPageSummary File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-35151
HIGH
7.5
xwiki/xwiki-platform
toRestPageSummary
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java
824cd742ecf5439971247da11bfe7e0ad2b10ede
0
Analyze the following code function for security vulnerabilities
@Override public void dismissPip(boolean animate, int animationDuration) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "dismissPip()"); final long ident = Binder.clearCallingIdentity(); try { synchronized (this) { final PinnedActivityStack stack = mStackSupervisor.getDefaultDisplay().getPinnedStack(); if (stack == null) { Slog.w(TAG, "dismissPip: pinned stack not found."); return; } if (stack.getWindowingMode() != WINDOWING_MODE_PINNED) { throw new IllegalArgumentException("Stack: " + stack + " doesn't support animated resize."); } if (animate) { stack.animateResizePinnedStack(null /* sourceHintBounds */, null /* destBounds */, animationDuration, false /* fromFullscreen */); } else { mStackSupervisor.moveTasksToFullscreenStackLocked(stack, true /* onTop */); } } } finally { Binder.restoreCallingIdentity(ident); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissPip File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dismissPip
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void readMessageEnd() throws TException {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readMessageEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readMessageEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@Override public int onStartCommand(Intent intent, int flags, int startId) { Log_OC.d(TAG, "Starting command with id " + startId); startForeground(FOREGROUND_SERVICE_ID, mNotification); if (intent == null) { Log_OC.e(TAG, "Intent is null"); return Service.START_NOT_STICKY; } if (!intent.hasExtra(KEY_ACCOUNT)) { Log_OC.e(TAG, "Not enough information provided in intent"); return Service.START_NOT_STICKY; } final Account account = intent.getParcelableExtra(KEY_ACCOUNT); if (account == null) { return Service.START_NOT_STICKY; } Optional<User> optionalUser = accountManager.getUser(account.name); if (!optionalUser.isPresent()) { return Service.START_NOT_STICKY; } final User user = optionalUser.get(); boolean retry = intent.getBooleanExtra(KEY_RETRY, false); List<String> requestedUploads = new ArrayList<>(); boolean onWifiOnly = intent.getBooleanExtra(KEY_WHILE_ON_WIFI_ONLY, false); boolean whileChargingOnly = intent.getBooleanExtra(KEY_WHILE_CHARGING_ONLY, false); if (!retry) { // Start new uploads if (!(intent.hasExtra(KEY_LOCAL_FILE) || intent.hasExtra(KEY_FILE))) { Log_OC.e(TAG, "Not enough information provided in intent"); return Service.START_NOT_STICKY; } Integer error = gatherAndStartNewUploads(intent, user, requestedUploads, onWifiOnly, whileChargingOnly); if (error != null) { return error; } } else { // Retry uploads if (!intent.hasExtra(KEY_ACCOUNT) || !intent.hasExtra(KEY_RETRY_UPLOAD)) { Log_OC.e(TAG, "Not enough information provided in intent: no KEY_RETRY_UPLOAD_KEY"); return START_NOT_STICKY; } retryUploads(intent, user, requestedUploads); } if (requestedUploads.size() > 0) { Message msg = mServiceHandler.obtainMessage(); msg.arg1 = startId; msg.obj = requestedUploads; mServiceHandler.sendMessage(msg); sendBroadcastUploadsAdded(); } return Service.START_NOT_STICKY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStartCommand File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
onStartCommand
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
private List<DocumentSection> getSections10() { // Pattern to match the title. Matches only level 1 and level 2 headings. Pattern headingPattern = Pattern.compile("^[ \\t]*+(1(\\.1){0,1}+)[ \\t]++(.++)$", Pattern.MULTILINE); Matcher matcher = headingPattern.matcher(getContent()); List<DocumentSection> splitSections = new ArrayList<DocumentSection>(); int sectionNumber = 0; // find title to split while (matcher.find()) { ++sectionNumber; String sectionLevel = matcher.group(1); String sectionTitle = matcher.group(3); int sectionIndex = matcher.start(); // Initialize a documentSection object. DocumentSection docSection = new DocumentSection(sectionNumber, sectionIndex, sectionLevel, sectionTitle); // Add the document section to list. splitSections.add(docSection); } return splitSections; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSections10 File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getSections10
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void handleConnectionServiceDeath() { if (!mPendingResponses.isEmpty()) { CreateConnectionResponse[] responses = mPendingResponses.values().toArray( new CreateConnectionResponse[mPendingResponses.values().size()]); mPendingResponses.clear(); for (int i = 0; i < responses.length; i++) { responses[i].handleCreateConnectionFailure( new DisconnectCause(DisconnectCause.ERROR, "CS_DEATH")); } } mCallIdMapper.clear(); if (mConnSvrFocusListener != null) { mConnSvrFocusListener.onConnectionServiceDeath(this); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleConnectionServiceDeath File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
handleConnectionServiceDeath
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public ModalDialog clearContent() { gridContentContainer.removeAll(); if (autoGenerateGridBuilder == true) { gridBuilder = new GridBuilder(gridContentContainer, "flowform"); } initFeedback(gridContentContainer); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearContent File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
clearContent
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
boolean startHomeActivityLocked(int userId, String reason) { if (mFactoryTest == FactoryTest.FACTORY_TEST_LOW_LEVEL && mTopAction == null) { // We are running in factory test mode, but unable to find // the factory test app, so just sit around displaying the // error message and don't try to start anything. return false; } Intent intent = getHomeIntent(); ActivityInfo aInfo = resolveActivityInfo(intent, STOCK_PM_FLAGS, userId); if (aInfo != null) { intent.setComponent(new ComponentName( aInfo.applicationInfo.packageName, aInfo.name)); // Don't do this if the home app is currently being // instrumented. aInfo = new ActivityInfo(aInfo); aInfo.applicationInfo = getAppInfoForUser(aInfo.applicationInfo, userId); ProcessRecord app = getProcessRecordLocked(aInfo.processName, aInfo.applicationInfo.uid, true); if (app == null || app.instrumentationClass == null) { intent.setFlags(intent.getFlags() | Intent.FLAG_ACTIVITY_NEW_TASK); mStackSupervisor.startHomeActivity(intent, aInfo, reason); } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startHomeActivityLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startHomeActivityLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void removeAllStanzaAcknowledgedListeners() { stanzaAcknowledgedListeners.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeAllStanzaAcknowledgedListeners File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
removeAllStanzaAcknowledgedListeners
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDefaultNamespace(final String namespaceURI) { throw new UnsupportedOperationException("DomNode.isDefaultNamespace is not yet implemented."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDefaultNamespace File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
isDefaultNamespace
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private CacheKeyGenerator getKeyGenerator(Class<? extends CacheKeyGenerator> alternateKeyGen) { CacheKeyGenerator keyGenerator = defaultKeyGenerator; if (alternateKeyGen != null && defaultKeyGenerator.getClass() != alternateKeyGen) { keyGenerator = resolveKeyGenerator(alternateKeyGen); } return keyGenerator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeyGenerator File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getKeyGenerator
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
protected final boolean _shortOverflow(int value) { return (value < Short.MIN_VALUE || value > Short.MAX_VALUE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _shortOverflow File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_shortOverflow
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("rawtypes") private EventCRFDAO ecdao() { return new EventCRFDAO(dataSource); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ecdao File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
ecdao
web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
@Override public void endFigureCaption(Map<String, String> parameters) { // See beginFigureCaption() getXHTMLWikiPrinter().printXMLEndElement(HTMLConstants.TAG_DIV); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endFigureCaption File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
endFigureCaption
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public Api get(String name) { return getPlugin(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
get
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public String getLaunchedFromPackage(IBinder activityToken) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(activityToken); mRemote.transact(GET_LAUNCHED_FROM_PACKAGE_TRANSACTION, data, reply, 0); reply.readException(); String result = reply.readString(); data.recycle(); reply.recycle(); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchedFromPackage File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getLaunchedFromPackage
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private static String deriveAbiOverride(String abiOverride, PackageSetting settings) { String cpuAbiOverride = null; if (NativeLibraryHelper.CLEAR_ABI_OVERRIDE.equals(abiOverride)) { cpuAbiOverride = null; } else if (abiOverride != null) { cpuAbiOverride = abiOverride; } else if (settings != null) { cpuAbiOverride = settings.cpuAbiOverrideString; } return cpuAbiOverride; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deriveAbiOverride File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
deriveAbiOverride
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public int getCurrentFailedPasswordAttempts( String callerPackageName, int userHandle, boolean parent) { if (!mLockPatternUtils.hasSecureLockScreen()) { return 0; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHandle)); synchronized (getLockObject()) { if (!isSystemUid(caller)) { // This API can be called by an active device admin or by keyguard code. if (!hasCallingPermission(permission.ACCESS_KEYGUARD_SECURE_STORAGE)) { if (isPermissionCheckFlagEnabled()) { int affectedUser = parent ? getProfileParentId(userHandle) : userHandle; enforcePermission(MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS, callerPackageName, affectedUser); } else { getActiveAdminForCallerLocked( null, DeviceAdminInfo.USES_POLICY_WATCH_LOGIN, parent); } } } DevicePolicyData policy = getUserDataUnchecked(getCredentialOwner(userHandle, parent)); return policy.mFailedPasswordAttempts; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentFailedPasswordAttempts File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getCurrentFailedPasswordAttempts
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public ApiClient setUserAgent(String userAgent) { userAgent = userAgent; addDefaultHeader("User-Agent", userAgent); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserAgent File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setUserAgent
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void killUid(int appId, int userId, String reason) { enforceCallingPermission(Manifest.permission.KILL_UID, "killUid"); synchronized (this) { final long identity = Binder.clearCallingIdentity(); try { synchronized (mProcLock) { mProcessList.killPackageProcessesLSP(null /* packageName */, appId, userId, ProcessList.PERSISTENT_PROC_ADJ, false /* callerWillRestart */, true /* callerWillRestart */, true /* doit */, true /* evenPersistent */, false /* setRemoved */, false /* uninstalling */, ApplicationExitInfo.REASON_OTHER, ApplicationExitInfo.SUBREASON_KILL_UID, reason != null ? reason : "kill uid"); } } finally { Binder.restoreCallingIdentity(identity); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: killUid File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
killUid
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static void cursorIntToContentValues(Cursor cursor, String field, ContentValues values) { cursorIntToContentValues(cursor, field, values, field); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cursorIntToContentValues File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
cursorIntToContentValues
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
public CopyBuildTask outStream(Getter<OutputStream> out) { outputType = STREAM; outputStreamGetter = out; orGetterChangeNoticer(out); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outStream File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
outStream
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
@Override public void printXMLElement(String name, String[][] attributes) { handleSpaceWhenStartElement(); super.printXMLElement(name, attributes); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-32070 - Severity: MEDIUM - CVSS Score: 6.1 Description: XRENDERING-663: Restrict allowed attributes in HTML rendering * Change HTML renderers to only print allowed attributes and elements. * Add prefix to forbidden attributes to preserve them in XWiki syntax. * Adapt tests to expect that invalid attributes get a prefix. Function: printXMLElement File: xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java Repository: xwiki/xwiki-rendering Fixed Code: @Override public void printXMLElement(String name, String[][] attributes) { if (this.htmlElementSanitizer == null || this.htmlElementSanitizer.isElementAllowed(name)) { handleSpaceWhenStartElement(); super.printXMLElement(name, cleanAttributes(name, attributes)); } }
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
printXMLElement
xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
1
Analyze the following code function for security vulnerabilities
private void migrate44_abbreviate(Element element, int maxLen) { if (element != null) { String text = StringUtils.abbreviate(element.getText().trim(), maxLen); element.setText(text); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate44_abbreviate File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate44_abbreviate
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public static Node getNode(Node node, String... nodePath) { List<Node> nodes = getNodes(node, nodePath); if (nodes != null && nodes.size() > 0) { return nodes.get(0); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNode File: src/edu/stanford/nlp/time/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
getNode
src/edu/stanford/nlp/time/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
@Override public boolean isNdef(int nativeHandle) throws RemoteException { NfcPermissions.enforceUserPermissions(mContext); TagEndpoint tag = null; // Check if NFC is enabled if (!isNfcEnabled()) { return false; } /* find the tag in the hmap */ tag = (TagEndpoint) findObject(nativeHandle); int[] ndefInfo = new int[2]; if (tag == null) { return false; } return tag.checkNdef(ndefInfo); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNdef File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
isNdef
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Override public boolean isArrayType() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isArrayType File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
isArrayType
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public void stopNow() { this.stopNow = true; try { join(); } catch (InterruptedException e) { // ignore } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopNow File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
stopNow
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private ModelAndView createGroup(HttpServletRequest request, HttpServletResponse response) throws Exception { return new ModelAndView("admin/userGroupView/groups/newGroup"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createGroup File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352", "CWE-79" ]
CVE-2021-25929
LOW
3.5
OpenNMS/opennms
createGroup
opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
0
Analyze the following code function for security vulnerabilities
void dumpAssociationsLocked(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean dumpAll, boolean dumpClient, String dumpPackage) { pw.println("ACTIVITY MANAGER ASSOCIATIONS (dumpsys activity associations)"); int dumpUid = 0; if (dumpPackage != null) { IPackageManager pm = AppGlobals.getPackageManager(); try { dumpUid = pm.getPackageUid(dumpPackage, 0); } catch (RemoteException e) { } } boolean printedAnything = false; final long now = SystemClock.uptimeMillis(); for (int i1=0, N1=mAssociations.size(); i1<N1; i1++) { ArrayMap<ComponentName, SparseArray<ArrayMap<String, Association>>> targetComponents = mAssociations.valueAt(i1); for (int i2=0, N2=targetComponents.size(); i2<N2; i2++) { SparseArray<ArrayMap<String, Association>> sourceUids = targetComponents.valueAt(i2); for (int i3=0, N3=sourceUids.size(); i3<N3; i3++) { ArrayMap<String, Association> sourceProcesses = sourceUids.valueAt(i3); for (int i4=0, N4=sourceProcesses.size(); i4<N4; i4++) { Association ass = sourceProcesses.valueAt(i4); if (dumpPackage != null) { if (!ass.mTargetComponent.getPackageName().equals(dumpPackage) && UserHandle.getAppId(ass.mSourceUid) != dumpUid) { continue; } } printedAnything = true; pw.print(" "); pw.print(ass.mTargetProcess); pw.print("/"); UserHandle.formatUid(pw, ass.mTargetUid); pw.print(" <- "); pw.print(ass.mSourceProcess); pw.print("/"); UserHandle.formatUid(pw, ass.mSourceUid); pw.println(); pw.print(" via "); pw.print(ass.mTargetComponent.flattenToShortString()); pw.println(); pw.print(" "); long dur = ass.mTime; if (ass.mNesting > 0) { dur += now - ass.mStartTime; } TimeUtils.formatDuration(dur, pw); pw.print(" ("); pw.print(ass.mCount); pw.println(" times)"); if (ass.mNesting > 0) { pw.print(" "); pw.print(" Currently active: "); TimeUtils.formatDuration(now - ass.mStartTime, pw); pw.println(); } } } } } if (!printedAnything) { pw.println(" (nothing)"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpAssociationsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
dumpAssociationsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public String getHeaderField(String name, Object connection) throws IOException { return ((HttpURLConnection) connection).getHeaderField(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaderField File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getHeaderField
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setIdentityParticipantStack(String fqn) { logger .warn("Option 'identityParticipantStack' is deprecated and should not be used. This configuration is now set in picketlink.xml."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIdentityParticipantStack File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setIdentityParticipantStack
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
public long getLockoutAttemptDeadline(int userId) { long deadline = getLong(LOCKOUT_ATTEMPT_DEADLINE, 0L, userId); final long timeoutMs = getLong(LOCKOUT_ATTEMPT_TIMEOUT_MS, 0L, userId); final long now = SystemClock.elapsedRealtime(); if (deadline < now && deadline != 0) { // timeout expired setLong(LOCKOUT_ATTEMPT_DEADLINE, 0, userId); setLong(LOCKOUT_ATTEMPT_TIMEOUT_MS, 0, userId); return 0L; } if (deadline > (now + timeoutMs)) { // device was rebooted, set new deadline deadline = now + timeoutMs; setLong(LOCKOUT_ATTEMPT_DEADLINE, deadline, userId); } return deadline; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockoutAttemptDeadline File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getLockoutAttemptDeadline
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@LargeTest @Test public void testOutgoingCallSelectPhoneAccountVideo() throws Exception { startOutgoingPhoneCallPendingCreateConnection("650-555-1212", null, mConnectionServiceFixtureA, Process.myUserHandle(), VideoProfile.STATE_BIDIRECTIONAL); com.android.server.telecom.Call call = mTelecomSystem.getCallsManager().getCalls() .iterator().next(); assert(call.isVideoCallingSupportedByPhoneAccount()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); // Change the phone account to one which supports video calling. call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle()); assert(call.isVideoCallingSupportedByPhoneAccount()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 285211549 Fixes: 280797684 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com> (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:41042bd0c8e1e47c19dfdb2a378c70d2090b1e15) Merged-In: I69b0c64413ce3b5e8f56c4fbc5e195a5f5adb6d7 Change-Id: I69b0c64413ce3b5e8f56c4fbc5e195a5f5adb6d7 Function: testOutgoingCallSelectPhoneAccountVideo File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android Fixed Code: @LargeTest @Test public void testOutgoingCallSelectPhoneAccountVideo() throws Exception { startOutgoingPhoneCallPendingCreateConnection("650-555-1212", null, mConnectionServiceFixtureA, Process.myUserHandle(), VideoProfile.STATE_BIDIRECTIONAL, null); com.android.server.telecom.Call call = mTelecomSystem.getCallsManager().getCalls() .iterator().next(); assert(call.isVideoCallingSupportedByPhoneAccount()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); // Change the phone account to one which supports video calling. call.setTargetPhoneAccount(mPhoneAccountA1.getAccountHandle()); assert(call.isVideoCallingSupportedByPhoneAccount()); assertEquals(VideoProfile.STATE_BIDIRECTIONAL, call.getVideoState()); }
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testOutgoingCallSelectPhoneAccountVideo
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
void touchAutoHide() { // update transient bar autohide if (mStatusBarMode == MODE_SEMI_TRANSPARENT || (mNavigationBar != null && mNavigationBar.isSemiTransparent())) { scheduleAutohide(); } else { cancelAutohide(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: touchAutoHide File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
touchAutoHide
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public long getMaximumTimeToLock(@Nullable ComponentName admin) { return getMaximumTimeToLock(admin, myUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumTimeToLock File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getMaximumTimeToLock
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public List<String> getFavtags() { if (favtags == null) { favtags = new LinkedList<String>(); } return favtags; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFavtags File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getFavtags
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private Locale setLocale(Locale locale, XWikiContext context, Set<Locale> availableLocales, boolean forceSupported) { while (locale != null) { if (!forceSupported || availableLocales.contains(locale)) { context.setLocale(locale); break; } locale = LocaleUtils.getParentLocale(locale); } return locale; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLocale File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setLocale
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public String getSocketErrorMessage(Object socket) { return ((SocketImpl)socket).getErrorMessage(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSocketErrorMessage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getSocketErrorMessage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void removeUserStateLocked(int userId, boolean permanently) { // We always keep the global settings in memory. // Nuke system settings. final int systemKey = makeKey(SETTINGS_TYPE_SYSTEM, userId); final SettingsState systemSettingsState = mSettingsStates.get(systemKey); if (systemSettingsState != null) { if (permanently) { mSettingsStates.remove(systemKey); systemSettingsState.destroyLocked(null); } else { systemSettingsState.destroyLocked(new Runnable() { @Override public void run() { mSettingsStates.remove(systemKey); } }); } } // Nuke secure settings. final int secureKey = makeKey(SETTINGS_TYPE_SECURE, userId); final SettingsState secureSettingsState = mSettingsStates.get(secureKey); if (secureSettingsState != null) { if (permanently) { mSettingsStates.remove(secureKey); secureSettingsState.destroyLocked(null); } else { secureSettingsState.destroyLocked(new Runnable() { @Override public void run() { mSettingsStates.remove(secureKey); } }); } } // Nuke ssaid settings. final int ssaidKey = makeKey(SETTINGS_TYPE_SSAID, userId); final SettingsState ssaidSettingsState = mSettingsStates.get(ssaidKey); if (ssaidSettingsState != null) { if (permanently) { mSettingsStates.remove(ssaidKey); ssaidSettingsState.destroyLocked(null); } else { ssaidSettingsState.destroyLocked(new Runnable() { @Override public void run() { mSettingsStates.remove(ssaidKey); } }); } } // Nuke generation tracking data mGenerationRegistry.onUserRemoved(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUserStateLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
removeUserStateLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public boolean isInLaunchTransition() { return mNotificationPanel.isLaunchTransitionRunning() || mNotificationPanel.isLaunchTransitionFinished(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInLaunchTransition File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isInLaunchTransition
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setAuthor(String author) { setAuthorReference(userStringToReference(author)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public final boolean finishActivity(IBinder token, int resultCode, Intent resultData, int finishTask) { // Refuse possible leaked file descriptors if (resultData != null && resultData.hasFileDescriptors() == true) { throw new IllegalArgumentException("File descriptors passed in Intent"); } synchronized(this) { ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return true; } // Keep track of the root activity of the task before we finish it TaskRecord tr = r.getTask(); ActivityRecord rootR = tr.getRootActivity(); if (rootR == null) { Slog.w(TAG, "Finishing task with all activities already finished"); } // Do not allow task to finish if last task in lockTask mode. Launchable priv-apps can // finish. if (mLockTaskController.activityBlockedFromFinish(r)) { return false; } if (mController != null) { // Find the first activity that is not finishing. ActivityRecord next = r.getStack().topRunningActivityLocked(token, 0); if (next != null) { // ask watcher if this is allowed boolean resumeOK = true; try { resumeOK = mController.activityResuming(next.packageName); } catch (RemoteException e) { mController = null; Watchdog.getInstance().setActivityController(null); } if (!resumeOK) { Slog.i(TAG, "Not finishing activity because controller resumed"); return false; } } } final long origId = Binder.clearCallingIdentity(); try { boolean res; final boolean finishWithRootActivity = finishTask == Activity.FINISH_TASK_WITH_ROOT_ACTIVITY; if (finishTask == Activity.FINISH_TASK_WITH_ACTIVITY || (finishWithRootActivity && r == rootR)) { // If requested, remove the task that is associated to this activity only if it // was the root activity in the task. The result code and data is ignored // because we don't support returning them across task boundaries. Also, to // keep backwards compatibility we remove the task from recents when finishing // task with root activity. res = mStackSupervisor.removeTaskByIdLocked(tr.taskId, false, finishWithRootActivity, "finish-activity"); if (!res) { Slog.i(TAG, "Removing task failed to finish activity"); } } else { res = tr.getStack().requestFinishActivityLocked(token, resultCode, resultData, "app-request", true); if (!res) { Slog.i(TAG, "Failed to finish by app-request"); } } return res; } finally { Binder.restoreCallingIdentity(origId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishActivity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
finishActivity
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static boolean updateTileData(Context context, Tile tile, ActivityInfo activityInfo, ApplicationInfo applicationInfo, PackageManager pm) { if (applicationInfo.isSystemApp()) { int icon = 0; CharSequence title = null; String summary = null; // Get the activity's meta-data try { Resources res = pm.getResourcesForApplication( applicationInfo.packageName); Bundle metaData = activityInfo.metaData; if (res != null && metaData != null) { if (metaData.containsKey(META_DATA_PREFERENCE_ICON)) { icon = metaData.getInt(META_DATA_PREFERENCE_ICON); } if (metaData.containsKey(META_DATA_PREFERENCE_TITLE)) { if (metaData.get(META_DATA_PREFERENCE_TITLE) instanceof Integer) { title = res.getString(metaData.getInt(META_DATA_PREFERENCE_TITLE)); } else { title = metaData.getString(META_DATA_PREFERENCE_TITLE); } } if (metaData.containsKey(META_DATA_PREFERENCE_SUMMARY)) { if (metaData.get(META_DATA_PREFERENCE_SUMMARY) instanceof Integer) { summary = res.getString(metaData.getInt(META_DATA_PREFERENCE_SUMMARY)); } else { summary = metaData.getString(META_DATA_PREFERENCE_SUMMARY); } } } } catch (PackageManager.NameNotFoundException | Resources.NotFoundException e) { if (DEBUG) Log.d(LOG_TAG, "Couldn't find info", e); } // Set the preference title to the activity's label if no // meta-data is found if (TextUtils.isEmpty(title)) { title = activityInfo.loadLabel(pm).toString(); } if (icon == 0) { icon = activityInfo.icon; } // Set icon, title and summary for the preference tile.icon = Icon.createWithResource(activityInfo.packageName, icon); tile.title = title; tile.summary = summary; // Replace the intent with this specific activity tile.intent = new Intent().setClassName(activityInfo.packageName, activityInfo.name); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTileData File: packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
updateTileData
packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java
e206f02d46ae5e38c74d138b51f6e1637e261abe
0
Analyze the following code function for security vulnerabilities
public List<WorkspaceUpdaterDescriptor> getWorkspaceUpdaterDescriptors() { return WorkspaceUpdaterDescriptor.all(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWorkspaceUpdaterDescriptors File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getWorkspaceUpdaterDescriptors
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public Converter<?, ?> getConverter() { return converter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConverter File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getConverter
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public TList readListBegin() throws TException { byte size_and_type = readByte(); int size = (size_and_type >> 4) & 0x0f; if (size == 15) { size = readVarint32(); } byte type = getTType(size_and_type); return new TList(type, size); }
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2019-11938 - Severity: MEDIUM - CVSS Score: 5.0 Description: Java: Check the size of the remaining frame before deserializing collection Summary: In order to avoid over-allocating memory for malformed or truncated frame, we ensure that we have enough data (we only check for the lower bound) in the current frame. This is a partial fix for CVE-2019-11938. Reviewed By: vitaut Differential Revision: D14500775 fbshipit-source-id: ca8b38965514d6319addcb72c8999a6854a94a88 Function: readListBegin File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift Fixed Code: public TList readListBegin() throws TException { byte size_and_type = readByte(); int size = (size_and_type >> 4) & 0x0f; if (size == 15) { size = readVarint32(); } byte type = getTType(size_and_type); ensureContainerHasEnough(size, type); return new TList(type, size); }
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readListBegin
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
71c97ffdcb61cccf1f8267774e873e21ebd3ebd3
1
Analyze the following code function for security vulnerabilities
private Map<String, byte[]> getPkeyMap() { byte[] bytes = mKeyStore.get(PKEY_MAP_KEY); if (bytes != null) { Map<String, byte[]> map = (Map<String, byte[]>) Util.fromBytes(bytes); if (map != null) return map; } return new MyMap(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPkeyMap File: src/com/android/certinstaller/CertInstaller.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
getPkeyMap
src/com/android/certinstaller/CertInstaller.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
public BuildAuthorizationToken getAuthToken() { return authToken; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthToken File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getAuthToken
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@CriticalNative private static final native int nativeGetAttributeCount(long state);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetAttributeCount File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetAttributeCount
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public Entity<?> serialize(Object obj, Map<String, Object> formParams, String contentType, boolean isBodyNullable) throws ApiException { Entity<?> entity; if (contentType.startsWith("multipart/form-data")) { MultiPart multiPart = new MultiPart(); for (Entry<String, Object> param: formParams.entrySet()) { if (param.getValue() instanceof File) { File file = (File) param.getValue(); FormDataContentDisposition contentDisp = FormDataContentDisposition.name(param.getKey()) .fileName(file.getName()).size(file.length()).build(); multiPart.bodyPart(new FormDataBodyPart(contentDisp, file, MediaType.APPLICATION_OCTET_STREAM_TYPE)); } else { FormDataContentDisposition contentDisp = FormDataContentDisposition.name(param.getKey()).build(); multiPart.bodyPart(new FormDataBodyPart(contentDisp, parameterToString(param.getValue()))); } } entity = Entity.entity(multiPart, MediaType.MULTIPART_FORM_DATA_TYPE); } else if (contentType.startsWith("application/x-www-form-urlencoded")) { Form form = new Form(); for (Entry<String, Object> param: formParams.entrySet()) { form.param(param.getKey(), parameterToString(param.getValue())); } entity = Entity.entity(form, MediaType.APPLICATION_FORM_URLENCODED_TYPE); } else { // We let jersey handle the serialization if (isBodyNullable) { // payload is nullable if (obj instanceof String) { entity = Entity.entity(obj == null ? "null" : "\"" + ((String)obj).replaceAll("\"", Matcher.quoteReplacement("\\\"")) + "\"", contentType); } else { entity = Entity.entity(obj == null ? "null" : obj, contentType); } } else { if (obj instanceof String) { entity = Entity.entity(obj == null ? "" : "\"" + ((String)obj).replaceAll("\"", Matcher.quoteReplacement("\\\"")) + "\"", contentType); } else { entity = Entity.entity(obj == null ? "" : obj, contentType); } } } return entity; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serialize File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
serialize
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void sendOrientationChangeEvent(int orientation) { if (mNativeContentViewCore == 0) return; nativeSendOrientationChangeEvent(mNativeContentViewCore, orientation); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendOrientationChangeEvent File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
sendOrientationChangeEvent
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public boolean isCompiled() { return scriptModel != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCompiled File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
isCompiled
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
private synchronized void checkAccess(String accessToken) { if (!this.accessToken.equals(hash(accessToken))) throw new SecurityException(localized("security.access_token_invalid")); //$NON-NLS-1$ }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAccess File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
checkAccess
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public String getSecretKey() { return secretKey; }
Vulnerability Classification: - CWE: CWE-312 - CVE: CVE-2021-29481 - Severity: MEDIUM - CVSS Score: 5.0 Description: Add nullable annotations Function: getSecretKey File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java Repository: ratpack Fixed Code: @Nullable public String getSecretKey() { return secretKey; }
[ "CWE-312" ]
CVE-2021-29481
MEDIUM
5
ratpack
getSecretKey
ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java
4aa8d0e529812144330093aabd788ff1ffecbd9a
1
Analyze the following code function for security vulnerabilities
@Override public boolean resetPasswordWithToken(ComponentName admin, String passwordOrNull, byte[] token, int flags) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return false; } Objects.requireNonNull(token); final CallerIdentity caller = getCallerIdentity(admin); Preconditions.checkCallAuthorization( isProfileOwner(caller) || isDefaultDeviceOwner(caller)); synchronized (getLockObject()) { DevicePolicyData policy = getUserData(caller.getUserId()); if (policy.mPasswordTokenHandle != 0) { final String password = passwordOrNull != null ? passwordOrNull : ""; final boolean result = resetPasswordInternal(password, policy.mPasswordTokenHandle, token, flags, caller); if (result) { DevicePolicyEventLogger .createEvent(DevicePolicyEnums.RESET_PASSWORD_WITH_TOKEN) .setAdmin(caller.getComponentName()) .write(); } return result; } else { Slogf.w(LOG_TAG, "No saved token handle"); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetPasswordWithToken File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
resetPasswordWithToken
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override protected boolean validateFormLogic(UserRequest ureq) { boolean allOk = super.validateFormLogic(ureq); String subject = subjectElement.getValue(); subjectElement.clearError(); if (!StringHelper.containsNonWhitespace(subject)) { subjectElement.setErrorKey("form.legende.mandatory", null); allOk &= false; } else if(subject != null && subject.length() > subjectElement.getMaxLength()) { subjectElement.setErrorKey("text.element.error.notlongerthan", new String[]{ Integer.toString(subjectElement.getMaxLength()) }); allOk &= false; } String body = bodyElement.getValue(); bodyElement.clearError(); if (!StringHelper.containsNonWhitespace(body)) { bodyElement.setErrorKey("form.legende.mandatory", null); allOk &= false; } List<Identity> invalidTos = getInvalidToAddressesFromTextBoxList(); userListBox.clearError(); if (!invalidTos.isEmpty()) { String[] invalidTosArray = new String[invalidTos.size()]; userListBox.setErrorKey("mailhelper.error.addressinvalid", invalidTos.toArray(invalidTosArray)); allOk &= false; } else if(toValues == null || toValues.isEmpty()) { userListBox.setErrorKey("form.legende.mandatory", null); allOk &= false; } return allOk; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateFormLogic File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
validateFormLogic
src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
public static void execute() { String create = "CREATE TABLE user (name VARCHAR(50) NOT NULL, " + "password VARCHAR(100) NOT NULL, " + "creditCardNumber VARCHAR(12) NOT NULL)"; Database.execute(create); insertUser("Guilherme", "EuAmoGatinhos", "123456789012"); insertUser("Bruno", "LaFooon", "187456779012"); insertUser("Jefferson", "DaniboySZ", "487456789012"); insertUser("Leonardo", "MinoZica2014", "587456789112"); insertUser("Renato", "Paulas2", "787456789112"); }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2015-10048 - Severity: MEDIUM - CVSS Score: 5.2 Description: Método de execute alterado para SQLINJECTION , faltando apenas o método de StoredProcedure Function: execute File: injectIt/src/main/java/com/dextra/injectit/database/MockDatabase.java Repository: bmattoso/desafio_buzz_woody Fixed Code: public static void execute() { String create = "CREATE TABLE user (name VARCHAR(50) NOT NULL, " + "password VARCHAR(100) NOT NULL, " + "creditCardNumber VARCHAR(12) NOT NULL)"; Database.execute(create); String sp = "CREATE PROCEDURE sp_getUser " + "(@user VARCHAR(100)) " + "AS " + "BEGIN " + "SELECT * FROM USER WHERE NAME = @user " + "END"; Database.execute(sp); insertUser("Guilherme", "EuAmoGatinhos", "123456789012"); insertUser("Bruno", "LaFooon", "187456779012"); insertUser("Jefferson", "DaniboySZ", "487456789012"); insertUser("Leonardo", "MinoZica2014", "587456789112"); insertUser("Renato", "Paulas2", "787456789112"); }
[ "CWE-89" ]
CVE-2015-10048
MEDIUM
5.2
bmattoso/desafio_buzz_woody
execute
injectIt/src/main/java/com/dextra/injectit/database/MockDatabase.java
cb8220cbae06082c969b1776fcb2fdafb3a1006b
1
Analyze the following code function for security vulnerabilities
protected void service(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { byte[] captchaChallengeSound = null; ByteArrayOutputStream soundOutputStream = new ByteArrayOutputStream(); AudioInputStream challenge = null; try { //String captchaSession = (String) .getAttribute(com.dotcms.repackage.nl.captcha.servlet.Constants.SIMPLE_CAPCHA_SESSION_KEY); Captcha captcha = (Captcha) request.getSession().getAttribute(Captcha.NAME); String captchaSession=captcha!=null ? captcha.getAnswer() : null; if(UtilMethods.isSet(captchaSession)){ /*If we have a normal captcha in the session we should generate the word in the session instead of using a custom sound challenge*/ WordGenerator word = new DummyWordGenerator(captchaSession.trim()); SoundConfigurator configurator = new FreeTTSSoundConfigurator(voiceName, voicePackage, 1.0f, 100, 100); WordToSound word2sound = new FreeTTSWordToSound(configurator, captchaSession.length(), captchaSession.length()); SoundCaptchaFactory factory = new SpellerSoundFactory(word, word2sound, new SpellerWordDecorator(";")); SoundCaptcha tCaptcha = factory.getSoundCaptcha(); challenge = (AudioInputStream)tCaptcha.getChallenge(); }else{ //get the session id that will identify the generated captcha. //the same id must be used to validate the response, the session id is a good candidate! //Look for the captcha parameter from the session if it's null create a new audio challenge String captchaId = request.getSession().getId(); //challenge = CaptchaServiceSingleton.getInstance().getSoundChallengeForID(captchaId); SoundCaptchaService soundCaptchaService = new DefaultManageableSoundCaptchaService(); challenge = soundCaptchaService.getSoundChallengeForID(captchaId); request.getSession().setAttribute(WebKeys.SESSION_JCAPTCHA_SOUND_SERVICE, soundCaptchaService); } AudioSystem.write(challenge, AudioFileFormat.Type.WAVE, soundOutputStream); soundOutputStream.flush(); soundOutputStream.close(); } catch (IllegalArgumentException e) { response.sendError(HttpServletResponse.SC_NOT_FOUND); return; } catch (CaptchaServiceException e) { response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); return; } captchaChallengeSound = soundOutputStream.toByteArray(); response.setHeader("Content-Length", "" + captchaChallengeSound.length); response.setHeader("Cache-Control", "no-store"); response.setHeader("Pragma", "no-cache"); response.setDateHeader("Expires", 0L); response.setContentType("audio/x-wav"); ServletOutputStream responseOutputStream = response.getOutputStream(); responseOutputStream.write(captchaChallengeSound); responseOutputStream.flush(); responseOutputStream.close(); return; }
Vulnerability Classification: - CWE: CWE-254, CWE-264 - CVE: CVE-2016-8600 - Severity: MEDIUM - CVSS Score: 5.0 Description: #9330: Remove attribute after getting the info from session Function: service File: src/com/dotmarketing/servlets/AudioCaptchaServlet.java Repository: dotCMS/core Fixed Code: protected void service(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { byte[] captchaChallengeSound = null; ByteArrayOutputStream soundOutputStream = new ByteArrayOutputStream(); AudioInputStream challenge = null; try { //String captchaSession = (String) .getAttribute(com.dotcms.repackage.nl.captcha.servlet.Constants.SIMPLE_CAPCHA_SESSION_KEY); Captcha captcha = (Captcha) request.getSession().getAttribute(Captcha.NAME); //We need to remove the captcha info from the session. request.getSession().removeAttribute(Captcha.NAME); String captchaSession=captcha!=null ? captcha.getAnswer() : null; if(UtilMethods.isSet(captchaSession)){ /*If we have a normal captcha in the session we should generate the word in the session instead of using a custom sound challenge*/ WordGenerator word = new DummyWordGenerator(captchaSession.trim()); SoundConfigurator configurator = new FreeTTSSoundConfigurator(voiceName, voicePackage, 1.0f, 100, 100); WordToSound word2sound = new FreeTTSWordToSound(configurator, captchaSession.length(), captchaSession.length()); SoundCaptchaFactory factory = new SpellerSoundFactory(word, word2sound, new SpellerWordDecorator(";")); SoundCaptcha tCaptcha = factory.getSoundCaptcha(); challenge = (AudioInputStream)tCaptcha.getChallenge(); }else{ //get the session id that will identify the generated captcha. //the same id must be used to validate the response, the session id is a good candidate! //Look for the captcha parameter from the session if it's null create a new audio challenge String captchaId = request.getSession().getId(); //challenge = CaptchaServiceSingleton.getInstance().getSoundChallengeForID(captchaId); SoundCaptchaService soundCaptchaService = new DefaultManageableSoundCaptchaService(); challenge = soundCaptchaService.getSoundChallengeForID(captchaId); request.getSession().setAttribute(WebKeys.SESSION_JCAPTCHA_SOUND_SERVICE, soundCaptchaService); } AudioSystem.write(challenge, AudioFileFormat.Type.WAVE, soundOutputStream); soundOutputStream.flush(); soundOutputStream.close(); } catch (IllegalArgumentException e) { response.sendError(HttpServletResponse.SC_NOT_FOUND); return; } catch (CaptchaServiceException e) { response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR); return; } captchaChallengeSound = soundOutputStream.toByteArray(); response.setHeader("Content-Length", "" + captchaChallengeSound.length); response.setHeader("Cache-Control", "no-store"); response.setHeader("Pragma", "no-cache"); response.setDateHeader("Expires", 0L); response.setContentType("audio/x-wav"); ServletOutputStream responseOutputStream = response.getOutputStream(); responseOutputStream.write(captchaChallengeSound); responseOutputStream.flush(); responseOutputStream.close(); return; }
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
service
src/com/dotmarketing/servlets/AudioCaptchaServlet.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
1
Analyze the following code function for security vulnerabilities
private final String _decodeLongerName(int len) throws IOException { // Do we have enough buffered content to read? if ((_inputEnd - _inputPtr) < len) { // or if not, could we read? if (len >= _inputBuffer.length) { // If not enough space, need handling similar to chunked _finishLongText(len); return _textBuffer.contentsAsString(); } _loadToHaveAtLeast(len); } String name = _findDecodedFromSymbols(len); if (name != null) { _inputPtr += len; return name; } name = _decodeShortName(len); return _addDecodedToSymbols(len, name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _decodeLongerName File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_decodeLongerName
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
protected boolean onCloseButtonSubmit(final AjaxRequestTarget target) { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCloseButtonSubmit File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
onCloseButtonSubmit
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
@Override public void endWikiDocument(String name, FilterEventParameters parameters) throws FilterException { end(parameters); super.endWikiDocument(name, parameters); // Reset this.currentLocaleParameters = null; this.currentLocale = null; this.currentDefaultLocale = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endWikiDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
endWikiDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private boolean updateSecureSetting(String name, String value, String tag, boolean makeDefault, int requestingUserId, boolean forceNotify) { if (DEBUG) { Slog.v(LOG_TAG, "updateSecureSetting(" + name + ", " + value + ", " + ", " + tag + ", " + makeDefault + ", " + requestingUserId + ", " + forceNotify +")"); } return mutateSecureSetting(name, value, tag, makeDefault, requestingUserId, MUTATION_OPERATION_UPDATE, forceNotify, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSecureSetting File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
updateSecureSetting
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public static User create(String email, String passwordHash, Response response) throws UnauthorizedException { return create(email, passwordHash, /* validateEmail = */false, response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/gribbit/auth/User.java Repository: lukehutch/gribbit The code follows secure coding practices.
[ "CWE-346" ]
CVE-2014-125071
MEDIUM
5.2
lukehutch/gribbit
create
src/gribbit/auth/User.java
620418df247aebda3dd4be1dda10fe229ea505dd
0
Analyze the following code function for security vulnerabilities
XmlGenerator appendProperties(Map<String, Comparable> props) { if (!MapUtil.isNullOrEmpty(props)) { open("properties"); for (Entry<String, Comparable> entry : props.entrySet()) { node("property", entry.getValue(), "name", entry.getKey()); } close(); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendProperties File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
appendProperties
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private void handleBadRequest() { sendMessages(SEND_HEADERS_BAD_REQUEST_MSG, END_RESPONSE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleBadRequest File: core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-252" ]
CVE-2022-1319
HIGH
7.5
undertow-io/undertow
handleBadRequest
core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java
1443a1a2bbb8e32e56788109d8285db250d55c8b
0
Analyze the following code function for security vulnerabilities
public String getIccSimChallengeResponse(int subId, int appType, String data) throws RemoteException { PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(subId); return phoneSubInfoProxy.getIccSimChallengeResponse(subId, appType, data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIccSimChallengeResponse File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getIccSimChallengeResponse
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
public void changePassword(String newPassword, Response response) throws UnauthorizedException, AppException { if (sessionTokHasExpired()) { throw new UnauthorizedException("Session has expired"); } // Re-hash user password passwordHash = Hash.hashPassword(newPassword); // Generate a new session token and save user. // Invalidates current session, forcing other clients to be logged out. logIn(response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: changePassword File: src/gribbit/auth/User.java Repository: lukehutch/gribbit The code follows secure coding practices.
[ "CWE-346" ]
CVE-2014-125071
MEDIUM
5.2
lukehutch/gribbit
changePassword
src/gribbit/auth/User.java
620418df247aebda3dd4be1dda10fe229ea505dd
0
Analyze the following code function for security vulnerabilities
protected boolean handleMucInvitation(Message msg) { String room; String inviter = null; String reason = null; String password = null; MUCUser mucuser = (MUCUser)msg.getExtension("x", "http://jabber.org/protocol/muc#user"); GroupChatInvitation direct = (GroupChatInvitation)msg.getExtension(GroupChatInvitation.ELEMENT_NAME, GroupChatInvitation.NAMESPACE); if (mucuser != null && mucuser.getInvite() != null) { // first try official XEP-0045 mediated invitation MUCUser.Invite invite = mucuser.getInvite(); room = msg.getFrom(); inviter = invite.getFrom(); reason = invite.getReason(); password = mucuser.getPassword(); } else if (direct != null) { // fall back to XEP-0249 direct invitation room = direct.getRoomAddress(); inviter = msg.getFrom(); // TODO: get reason from direct invitation, not supported in smack3 } else return false; // not a MUC invitation if (mucJIDs.contains(room)) { Log.i(TAG, "Ignoring invitation to known MUC " + room); return true; } Log.d(TAG, "MUC invitation from " + inviter + " to " + room); asyncProcessMucInvitation(room, inviter, reason, password); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMucInvitation File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
handleMucInvitation
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public void setRecoveredQueueNameSupplier(RecoveredQueueNameSupplier recoveredQueueNameSupplier) { this.recoveredQueueNameSupplier = recoveredQueueNameSupplier; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRecoveredQueueNameSupplier File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setRecoveredQueueNameSupplier
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
private ComponentName getDeviceOwnerComponentInner(boolean callingUserOnly) { if (mService != null) { try { return mService.getDeviceOwnerComponent(callingUserOnly); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceOwnerComponentInner File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getDeviceOwnerComponentInner
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public CategoryMixin getCategoryMixin() { return mCategoryMixin; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCategoryMixin File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
getCategoryMixin
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
void initializeNewJarDownload(final URL ref, final String part, final VersionString version) { final JARDesc[] jars = ManageJnlpResources.findJars(this, ref, part, version); for (JARDesc eachJar : jars) { LOG.info("Downloading and initializing jar: {}", eachJar.getLocation().toString()); this.addNewJar(eachJar, UpdatePolicy.FORCE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initializeNewJarDownload File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
initializeNewJarDownload
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public void checkLoadedChunk(BlockVector3 pt) { World world = getWorld(); //FAWE start int X = pt.getBlockX() >> 4; int Z = pt.getBlockZ() >> 4; if (Fawe.isMainThread()) { world.getChunkAt(X, Z); } else if (PaperLib.isPaper()) { PaperLib.getChunkAtAsync(world, X, Z, true); } //FAWE end }
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2023-35925 - Severity: MEDIUM - CVSS Score: 5.5 Description: feat: prevent edits outside +/- 30,000,000 blocks Function: checkLoadedChunk File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java Repository: IntellectualSites/FastAsyncWorldEdit Fixed Code: @Override public void checkLoadedChunk(BlockVector3 pt) { //FAWE start - safe edit region testCoords(pt); //FAWE end World world = getWorld(); //FAWE start int X = pt.getBlockX() >> 4; int Z = pt.getBlockZ() >> 4; if (Fawe.isMainThread()) { world.getChunkAt(X, Z); } else if (PaperLib.isPaper()) { PaperLib.getChunkAtAsync(world, X, Z, true); } //FAWE end }
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
checkLoadedChunk
worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
1
Analyze the following code function for security vulnerabilities
@Override public String toXML() throws Exception { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); DocumentBuilder builder = factory.newDocumentBuilder(); Document document = builder.newDocument(); Element accountElement = toDOM(document); document.appendChild(accountElement); TransformerFactory transformerFactory = TransformerFactory.newInstance(); Transformer transformer = transformerFactory.newTransformer(); transformer.setOutputProperty(OutputKeys.INDENT, "yes"); transformer.setOutputProperty("{http://xml.apache.org/xslt}indent-amount", "4"); DOMSource domSource = new DOMSource(document); StringWriter sw = new StringWriter(); StreamResult streamResult = new StreamResult(sw); transformer.transform(domSource, streamResult); return sw.toString(); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-2414 - Severity: HIGH - CVSS Score: 7.5 Description: Disable access to external entities when parsing XML This reduces the vulnerability of XML parsers to XXE (XML external entity) injection. The best way to prevent XXE is to stop using XML altogether, which we do plan to do. Until that happens I consider it worthwhile to tighten the security here though. Function: toXML File: base/common/src/main/java/com/netscape/certsrv/account/Account.java Repository: dogtagpki/pki Fixed Code: @Override public String toXML() throws Exception { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); DocumentBuilder builder = factory.newDocumentBuilder(); Document document = builder.newDocument(); Element accountElement = toDOM(document); document.appendChild(accountElement); TransformerFactory transformerFactory = TransformerFactory.newInstance(); transformerFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); transformerFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_STYLESHEET, ""); Transformer transformer = transformerFactory.newTransformer(); transformer.setOutputProperty(OutputKeys.INDENT, "yes"); transformer.setOutputProperty("{http://xml.apache.org/xslt}indent-amount", "4"); DOMSource domSource = new DOMSource(document); StringWriter sw = new StringWriter(); StreamResult streamResult = new StreamResult(sw); transformer.transform(domSource, streamResult); return sw.toString(); }
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toXML
base/common/src/main/java/com/netscape/certsrv/account/Account.java
16deffdf7548e305507982e246eb9fd1eac414fd
1
Analyze the following code function for security vulnerabilities
private void finishSendConfirmDialog( final boolean showToast, final ArrayList<String> recipients) { performAdditionalSendOrSaveSanityChecks(false /* save */, showToast, recipients); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishSendConfirmDialog File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
finishSendConfirmDialog
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void setAdminContextPath(String adminContextPath) { try { adminConfiguration.setSharedVariable(CONTEXT_ADMIN_CONTEXT_PATH, adminContextPath); } catch (TemplateModelException e) { } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAdminContextPath File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-20914
CRITICAL
9.8
sanluan/PublicCMS
setAdminContextPath
publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae
0
Analyze the following code function for security vulnerabilities
public void setGroupRetrieval(GroupRetrieval groupRetrieval) { this.groupRetrieval = groupRetrieval; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setGroupRetrieval File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-90" ]
CVE-2021-32651
MEDIUM
4.3
theonedev/onedev
setGroupRetrieval
server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
4440f0c57e440488d7e653417b2547eaae8ad19c
0
Analyze the following code function for security vulnerabilities
public float getPrimaryHorizontal(int offset, boolean clamped) { boolean trailing = primaryIsTrailingPrevious(offset); return getHorizontal(offset, trailing, clamped); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPrimaryHorizontal File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getPrimaryHorizontal
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
public Collection<String> getUnprotectedRootActions() { Set<String> names = new TreeSet<String>(); names.add("jnlpJars"); // XXX cleaner to refactor doJnlpJars into a URA // XXX consider caching (expiring cache when actions changes) for (Action a : getActions()) { if (a instanceof UnprotectedRootAction) { names.add(a.getUrlName()); } } return names; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUnprotectedRootActions File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getUnprotectedRootActions
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public boolean apply(File file) { return file.isFile(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: apply File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
apply
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@RequestMapping("/services/public/products/page/{start}/{max}/{store}/{language}/{category}/filter={filterType}/filter-value={filterValue}") @ResponseBody public ProductList getProductsFilteredByType(@PathVariable int start, @PathVariable int max, @PathVariable String store, @PathVariable final String language, @PathVariable final String category, @PathVariable final String filterType, @PathVariable final String filterValue, Model model, HttpServletRequest request, HttpServletResponse response) throws Exception { List<QueryFilter> queryFilters = null; try { if(filterType.equals(QueryFilterType.BRAND.name())) {//the only one implemented so far QueryFilter filter = new QueryFilter(); filter.setFilterType(QueryFilterType.BRAND); filter.setFilterId(Long.parseLong(filterValue)); if(queryFilters==null) { queryFilters = new ArrayList<QueryFilter>(); } queryFilters.add(filter); } } catch(Exception e) { LOGGER.error("Invalid filter or filter-value " + filterType + " - " + filterValue,e); } return this.getProducts(start, max, store, language, category, queryFilters, model, request, response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProductsFilteredByType File: sm-shop/src/main/java/com/salesmanager/shop/store/controller/category/ShoppingCategoryController.java Repository: shopizer-ecommerce/shopizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-33561
LOW
3.5
shopizer-ecommerce/shopizer
getProductsFilteredByType
sm-shop/src/main/java/com/salesmanager/shop/store/controller/category/ShoppingCategoryController.java
197f8c78c8f673b957e41ca2c823afc654c19271
0
Analyze the following code function for security vulnerabilities
private boolean isSystemSettingsKey(int key) { return getTypeFromKey(key) == SETTINGS_TYPE_SYSTEM; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSystemSettingsKey File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isSystemSettingsKey
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
ActivityStarter setIntent(Intent intent) { mRequest.intent = intent; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIntent File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setIntent
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
static boolean scanForChildTag(XMLStreamReader reader, String tagName) throws XMLStreamException { assert reader.isStartElement(); int level = -1; while (reader.hasNext()) { //keep track of level so we only search children, not descendants if (reader.isStartElement()) { level++; } else if (reader.isEndElement()) { level--; } if (level < 0) { //end parent tag - no more children break; } reader.next(); if (level == 0 && reader.isStartElement() && reader.getLocalName().equals(tagName)) { return true; //found } } return false; //got to end of parent element and not found }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanForChildTag File: javamelody-core/src/main/java/net/bull/javamelody/PayloadNameRequestWrapper.java Repository: javamelody The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-15531
HIGH
7.5
javamelody
scanForChildTag
javamelody-core/src/main/java/net/bull/javamelody/PayloadNameRequestWrapper.java
ef111822562d0b9365bd3e671a75b65bd0613353
0
Analyze the following code function for security vulnerabilities
protected void authenticate(String userDN) throws LoginException { char[] credential = getCredential(); if (credential.length == 0) { if (allowEmptyPassword == false) { log.trace("Rejecting empty password."); return; } } if (isUserDnAbsolute(userDN)) { // user object resides in referral referralAuthenticate(userDN, credential); } else { // non referral user authentication try { LdapContext authContext = constructLdapContext(null, userDN, credential, null); authContext.close(); } catch (NamingException ne) { if (log.isDebugEnabled()) log.debug("Authentication failed - " + ne.getMessage()); LoginException le = new LoginException("Authentication failed"); le.initCause(ne); throw le; } } super.loginOk = true; if (getUseFirstPass() == true) { // Add the username and password to the shared state map sharedState.put("javax.security.auth.login.name", getIdentity().getName()); sharedState.put("javax.security.auth.login.password", credential); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: authenticate File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java Repository: wildfly-security/jboss-negotiation The code follows secure coding practices.
[ "CWE-200" ]
CVE-2015-1849
MEDIUM
4.3
wildfly-security/jboss-negotiation
authenticate
jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e
0
Analyze the following code function for security vulnerabilities
@Override public DataHandler getAttachmentAsDataHandler(String contentId) { if (contentId.startsWith(CID)) { contentId = contentId.substring(CID.length()); try { contentId = URLDecoder.decode(contentId, "UTF-8"); } catch (UnsupportedEncodingException e) { // ignore } contentId = '<' + contentId + '>'; } return this.mimeContainer.getAttachment(contentId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentAsDataHandler File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
getAttachmentAsDataHandler
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
@Override public boolean isKeyguardDrawnLw() { synchronized (mLock) { return mKeyguardDrawnOnce; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyguardDrawnLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
isKeyguardDrawnLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public void setModels(String[] models) { this.models = models.clone(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setModels File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
setModels
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
@Override public Object clone() { return new PersistableBundle(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clone File: core/java/android/os/PersistableBundle.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40074
MEDIUM
5.5
android
clone
core/java/android/os/PersistableBundle.java
40e4ea759743737958dde018f3606d778f7a53f3
0
Analyze the following code function for security vulnerabilities
private final void addProcessNameLocked(ProcessRecord proc) { // We shouldn't already have a process under this name, but just in case we // need to clean up whatever may be there now. ProcessRecord old = removeProcessNameLocked(proc.processName, proc.uid); if (old == proc && proc.persistent) { // We are re-adding a persistent process. Whatevs! Just leave it there. Slog.w(TAG, "Re-adding persistent process " + proc); } else if (old != null) { Slog.wtf(TAG, "Already have existing proc " + old + " when adding " + proc); } UidRecord uidRec = mActiveUids.get(proc.uid); if (uidRec == null) { uidRec = new UidRecord(proc.uid); // This is the first appearance of the uid, report it now! if (DEBUG_UID_OBSERVERS) Slog.i(TAG_UID_OBSERVERS, "Creating new process uid: " + uidRec); if (Arrays.binarySearch(mDeviceIdleTempWhitelist, UserHandle.getAppId(proc.uid)) >= 0 || mPendingTempWhitelist.indexOfKey(proc.uid) >= 0) { uidRec.setWhitelist = uidRec.curWhitelist = true; } uidRec.updateHasInternetPermission(); mActiveUids.put(proc.uid, uidRec); EventLogTags.writeAmUidRunning(uidRec.uid); noteUidProcessState(uidRec.uid, uidRec.curProcState); } proc.uidRecord = uidRec; // Reset render thread tid if it was already set, so new process can set it again. proc.renderThreadTid = 0; uidRec.numProcs++; mProcessNames.put(proc.processName, proc.uid, proc); if (proc.isolated) { mIsolatedProcesses.put(proc.uid, proc); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addProcessNameLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
addProcessNameLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public Collection<List<BaseObject>> values() { return (Collection) xObjects.values(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: values File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
values
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public PtrDnsAnswer reverseLookup(String ipAddress) throws InterruptedException, ExecutionException { LOG.debug("Attempting to perform reverse lookup for IP address [{}]", ipAddress); if (isShutdown()) { throw new DnsClientNotRunningException(); } validateIpAddress(ipAddress); final String inverseAddressFormat = getInverseAddressFormat(ipAddress); DnsResponse content = null; try { content = resolver.query(new DefaultDnsQuestion(inverseAddressFormat, DnsRecordType.PTR)).get(requestTimeout, TimeUnit.MILLISECONDS).content(); for (int i = 0; i < content.count(DnsSection.ANSWER); i++) { // Return the first PTR record, because there should be only one as per // http://tools.ietf.org/html/rfc1035#section-3.5 final DnsRecord dnsRecord = content.recordAt(DnsSection.ANSWER, i); if (dnsRecord instanceof DefaultDnsPtrRecord) { final DefaultDnsPtrRecord ptrRecord = (DefaultDnsPtrRecord) dnsRecord; final PtrDnsAnswer.Builder dnsAnswerBuilder = PtrDnsAnswer.builder(); final String hostname = ptrRecord.hostname(); LOG.trace("PTR record retrieved with hostname [{}]", hostname); try { parseReverseLookupDomain(dnsAnswerBuilder, hostname); } catch (IllegalArgumentException e) { LOG.debug("Reverse lookup of [{}] was partially successful. The DNS server returned [{}], " + "which is an invalid host name. The \"domain\" field will be left blank.", ipAddress, hostname); dnsAnswerBuilder.domain(""); } return dnsAnswerBuilder.dnsTTL(ptrRecord.timeToLive()) .build(); } } } catch (TimeoutException e) { throw new ExecutionException("Resolver future didn't return a result in " + requestTimeout + " ms", e); } finally { if (content != null) { // Must manually release references on content object since the DnsResponse class extends ReferenceCounted content.release(); } } return null; }
Vulnerability Classification: - CWE: CWE-345 - CVE: CVE-2023-41045 - Severity: MEDIUM - CVSS Score: 5.3 Description: Merge pull request from GHSA-g96c-x7rh-99r3 * Add support for randomizing DNS Lookup source port * Clarify purpose of lease * Skip initial refresh Previously, the pool was being refreshed immediately upon initialization. Now, the refresh waits until the `poolRefreshSeconds` duration has elapsed. * Ensure thread safety, skip unused poller refreshes * Add change log Function: reverseLookup File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java Repository: Graylog2/graylog2-server Fixed Code: public PtrDnsAnswer reverseLookup(String ipAddress) throws InterruptedException, ExecutionException { LOG.debug("Attempting to perform reverse lookup for IP address [{}]", ipAddress); if (resolverPool.isStopped()) { throw new DnsClientNotRunningException(); } validateIpAddress(ipAddress); final String inverseAddressFormat = getInverseAddressFormat(ipAddress); DnsResponse content = null; final ResolverLease resolverLease = resolverPool.takeLease(); try { content = resolverLease.getResolver().query(new DefaultDnsQuestion(inverseAddressFormat, DnsRecordType.PTR)).get(requestTimeout, TimeUnit.MILLISECONDS).content(); for (int i = 0; i < content.count(DnsSection.ANSWER); i++) { // Return the first PTR record, because there should be only one as per // http://tools.ietf.org/html/rfc1035#section-3.5 final DnsRecord dnsRecord = content.recordAt(DnsSection.ANSWER, i); if (dnsRecord instanceof DefaultDnsPtrRecord) { final DefaultDnsPtrRecord ptrRecord = (DefaultDnsPtrRecord) dnsRecord; final PtrDnsAnswer.Builder dnsAnswerBuilder = PtrDnsAnswer.builder(); final String hostname = ptrRecord.hostname(); LOG.trace("PTR record retrieved with hostname [{}]", hostname); try { parseReverseLookupDomain(dnsAnswerBuilder, hostname); } catch (IllegalArgumentException e) { LOG.debug("Reverse lookup of [{}] was partially successful. The DNS server returned [{}], " + "which is an invalid host name. The \"domain\" field will be left blank.", ipAddress, hostname); dnsAnswerBuilder.domain(""); } return dnsAnswerBuilder.dnsTTL(ptrRecord.timeToLive()) .build(); } } } catch (TimeoutException e) { throw new ExecutionException("Resolver future didn't return a result in " + requestTimeout + " ms", e); } finally { if (content != null) { // Must manually release references on content object since the DnsResponse class extends ReferenceCounted content.release(); } resolverPool.returnLease(resolverLease); } return null; }
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
reverseLookup
graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java
466af814523cffae9fbc7e77bab7472988f03c3e
1
Analyze the following code function for security vulnerabilities
private void forceWipeUser(int userId, String wipeReasonForUser, boolean wipeSilently) { boolean success = false; try { if (getCurrentForegroundUserId() == userId) { // TODO: We need to special case headless here as we can't switch to the system user mInjector.getIActivityManager().switchUser(UserHandle.USER_SYSTEM); } success = mUserManagerInternal.removeUserEvenWhenDisallowed(userId); if (!success) { Slogf.w(LOG_TAG, "Couldn't remove user " + userId); } else if (isManagedProfile(userId) && !wipeSilently) { sendWipeProfileNotification(wipeReasonForUser, UserHandle.of(getProfileParentId(userId))); } } catch (RemoteException re) { // Shouldn't happen Slogf.wtf(LOG_TAG, "Error forcing wipe user", re); } finally { if (!success) SecurityLog.writeEvent(SecurityLog.TAG_WIPE_FAILURE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forceWipeUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
forceWipeUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static LoginUrlInfo parseLoginDataUrl(String prefix, String dataString) throws IllegalArgumentException { if (dataString.length() < prefix.length()) { throw new IllegalArgumentException("Invalid login URL detected"); } // format is basically xxx://login/server:xxx&user:xxx&password while all variables are optional String data = dataString.substring(prefix.length()); // parse data String[] values = data.split("&"); if (values.length < 1 || values.length > 3) { // error illegal number of URL elements detected throw new IllegalArgumentException("Illegal number of login URL elements detected: " + values.length); } LoginUrlInfo loginUrlInfo = new LoginUrlInfo(); for (String value : values) { if (value.startsWith("user" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) { loginUrlInfo.username = URLDecoder.decode( value.substring(("user" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())); } else if (value.startsWith("password" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) { loginUrlInfo.password = URLDecoder.decode( value.substring(("password" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())); } else if (value.startsWith("server" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) { loginUrlInfo.serverAddress = URLDecoder.decode( value.substring(("server" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())); } } return loginUrlInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseLoginDataUrl File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
parseLoginDataUrl
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private String getRoutes(BeforeEnterEvent event) { List<RouteData> routes = event.getSource().getRegistry() .getRegisteredRoutes(); return routes.stream() .sorted((route1, route2) -> route1.getTemplate() .compareTo(route2.getTemplate())) .map(this::routeToHtml).map(Element::outerHtml) .collect(Collectors.joining()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRoutes File: flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-31412
MEDIUM
4.3
vaadin/flow
getRoutes
flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java
c79a7a8dbe1a494ff99a591d2e85b1100fc0aa15
0
Analyze the following code function for security vulnerabilities
public String getSpaceFilteredQuery(Profile authUser, String currentSpace) { return canAccessSpace(authUser, currentSpace) ? getSpaceFilter(authUser, currentSpace) : ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSpaceFilteredQuery File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getSpaceFilteredQuery
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
@Override public HttpSession getSession(boolean x) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSession File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getSession
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0