René's URL Explorer Experiment


Title: Android WebView JavaScript settings — CodeQL query help documentation

direct link

Domain: codeql.github.com

Links:

CodeQL documentation https://codeql.github.com/docs
CodeQL overviewhttps://codeql.github.com/docs/codeql-overview
Writing CodeQL querieshttps://codeql.github.com/docs/writing-codeql-queries
CodeQL language guideshttps://codeql.github.com/docs/codeql-language-guides
QL language referencehttps://codeql.github.com/docs/ql-language-reference/
CodeQL standard-librarieshttps://codeql.github.com/codeql-standard-libraries
CodeQL query helphttps://codeql.github.com/codeql-query-help
CodeQL repositoryhttps://github.com/github/codeql
QL publicationshttps://codeql.github.com/publications
CodeQL query help for C and C++https://codeql.github.com/codeql-query-help/cpp/
CodeQL query help for C#https://codeql.github.com/codeql-query-help/csharp/
CodeQL query help for GitHub Actionshttps://codeql.github.com/codeql-query-help/actions/
CodeQL query help for Gohttps://codeql.github.com/codeql-query-help/go/
CodeQL query help for Java and Kotlinhttps://codeql.github.com/codeql-query-help/java/
Access Java object methods through JavaScript exposurehttps://codeql.github.com/codeql-query-help/java/java-android-webview-addjavascriptinterface/
Access to unsupported JDK-internal APIhttps://codeql.github.com/codeql-query-help/java/java-jdk-internal-api-access/
Android APK installationhttps://codeql.github.com/codeql-query-help/java/java-android-arbitrary-apk-installation/
Android Intent redirectionhttps://codeql.github.com/codeql-query-help/java/java-android-intent-redirection/
Android WebSettings file accesshttps://codeql.github.com/codeql-query-help/java/java-android-websettings-file-access/
Android WebView JavaScript settingshttps://codeql.github.com/codeql-query-help/java/java-android-websettings-javascript-enabled/
Android WebView settings allows access to content linkshttps://codeql.github.com/codeql-query-help/java/java-android-websettings-allow-content-access/
Android Webview debugging enabledhttps://codeql.github.com/codeql-query-help/java/java-android-webview-debugging-enabled/
Android WebView that accepts all certificateshttps://codeql.github.com/codeql-query-help/java/java-improper-webview-certificate-validation/
Android debuggable attribute enabledhttps://codeql.github.com/codeql-query-help/java/java-android-debuggable-attribute-enabled/
Android fragment injectionhttps://codeql.github.com/codeql-query-help/java/java-android-fragment-injection/
Android fragment injection in PreferenceActivityhttps://codeql.github.com/codeql-query-help/java/java-android-fragment-injection-preference-activity/
Android missing certificate pinninghttps://codeql.github.com/codeql-query-help/java/java-android-missing-certificate-pinning/
Android sensitive keyboard cachehttps://codeql.github.com/codeql-query-help/java/java-android-sensitive-keyboard-cache/
AnnotationPresent checkhttps://codeql.github.com/codeql-query-help/java/java-ineffective-annotation-present-check/
Application backup allowedhttps://codeql.github.com/codeql-query-help/java/java-android-backup-enabled/
Arbitrary file access during archive extraction (”Zip Slip”)https://codeql.github.com/codeql-query-help/java/java-zipslip/
Array index out of boundshttps://codeql.github.com/codeql-query-help/java/java-index-out-of-bounds/
Bad implementation of an event Adapterhttps://codeql.github.com/codeql-query-help/java/java-wrong-swing-event-adapter-signature/
Bad suite methodhttps://codeql.github.com/codeql-query-help/java/java-wrong-junit-suite-signature/
Boxed variable is never nullhttps://codeql.github.com/codeql-query-help/java/java-non-null-boxed-variable/
Building a command line with string concatenationhttps://codeql.github.com/codeql-query-help/java/java-concatenated-command-line/
Building a command with an injected environment variablehttps://codeql.github.com/codeql-query-help/java/java-exec-tainted-environment/
Call to Iterator.remove may failhttps://codeql.github.com/codeql-query-help/java/java-iterator-remove-failure/
Cast from abstract to concrete collectionhttps://codeql.github.com/codeql-query-help/java/java-abstract-to-concrete-cast/
Chain of ‘instanceof’ testshttps://codeql.github.com/codeql-query-help/java/java-chained-type-tests/
Character passed to StringBuffer or StringBuilder constructorhttps://codeql.github.com/codeql-query-help/java/java-string-buffer-char-init/
Class has same name as super classhttps://codeql.github.com/codeql-query-help/java/java-class-name-matches-super-class/
Cleartext storage of sensitive information in cookiehttps://codeql.github.com/codeql-query-help/java/java-cleartext-storage-in-cookie/
Cleartext storage of sensitive information in the Android filesystemhttps://codeql.github.com/codeql-query-help/java/java-android-cleartext-storage-filesystem/
Cleartext storage of sensitive information using ‘Properties’ classhttps://codeql.github.com/codeql-query-help/java/java-cleartext-storage-in-properties/
Cleartext storage of sensitive information using SharedPreferences on Androidhttps://codeql.github.com/codeql-query-help/java/java-android-cleartext-storage-shared-prefs/
Cleartext storage of sensitive information using a local database on Androidhttps://codeql.github.com/codeql-query-help/java/java-android-cleartext-storage-database/
Comparison of identical valueshttps://codeql.github.com/codeql-query-help/java/java-comparison-of-identical-expressions/
Comparison of narrow type with wide type in loop conditionhttps://codeql.github.com/codeql-query-help/java/java-comparison-with-wider-type/
Confusing method names because of capitalizationhttps://codeql.github.com/codeql-query-help/java/java-confusing-method-name/
Confusing non-overriding of package-private methodhttps://codeql.github.com/codeql-query-help/java/java-non-overriding-package-private/
Confusing overloading of methodshttps://codeql.github.com/codeql-query-help/java/java-confusing-method-signature/
Constant interface anti-patternhttps://codeql.github.com/codeql-query-help/java/java-constants-only-interface/
Constant loop conditionhttps://codeql.github.com/codeql-query-help/java/java-constant-loop-condition/
Container contents are never accessedhttps://codeql.github.com/codeql-query-help/java/java-unused-container/
Container contents are never initializedhttps://codeql.github.com/codeql-query-help/java/java-empty-container/
Container size compared to zerohttps://codeql.github.com/codeql-query-help/java/java-test-for-negative-container-size/
Continue statement that does not continuehttps://codeql.github.com/codeql-query-help/java/java-continue-in-false-loop/
Contradictory type checkshttps://codeql.github.com/codeql-query-help/java/java-contradictory-type-checks/
Creates empty ZIP file entryhttps://codeql.github.com/codeql-query-help/java/java-empty-zip-file-entry/
Cross-site scriptinghttps://codeql.github.com/codeql-query-help/java/java-xss/
Dangerous non-short-circuit logichttps://codeql.github.com/codeql-query-help/java/java-non-short-circuit-evaluation/
Dangerous runFinalizersOnExithttps://codeql.github.com/codeql-query-help/java/java-run-finalizers-on-exit/
Depending upon JCenter/Bintray as an artifact repositoryhttps://codeql.github.com/codeql-query-help/java/java-maven-dependency-upon-bintray/
Deprecated method or constructor invocationhttps://codeql.github.com/codeql-query-help/java/java-deprecated-call/
Dereferenced expression may be nullhttps://codeql.github.com/codeql-query-help/java/java-dereferenced-expr-may-be-null/
Dereferenced variable is always nullhttps://codeql.github.com/codeql-query-help/java/java-dereferenced-value-is-always-null/
Dereferenced variable may be nullhttps://codeql.github.com/codeql-query-help/java/java-dereferenced-value-may-be-null/
Deserialization of user-controlled datahttps://codeql.github.com/codeql-query-help/java/java-unsafe-deserialization/
Detect JHipster Generator Vulnerability CVE-2019-16303https://codeql.github.com/codeql-query-help/java/java-jhipster-prng/
Direct call to a run() methodhttps://codeql.github.com/codeql-query-help/java/java-call-to-thread-run/
Disabled Netty HTTP header validationhttps://codeql.github.com/codeql-query-help/java/java-netty-http-request-or-response-splitting/
Disabled Spring CSRF protectionhttps://codeql.github.com/codeql-query-help/java/java-spring-disabled-csrf-protection/
Do not call finalize()https://codeql.github.com/codeql-query-help/java/java-do-not-call-finalize/
Double-checked locking is not thread-safehttps://codeql.github.com/codeql-query-help/java/java-unsafe-double-checked-locking/
Equals method does not inspect argument typehttps://codeql.github.com/codeql-query-help/java/java-unchecked-cast-in-equals/
Equals on incomparable typeshttps://codeql.github.com/codeql-query-help/java/java-equals-on-unrelated-types/
Equals or hashCode on arrayshttps://codeql.github.com/codeql-query-help/java/java-equals-on-arrays/
Escapinghttps://codeql.github.com/codeql-query-help/java/java-escaping/
Executing a command with a relative pathhttps://codeql.github.com/codeql-query-help/java/java-relative-path-command/
Exposed Spring Boot actuatorshttps://codeql.github.com/codeql-query-help/java/java-spring-boot-exposed-actuators/
Exposed Spring Boot actuators in configuration filehttps://codeql.github.com/codeql-query-help/java/java-spring-boot-exposed-actuators-config/
Exposing internal representationhttps://codeql.github.com/codeql-query-help/java/java-internal-representation-exposure/
Exposure of sensitive information to UI text viewshttps://codeql.github.com/codeql-query-help/java/java-android-sensitive-text/
Exposure of sensitive information to notificationshttps://codeql.github.com/codeql-query-help/java/java-android-sensitive-notification/
Expression always evaluates to the same valuehttps://codeql.github.com/codeql-query-help/java/java-evaluation-to-constant/
Expression language injection (JEXL)https://codeql.github.com/codeql-query-help/java/java-jexl-expression-injection/
Expression language injection (MVEL)https://codeql.github.com/codeql-query-help/java/java-mvel-expression-injection/
Expression language injection (Spring)https://codeql.github.com/codeql-query-help/java/java-spel-expression-injection/
Externalizable but no public no-argument constructorhttps://codeql.github.com/codeql-query-help/java/java-missing-no-arg-constructor-on-externalizable/
Failure to use HTTPS or SFTP URL in Maven artifact upload/downloadhttps://codeql.github.com/codeql-query-help/java/java-maven-non-https-url/
Failure to use secure cookieshttps://codeql.github.com/codeql-query-help/java/java-insecure-cookie/
Field masks field in super classhttps://codeql.github.com/codeql-query-help/java/java-field-masks-super-field/
Finalizer inconsistencyhttps://codeql.github.com/codeql-query-help/java/java-missing-super-finalize/
Futile synchronization on fieldhttps://codeql.github.com/codeql-query-help/java/java-unsafe-sync-on-field/
Groovy Language injectionhttps://codeql.github.com/codeql-query-help/java/java-groovy-injection/
HTTP request type unprotected from CSRFhttps://codeql.github.com/codeql-query-help/java/java-csrf-unprotected-request-type/
HTTP response splittinghttps://codeql.github.com/codeql-query-help/java/java-http-response-splitting/
Hashed value without hashCode definitionhttps://codeql.github.com/codeql-query-help/java/java-hashing-without-hashcode/
Ignored error status of callhttps://codeql.github.com/codeql-query-help/java/java-ignored-error-status-of-call/
Ignored serialization member of record classhttps://codeql.github.com/codeql-query-help/java/java-ignored-serialization-member-of-record-class/
Implicit conversion from array to stringhttps://codeql.github.com/codeql-query-help/java/java-print-array/
Implicit narrowing conversion in compound assignmenthttps://codeql.github.com/codeql-query-help/java/java-implicit-cast-in-compound-assignment/
Implicitly exported Android componenthttps://codeql.github.com/codeql-query-help/java/java-android-implicitly-exported-component/
Improper validation of user-provided array indexhttps://codeql.github.com/codeql-query-help/java/java-improper-validation-of-array-index/
Improper validation of user-provided size used for array constructionhttps://codeql.github.com/codeql-query-help/java/java-improper-validation-of-array-construction/
Improper verification of intent by broadcast receiverhttps://codeql.github.com/codeql-query-help/java/java-improper-intent-verification/
Inconsistent compareTohttps://codeql.github.com/codeql-query-help/java/java-inconsistent-compareto-and-equals/
Inconsistent equals and hashCodehttps://codeql.github.com/codeql-query-help/java/java-inconsistent-equals-and-hashcode/
Inconsistent synchronization for writeObject()https://codeql.github.com/codeql-query-help/java/java-inconsistent-sync-writeobject/
Inconsistent synchronization of getter and setterhttps://codeql.github.com/codeql-query-help/java/java-unsynchronized-getter/
Incorrect absolute value of random numberhttps://codeql.github.com/codeql-query-help/java/java-abs-of-random/
Incorrect serialVersionUID fieldhttps://codeql.github.com/codeql-query-help/java/java-incorrect-serial-version-uid/
Inefficient String constructorhttps://codeql.github.com/codeql-query-help/java/java-inefficient-string-constructor/
Inefficient empty string testhttps://codeql.github.com/codeql-query-help/java/java-inefficient-empty-string-test/
Inefficient output streamhttps://codeql.github.com/codeql-query-help/java/java-inefficient-output-stream/
Inefficient primitive constructorhttps://codeql.github.com/codeql-query-help/java/java-inefficient-boxed-constructor/
Inefficient regular expressionhttps://codeql.github.com/codeql-query-help/java/java-redos/
Inefficient use of key set iteratorhttps://codeql.github.com/codeql-query-help/java/java-inefficient-key-set-iterator/
Information exposure through a stack tracehttps://codeql.github.com/codeql-query-help/java/java-stack-trace-exposure/
Information exposure through an error messagehttps://codeql.github.com/codeql-query-help/java/java-error-message-exposure/
Inner class could be statichttps://codeql.github.com/codeql-query-help/java/java-non-static-nested-class/
Insecure Bean Validationhttps://codeql.github.com/codeql-query-help/java/java-insecure-bean-validation/
Insecure JavaMail SSL Configurationhttps://codeql.github.com/codeql-query-help/java/java-insecure-smtp-ssl/
Insecure LDAP authenticationhttps://codeql.github.com/codeql-query-help/java/java-insecure-ldap-auth/
Insecure basic authenticationhttps://codeql.github.com/codeql-query-help/java/java-insecure-basic-auth/
Insecure local authenticationhttps://codeql.github.com/codeql-query-help/java/java-android-insecure-local-authentication/
Insecure randomnesshttps://codeql.github.com/codeql-query-help/java/java-insecure-randomness/
Insecurely generated keys for local authenticationhttps://codeql.github.com/codeql-query-help/java/java-android-insecure-local-key-gen/
Insertion of sensitive information into log fileshttps://codeql.github.com/codeql-query-help/java/java-sensitive-log/
Intent URI permission manipulationhttps://codeql.github.com/codeql-query-help/java/java-android-intent-uri-permission-manipulation/
Interface cannot be implementedhttps://codeql.github.com/codeql-query-help/java/java-unimplementable-interface/
Iterable wrapping an iteratorhttps://codeql.github.com/codeql-query-help/java/java-iterable-wraps-iterator/
Iterator implementing Iterablehttps://codeql.github.com/codeql-query-help/java/java-iterator-implements-iterable/
JNDI lookup with user-controlled namehttps://codeql.github.com/codeql-query-help/java/java-jndi-injection/
Javadoc has impossible ‘throws’ taghttps://codeql.github.com/codeql-query-help/java/java-inconsistent-javadoc-throws/
LDAP query built from user-controlled sourceshttps://codeql.github.com/codeql-query-help/java/java-ldap-injection/
Leaking sensitive information through a ResultReceiverhttps://codeql.github.com/codeql-query-help/java/java-android-sensitive-result-receiver/
Leaking sensitive information through an implicit Intenthttps://codeql.github.com/codeql-query-help/java/java-android-sensitive-communication/
Left shift by more than the type widthhttps://codeql.github.com/codeql-query-help/java/java-lshift-larger-than-type-width/
Local information disclosure in a temporary directoryhttps://codeql.github.com/codeql-query-help/java/java-local-temp-file-or-directory-information-disclosure/
Log Injectionhttps://codeql.github.com/codeql-query-help/java/java-log-injection/
Loop with unreachable exit conditionhttps://codeql.github.com/codeql-query-help/java/java-unreachable-exit-in-loop/
Misleading indentationhttps://codeql.github.com/codeql-query-help/java/java-misleading-indentation/
Missing JWT signature checkhttps://codeql.github.com/codeql-query-help/java/java-missing-jwt-signature-check/
Missing Override annotationhttps://codeql.github.com/codeql-query-help/java/java-missing-override-annotation/
Missing @Nested annotation on JUnit 5 inner test classhttps://codeql.github.com/codeql-query-help/java/java-junit5-missing-nested-annotation/
Missing catch of NumberFormatExceptionhttps://codeql.github.com/codeql-query-help/java/java-uncaught-number-format-exception/
Missing enum case in switchhttps://codeql.github.com/codeql-query-help/java/java-missing-case-in-switch/
Missing format argumenthttps://codeql.github.com/codeql-query-help/java/java-missing-format-argument/
Missing read or write permission in a content providerhttps://codeql.github.com/codeql-query-help/java/java-android-incomplete-provider-permissions/
Missing space in string literalhttps://codeql.github.com/codeql-query-help/java/java-missing-space-in-concatenation/
Missing super clonehttps://codeql.github.com/codeql-query-help/java/java-missing-call-to-super-clone/
Mocking all public methods of a class may indicate the unit test is testing too muchhttps://codeql.github.com/codeql-query-help/java/java-excessive-public-method-mocking/
Multiplication of remainderhttps://codeql.github.com/codeql-query-help/java/java-multiplication-of-remainder/
Next in hasNext implementationhttps://codeql.github.com/codeql-query-help/java/java-iterator-hasnext-calls-next/
No clone methodhttps://codeql.github.com/codeql-query-help/java/java-missing-clone-method/
Non-case label in switch statementhttps://codeql.github.com/codeql-query-help/java/java-label-in-switch/
Non-explicit control and whitespace charactershttps://codeql.github.com/codeql-query-help/java/java-non-explicit-control-and-whitespace-chars-in-literals/
Non-final method invocation in constructorhttps://codeql.github.com/codeql-query-help/java/java-non-final-call-in-constructor/
Non-synchronized override of synchronized methodhttps://codeql.github.com/codeql-query-help/java/java-non-sync-override/
Not thread-safehttps://codeql.github.com/codeql-query-help/java/java-not-threadsafe/
OGNL Expression Language statement with user-controlled inputhttps://codeql.github.com/codeql-query-help/java/java-ognl-injection/
Overloaded compareTohttps://codeql.github.com/codeql-query-help/java/java-wrong-compareto-signature/
Overloaded equalshttps://codeql.github.com/codeql-query-help/java/java-wrong-equals-signature/
Overly permissive regular expression rangehttps://codeql.github.com/codeql-query-help/java/java-overly-large-range/
Partial path traversal vulnerabilityhttps://codeql.github.com/codeql-query-help/java/java-partial-path-traversal/
Partial path traversal vulnerability from remotehttps://codeql.github.com/codeql-query-help/java/java-partial-path-traversal-from-remote/
Polynomial regular expression used on uncontrolled datahttps://codeql.github.com/codeql-query-help/java/java-polynomial-redos/
Possible confusion of local and fieldhttps://codeql.github.com/codeql-query-help/java/java-local-shadows-field/
Potential database resource leakhttps://codeql.github.com/codeql-query-help/java/java-database-resource-leak/
Potential input resource leakhttps://codeql.github.com/codeql-query-help/java/java-input-resource-leak/
Potential output resource leakhttps://codeql.github.com/codeql-query-help/java/java-output-resource-leak/
Query built by concatenation with a possibly-untrusted stringhttps://codeql.github.com/codeql-query-help/java/java-concatenated-sql-query/
Query built from user-controlled sourceshttps://codeql.github.com/codeql-query-help/java/java-sql-injection/
Race condition in double-checked locking object initializationhttps://codeql.github.com/codeql-query-help/java/java-unsafe-double-checked-locking-init-order/
Race condition in socket authenticationhttps://codeql.github.com/codeql-query-help/java/java-socket-auth-race-condition/
Random used only oncehttps://codeql.github.com/codeql-query-help/java/java-random-used-once/
ReadResolve must have Object return type, not voidhttps://codeql.github.com/codeql-query-help/java/java-wrong-readresolve-signature/
Reading from a world writable filehttps://codeql.github.com/codeql-query-help/java/java-world-writable-file-read/
Reference equality test of boxed typeshttps://codeql.github.com/codeql-query-help/java/java-reference-equality-of-boxed-types/
Reference equality test on stringshttps://codeql.github.com/codeql-query-help/java/java-reference-equality-on-strings/
Regular expression injectionhttps://codeql.github.com/codeql-query-help/java/java-regex-injection/
Resolving XML external entity in user-controlled datahttps://codeql.github.com/codeql-query-help/java/java-xxe/
Result of multiplication cast to wider typehttps://codeql.github.com/codeql-query-help/java/java-integer-multiplication-cast-to-long/
Safe publicationhttps://codeql.github.com/codeql-query-help/java/java-safe-publication/
Self assignmenthttps://codeql.github.com/codeql-query-help/java/java-redundant-assignment/
Sensitive cookies without the HttpOnly response header sethttps://codeql.github.com/codeql-query-help/java/java-sensitive-cookie-not-httponly/
Serializable but no void constructorhttps://codeql.github.com/codeql-query-help/java/java-missing-no-arg-constructor-on-serializable/
Serializable inner class of non-serializable classhttps://codeql.github.com/codeql-query-help/java/java-non-serializable-inner-class/
Serialization methods do not match required signaturehttps://codeql.github.com/codeql-query-help/java/java-wrong-object-serialization-signature/
Server-side request forgeryhttps://codeql.github.com/codeql-query-help/java/java-ssrf/
Server-side template injectionhttps://codeql.github.com/codeql-query-help/java/java-server-side-template-injection/
Sleep with lock heldhttps://codeql.github.com/codeql-query-help/java/java-sleep-with-lock-held/
Spin on fieldhttps://codeql.github.com/codeql-query-help/java/java-spin-on-field/
Spurious Javadoc @param tagshttps://codeql.github.com/codeql-query-help/java/java-unknown-javadoc-parameter/
Start of thread in constructorhttps://codeql.github.com/codeql-query-help/java/java-thread-start-in-constructor/
Subtle call to inherited methodhttps://codeql.github.com/codeql-query-help/java/java-subtle-inherited-call/
Suspicious date formathttps://codeql.github.com/codeql-query-help/java/java-suspicious-date-format/
Synchronization on boxed types or stringshttps://codeql.github.com/codeql-query-help/java/java-sync-on-boxed-types/
Thread-unsafe use of DateFormathttps://codeql.github.com/codeql-query-help/java/java-thread-unsafe-dateformat/
Time-of-check time-of-use race conditionhttps://codeql.github.com/codeql-query-help/java/java-toctou-race-condition/
Trust boundary violationhttps://codeql.github.com/codeql-query-help/java/java-trust-boundary-violation/
Type bound extends a final classhttps://codeql.github.com/codeql-query-help/java/java-type-bound-extends-final/
Type mismatch on container accesshttps://codeql.github.com/codeql-query-help/java/java-type-mismatch-access/
Type mismatch on container modificationhttps://codeql.github.com/codeql-query-help/java/java-type-mismatch-modification/
Type variable hides another typehttps://codeql.github.com/codeql-query-help/java/java-type-variable-hides-type/
Typo in equalshttps://codeql.github.com/codeql-query-help/java/java-equals-typo/
Typo in hashCodehttps://codeql.github.com/codeql-query-help/java/java-hashcode-typo/
Typo in toStringhttps://codeql.github.com/codeql-query-help/java/java-tostring-typo/
URL forward from a remote sourcehttps://codeql.github.com/codeql-query-help/java/java-unvalidated-url-forward/
URL redirection from remote sourcehttps://codeql.github.com/codeql-query-help/java/java-unvalidated-url-redirection/
Uncontrolled command linehttps://codeql.github.com/codeql-query-help/java/java-command-line-injection/
Uncontrolled data in arithmetic expressionhttps://codeql.github.com/codeql-query-help/java/java-uncontrolled-arithmetic/
Uncontrolled data used in content resolutionhttps://codeql.github.com/codeql-query-help/java/java-android-unsafe-content-uri-resolution/
Uncontrolled data used in path expressionhttps://codeql.github.com/codeql-query-help/java/java-path-injection/
Underscore used as identifierhttps://codeql.github.com/codeql-query-help/java/java-underscore-identifier/
Unreachable catch clausehttps://codeql.github.com/codeql-query-help/java/java-unreachable-catch-clause/
Unread local variablehttps://codeql.github.com/codeql-query-help/java/java-local-variable-is-never-read/
Unreleased lockhttps://codeql.github.com/codeql-query-help/java/java-unreleased-lock/
Unsafe certificate trusthttps://codeql.github.com/codeql-query-help/java/java-unsafe-cert-trust/
Unsafe hostname verificationhttps://codeql.github.com/codeql-query-help/java/java-unsafe-hostname-verification/
Unsafe resource fetching in Android WebViewhttps://codeql.github.com/codeql-query-help/java/java-android-unsafe-android-webview-fetch/
Unsafe use of getResourcehttps://codeql.github.com/codeql-query-help/java/java-unsafe-get-resource/
Unused classes and interfaceshttps://codeql.github.com/codeql-query-help/java/java-unused-reference-type/
Unused format argumenthttps://codeql.github.com/codeql-query-help/java/java-unused-format-argument/
Unused labelhttps://codeql.github.com/codeql-query-help/java/java-unused-label/
Use of RSA algorithm without OAEPhttps://codeql.github.com/codeql-query-help/java/java-rsa-without-oaep/
Use of VisibleForTesting in production codehttps://codeql.github.com/codeql-query-help/java/java-visible-for-testing-abuse/
Use of String#replaceAll with a first argument which is not a regular expressionhttps://codeql.github.com/codeql-query-help/java/java-string-replace-all-with-non-regex/
Use of a broken or risky cryptographic algorithmhttps://codeql.github.com/codeql-query-help/java/java-weak-cryptographic-algorithm/
Use of a cryptographic algorithm with insufficient key sizehttps://codeql.github.com/codeql-query-help/java/java-insufficient-key-size/
Use of a potentially broken or risky cryptographic algorithmhttps://codeql.github.com/codeql-query-help/java/java-potentially-weak-cryptographic-algorithm/
Use of a potentially dangerous functionhttps://codeql.github.com/codeql-query-help/java/java-potentially-dangerous-function/
Use of a predictable seed in a secure random number generatorhttps://codeql.github.com/codeql-query-help/java/java-predictable-seed/
Use of default toString()https://codeql.github.com/codeql-query-help/java/java-call-to-object-tostring/
Use of externally-controlled format stringhttps://codeql.github.com/codeql-query-help/java/java-tainted-format-string/
Use of implicit PendingIntentshttps://codeql.github.com/codeql-query-help/java/java-android-implicit-pendingintents/
Useless comparison testhttps://codeql.github.com/codeql-query-help/java/java-constant-comparison/
Useless null checkhttps://codeql.github.com/codeql-query-help/java/java-useless-null-check/
Useless parameterhttps://codeql.github.com/codeql-query-help/java/java-unused-parameter/
Useless toString on Stringhttps://codeql.github.com/codeql-query-help/java/java-useless-tostring-call/
Useless type testhttps://codeql.github.com/codeql-query-help/java/java-useless-type-test/
User-controlled bypass of sensitive methodhttps://codeql.github.com/codeql-query-help/java/java-user-controlled-bypass/
User-controlled data in arithmetic expressionhttps://codeql.github.com/codeql-query-help/java/java-tainted-arithmetic/
User-controlled data in numeric casthttps://codeql.github.com/codeql-query-help/java/java-tainted-numeric-cast/
User-controlled data used in permissions checkhttps://codeql.github.com/codeql-query-help/java/java-tainted-permissions-check/
Using a static initialization vector for encryptionhttps://codeql.github.com/codeql-query-help/java/java-static-initialization-vector/
Wait on conditionhttps://codeql.github.com/codeql-query-help/java/java-wait-on-condition-interface/
Whitespace contradicts operator precedencehttps://codeql.github.com/codeql-query-help/java/java-whitespace-contradicts-precedence/
Wrong NaN comparisonhttps://codeql.github.com/codeql-query-help/java/java-comparison-with-nan/
XPath injectionhttps://codeql.github.com/codeql-query-help/java/java-xml-xpath-injection/
XSLT transformation with user-controlled stylesheethttps://codeql.github.com/codeql-query-help/java/java-xslt-injection/
Zero threads set for java.util.concurrent.ScheduledThreadPoolExecutorhttps://codeql.github.com/codeql-query-help/java/java-java-util-concurrent-scheduledthreadpoolexecutor/
TrustManager that accepts all certificateshttps://codeql.github.com/codeql-query-help/java/java-insecure-trustmanager/
notify instead of notifyAllhttps://codeql.github.com/codeql-query-help/java/java-notify-instead-of-notify-all/
CodeQL query help for JavaScript and TypeScripthttps://codeql.github.com/codeql-query-help/javascript/
CodeQL query help for Pythonhttps://codeql.github.com/codeql-query-help/python/
CodeQL query help for Rubyhttps://codeql.github.com/codeql-query-help/ruby/
CodeQL query help for Rusthttps://codeql.github.com/codeql-query-help/rust/
CodeQL query help for Swifthttps://codeql.github.com/codeql-query-help/swift/
CodeQL CWE coveragehttps://codeql.github.com/codeql-query-help/codeql-cwe-coverage/
CodeQL query help documentationhttps://codeql.github.com/codeql-query-help/
CodeQL query help for Java and Kotlinhttps://codeql.github.com/codeql-query-help/java/
https://codeql.github.com/codeql-query-help/java/java-android-websettings-javascript-enabled/#android-webview-javascript-settings
Click to see the query in the CodeQL repositoryhttps://github.com/github/codeql/blob/main/java/ql/src/Security/CWE/CWE-079/AndroidWebViewSettingsEnabledJavaScript.ql
https://codeql.github.com/codeql-query-help/java/java-android-websettings-javascript-enabled/#recommendation
https://codeql.github.com/codeql-query-help/java/java-android-websettings-javascript-enabled/#example
https://codeql.github.com/codeql-query-help/java/java-android-websettings-javascript-enabled/#references
setJavaScriptEnabledhttps://developer.android.com/reference/android/webkit/WebSettings#setJavaScriptEnabled(boolean)
CWE-79https://cwe.mitre.org/data/definitions/79.html
https://twitter.com/github
https://www.facebook.com/GitHub
https://www.youtube.com/github
https://www.linkedin.com/company/github
https://github.com/github
Terms https://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacy https://docs.github.com/site-policy/privacy-policies/github-privacy-statement

Viewport: width=device-width, initial-scale=1


URLs of crawlers that visited me.