code
stringlengths 14
2.05k
| label
int64 0
1
| programming_language
stringclasses 7
values | cwe_id
stringlengths 6
14
| cwe_name
stringlengths 5
98
⌀ | description
stringlengths 36
379
⌀ | url
stringlengths 36
48
⌀ | label_name
stringclasses 2
values |
---|---|---|---|---|---|---|---|
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(type != null);
if (type != null) {
output.writeEnum(type);
output.writeInt(positionInt);
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
if (input.readBoolean()) {
type = input.readEnum(ModulePositionType.class);
positionInt = input.readInt();
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeNBTTagCompound(tag);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
tag = input.readNBTTagCompound();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeNBTTagCompound(tag);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
tag = input.readNBTTagCompound();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeItemIdentifierStack(stack);
output.writeInt(dimension);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
stack = input.readItemIdentifierStack();
dimension = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(getInteger());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
setInteger(input.readInt());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeUTF(getString());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
setString(input.readUTF());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
int size = input.readInt();
for (int i = 0; i < size; i++) {
getStringList().add(input.readUTF());
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(getStringList().size());
for (int i = 0; i < getStringList().size(); i++) {
output.writeUTF(getStringList().get(i));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
targetType = input.readItemIdentifier();
if (input.readBoolean()) {
for (int i = 0; i < 9; i++) {
ignore_dmg[i] = input.readBoolean();
ignore_nbt[i] = input.readBoolean();
use_od[i] = input.readBoolean();
use_category[i] = input.readBoolean();
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeItemIdentifier(targetType);
output.writeBoolean(isFuzzy);
if (isFuzzy) {
for (int i = 0; i < 9; i++) {
output.writeBoolean(ignore_dmg[i]);
output.writeBoolean(ignore_nbt[i]);
output.writeBoolean(use_od[i]);
output.writeBoolean(use_category[i]);
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeCollection(trackingList, (output1, object) -> object.writeToLPData(output1));
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
trackingList = input.readArrayList(data1 -> {
TrackingTask object = new TrackingTask();
object.readFromLPData(data1);
return object;
});
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
dir = input.readForgeDirection();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeForgeDirection(dir);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeIntArray(amount);
output.writeBoolean(cleanupExclude);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
amount = input.readIntArray();
cleanupExclude = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(patternUpgarde);
output.writeIntArray(slotArray);
output.writeBoolean(isLimit);
output.writeInt(mode);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
patternUpgarde = input.readBoolean();
slotArray = input.readIntArray();
isLimit = input.readBoolean();
mode = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
areItemsIncluded = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(areItemsIncluded);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(extractorMode);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
extractorMode = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(timeOut);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
timeOut = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
isAdvancedSat = input.readBoolean();
liquidCrafter = input.readInt();
amount = input.readIntArray();
hasByproductExtractor = input.readBoolean();
isFuzzy = input.readBoolean();
cleanupSize = input.readInt();
cleanupExclude = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(isAdvancedSat);
output.writeInt(liquidCrafter);
output.writeIntArray(amount);
output.writeBoolean(hasByproductExtractor);
output.writeBoolean(isFuzzy);
output.writeInt(cleanupSize);
output.writeBoolean(cleanupExclude);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeForgeDirection(sneakyOrientation);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
sneakyOrientation = input.readForgeDirection();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
isDefaultRoute = input.readBoolean();
hasFuzzyUpgrade = input.readBoolean();
ignoreData = input.readBitSet();
ignoreNBT = input.readBitSet();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(isDefaultRoute);
output.writeBoolean(hasFuzzyUpgrade);
output.writeBitSet(ignoreData);
output.writeBitSet(ignoreNBT);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
exclude = input.readBoolean();
extractorMode = input.readInt();
isActive = input.readBoolean();
sneakyOrientation = input.readForgeDirection();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(exclude);
output.writeInt(extractorMode);
output.writeBoolean(isActive);
output.writeForgeDirection(sneakyOrientation);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeByteArray(content);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
content = input.readByteArray();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
enumSet = EnumSet.noneOf(CraftingDependency.class);
for (CraftingDependency type : CraftingDependency.values()) {
if (input.readBoolean()) {
enumSet.add(type);
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
for (CraftingDependency type : CraftingDependency.values()) {
output.writeBoolean(enumSet.contains(type));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
throw new RuntimeException("This packet should never be used");
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
throw new RuntimeException("This packet should never be used");
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(content.length);
for (int i = 0; i < content.length; i++) {
final ItemStack itemstack = content[i];
if (itemstack != null) {
output.writeByte(i);
output.writeInt(Item.getIdFromItem(itemstack.getItem()));
output.writeInt(itemstack.stackSize);
output.writeInt(itemstack.getItemDamage());
output.writeNBTTagCompound(itemstack.getTagCompound());
}
}
output.writeByte(-1); // mark packet end
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
content = new ItemStack[input.readInt()];
byte index = input.readByte();
while (index != -1) { // read until the end
final int itemID = input.readInt();
int stackSize = input.readInt();
int damage = input.readInt();
ItemStack stack = new ItemStack(Item.getItemById(itemID), stackSize, damage);
stack.setTagCompound(input.readNBTTagCompound());
content[index] = stack;
index = input.readByte(); // read the next slot
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
LogisticsPipes.getClientPlayerConfig().readData(input);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
config.writeData(output);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
config.writeData(output);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
config = new PlayerConfig(null);
config.readData(input);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
ident = input.readItemIdentifierStack().getItem();
name = input.readUTF();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeItemIdentifierStack(ident.makeStack(0));
output.writeUTF(name);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
item = input.readItemIdentifier();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeItemIdentifier(item);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(down);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
down = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public CraftingCycleRecipe(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
targetType = input.readItemIdentifier();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeItemIdentifier(targetType);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public CraftingSetType(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
length = input.readFloat();
dir = input.readForgeDirection();
color = input.readInt();
reverse = input.readBoolean();
renderBall = input.readBoolean();
remove = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeFloat(length);
output.writeForgeDirection(dir);
output.writeInt(color);
output.writeBoolean(reverse);
output.writeBoolean(renderBall);
output.writeBoolean(remove);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public PowerPacketLaser(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeDouble(getDouble());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
setDouble(input.readDouble());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeItemIdentifier(item);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
item = input.readItemIdentifier();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
identList = input.readArrayList(LPDataInput::readItemIdentifierStack);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeCollection(identList, LPDataOutput::writeItemIdentifierStack);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeLong(uuid.getMostSignificantBits());
output.writeLong(uuid.getLeastSignificantBits());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
uuid = new UUID(input.readLong(), input.readLong());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(buttonID);
super.writeData(output);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
buttonID = input.readInt();
super.readData(input);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
mode = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(mode);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
pipeId = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(pipeId);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(windowID);
output.writeUTF(line);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
windowID = input.readInt();
line = input.readUTF();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(windowID);
output.writeUTF(title);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
windowID = input.readInt();
title = input.readUTF();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(windowID);
output.writeCollection(status, new IWriteListObject<StatusEntry>() {
@Override
public void writeObject(LPDataOutput output, StatusEntry entry) throws IOException {
output.writeUTF(entry.name);
output.writeBoolean(entry.subEntry != null);
if (entry.subEntry != null) {
output.writeCollection(entry.subEntry, this);
}
}
});
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
windowID = input.readInt();
status = input.readArrayList(new IReadListObject<StatusEntry>() {
@Override
public StatusEntry readObject(LPDataInput input) throws IOException {
StatusEntry status = new StatusEntry();
status.name = input.readUTF();
if (input.readBoolean()) {
status.subEntry = input.readArrayList(this);
}
return status;
}
});
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void processPacket(EntityPlayer player) {
MovingObjectPosition box = FMLClientHandler.instance().getClient().objectMouseOver;
if (box == null) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(DebugTargetResponse.class).setMode(DebugTargetResponse.TargetMode.None));
} else if (box.typeOfHit == MovingObjectPosition.MovingObjectType.BLOCK) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(DebugTargetResponse.class).setMode(DebugTargetResponse.TargetMode.Block)
.setAdditions(new Object[] { box.blockX, box.blockY, box.blockZ }));
} else if (box.typeOfHit == MovingObjectPosition.MovingObjectType.ENTITY) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(DebugTargetResponse.class).setMode(DebugTargetResponse.TargetMode.Entity)
.setAdditions(new Object[] { box.entityHit.getEntityId() }));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.