code
stringlengths 14
2.05k
| label
int64 0
1
| programming_language
stringclasses 7
values | cwe_id
stringlengths 6
14
| cwe_name
stringlengths 5
98
⌀ | description
stringlengths 36
379
⌀ | url
stringlengths 36
48
⌀ | label_name
stringclasses 2
values |
---|---|---|---|---|---|---|---|
public void writeData(LPDataOutput output) throws IOException {
output.writeByteArray(payload);
output.writeInt(identifier);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
payload = input.readByteArray();
identifier = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeUTF(getName());
output.writeInt(getIdentification());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
setName(input.readUTF());
setIdentification(input.readInt());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public DebugTargetResponse(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
mode = TargetMode.values()[input.readByte()];
int size = input.readInt();
additions = new Object[size];
for (int i = 0; i < size; i++) {
byte[] bytes = input.readByteArray();
ByteArrayInputStream bis = new ByteArrayInputStream(bytes);
ObjectInput in = new ObjectInputStream(bis);
try {
Object o = in.readObject();
additions[i] = o;
} catch (ClassNotFoundException e) {
throw new UnsupportedOperationException(e);
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeByte(mode.ordinal());
output.writeInt(additions.length);
for (Object addition : additions) {
ByteArrayOutputStream bos = new ByteArrayOutputStream();
ObjectOutput out = null;
out = new ObjectOutputStream(bos);
out.writeObject(addition);
output.writeByteArray(bos.toByteArray());
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(slotId);
output.writeItemIdentifierStack(ItemIdentifierStack.getFromStack(stack));
output.writeInt(button);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
slotId = input.readInt();
stack = input.readItemIdentifierStack().makeNormalStack();
button = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(slotNumber);
output.writeBitSet(flags);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
slotNumber = input.readInt();
flags = input.readBitSet();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
guiID = input.readInt();
windowID = input.readInt();
guiData = input.readByteArray();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(guiID);
output.writeInt(windowID);
output.writeByteArray(guiData);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
guiID = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(getGuiID());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public GuiReopenPacket(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
buttonId = input.readInt();
state = input.readBoolean();
slot = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeInt(buttonId);
output.writeBoolean(state);
output.writeInt(slot);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
mode = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(mode);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(integer2);
output.writeInt(integer3);
output.writeInt(integer4);
if (string1 == null) {
string1 = "";
}
output.writeUTF(string1);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
integer2 = input.readInt();
integer3 = input.readInt();
integer4 = input.readInt();
string1 = input.readUTF();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(isDefault);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
isDefault = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
nbt = input.readNBTTagCompound();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeNBTTagCompound(nbt);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
isLimited = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(isLimited);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(timeOut);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
timeOut = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(sinkSize);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
sinkSize = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(pos);
if (pos != -1) {
output.writeBoolean(isNBT);
} else {
output.writeBitSet(ignoreData);
output.writeBitSet(ignoreNBT);
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
pos = input.readInt();
if (pos != -1) {
isNBT = input.readBoolean();
} else {
ignoreData = input.readBitSet();
ignoreNBT = input.readBitSet();
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
mode = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(mode);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(hasPatternUpgrade);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
hasPatternUpgrade = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
targetPos = input.readSet(LPDataInput::readLPPosition);
subTypes = input.readArrayList(data1 -> data1.readEnum(CoreMultiBlockPipe.SubBlockTypeForShare.class));
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeCollection(targetPos, LPDataOutput::writeLPPosition);
output.writeCollection(subTypes, LPDataOutput::writeEnum);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public MultiBlockCoordinatesPacket(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeCollection(used, LPDataOutput::writeResource);
output.writeCollection(missing, LPDataOutput::writeResource);
// ToDo: ???
output.writeByte(0);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
used = input.readArrayList(LPDataInput::readResource);
missing = input.readArrayList(LPDataInput::readResource);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeCollection(items, LPDataOutput::writeResource);
output.writeBoolean(isFlag());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
items = input.readArrayList(LPDataInput::readResource);
setFlag(input.readBoolean());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeResource(stack);
output.writeLinkedLogisticsOrderList(orders);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
stack = input.readResource();
orders = input.readLinkedLogisticsOrderList();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeIntArray(amount);
output.writeIntArray(liquidSatelliteIdArray);
output.writeInt(liquidSatelliteId);
output.writeInt(satelliteId);
output.writeIntArray(advancedSatelliteIdArray);
output.writeInt(priority);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
amount = input.readIntArray();
liquidSatelliteIdArray = input.readIntArray();
liquidSatelliteId = input.readInt();
satelliteId = input.readInt();
advancedSatelliteIdArray = input.readIntArray();
priority = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
content = input.readArrayList(input1 -> {
GuiRecipeImport.Canidates can = new GuiRecipeImport.Canidates(new TreeSet<>());
can.order = input1.readArrayList(LPDataInput::readItemIdentifierStack);
return can;
});
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeCollection(content, (data, object) -> data.writeCollection(object.order,
(IWriteListObject<ItemIdentifierStack>) LPDataOutput::writeItemIdentifierStack));
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
if (input.readBoolean()) {
stack = input.readItemIdentifierStack();
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
if (stack == null) {
output.writeBoolean(false);
} else {
output.writeBoolean(true);
output.writeItemIdentifierStack(stack);
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public Triplet<ItemIdentifierStack, Pair<Integer /* Time */, Integer /* BufferCounter */>, LPTravelingItemServer> readObject(LPDataInput input)
throws IOException {
return new Triplet<>(input.readItemIdentifierStack(), null, null);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeObject(LPDataOutput output,
Triplet<ItemIdentifierStack, Pair<Integer /* Time */, Integer /* BufferCounter */>, LPTravelingItemServer> object) throws IOException {
output.writeItemIdentifierStack(object.getValue1());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
response = input.readArrayList(LPDataInput::readInt);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeCollection(response, LPDataOutput::writeInt);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public ParticleFX(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(particles.size());
for (ParticleCount pc : particles) {
output.writeByte(pc.getParticle().ordinal());
output.writeInt(pc.getAmount());
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
int nparticles = input.readInt();
particles = new ArrayList<>(nparticles);
for (int i = 0; i < nparticles; i++) {
int particle = input.readByte();
int amount = input.readInt();
particles.add(new ParticleCount(Particles.values()[particle], amount));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public PipeContentPacket(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
item = input.readItemIdentifierStack();
travelId = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeItemIdentifierStack(item);
output.writeInt(travelId);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
isServer = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeBoolean(isServer);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public PipeFluidUpdate(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
bits = input.readBitSet();
for (int i = 0; i < renderCache.length; i++) {
if (bits.get(i)) {
renderCache[i] = new FluidStack(FluidRegistry.getFluid(input.readInt()), input.readInt(), input.readNBTTagCompound());
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
for (int i = 0; i < renderCache.length; i++) {
bits.set(i, renderCache[i] != null);
}
output.writeBitSet(bits);
for (FluidStack aRenderCache : renderCache) {
if (aRenderCache != null) {
output.writeInt(FluidRegistry.getFluidID(aRenderCache.getFluid()));
output.writeInt(aRenderCache.amount);
output.writeNBTTagCompound(aRenderCache.tag);
}
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
for (LogisticsOrder order : manager) {
output.writeByte(1);
output.writeOrderInfo(order);
}
output.writeByte(0);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
clientOrder = new LinkedList<>();
while (input.readByte() == 1) {
clientOrder.add(input.readOrderInfo());
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeBoolean(start);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
start = input.readBoolean();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
travelId = input.readInt();
speed = input.readFloat();
position = input.readFloat();
this.input = input.readForgeDirection();
output = input.readForgeDirection();
yaw = input.readFloat();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(travelId);
output.writeFloat(speed);
output.writeFloat(position);
output.writeForgeDirection(input);
output.writeForgeDirection(this.output);
output.writeFloat(yaw);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public PipeSignTypes(int id) {
super(id);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
types = input.readArrayList(LPDataInput::readInt);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeCollection(types, LPDataOutput::writeInt);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
IClientState[] clientStates = new IClientState[] { renderState, coreState, bcPluggableState, pipe };
byte[][] clientStateBuffers = new byte[][] { bytesRenderState, bytesCoreState, bytesBCPluggableState, bytesPipe };
for (int i = 0; i < clientStates.length; i++) {
clientStateBuffers[i] = LPDataIOWrapper.collectData(clientStates[i]::writeData);
output.writeByteArray(clientStateBuffers[i]);
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
bytesRenderState = input.readByteArray();
bytesCoreState = input.readByteArray();
bytesBCPluggableState = input.readByteArray();
bytesPipe = input.readByteArray();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void processPacket(EntityPlayer player) {
LogisticsTileGenericPipe pipe = this.getPipe(player.getEntityWorld());
if (pipe == null) {
return;
}
try {
LPDataIOWrapper.provideData(bytesRenderState, pipe.renderState::readData);
LPDataIOWrapper.provideData(bytesCoreState, pipe.coreState::readData);
LPDataIOWrapper.provideData(bytesBCPluggableState, pipe.bcPlugableState::readData);
pipe.afterStateUpdated();
LPDataIOWrapper.provideData(bytesPipe, pipe.pipe::readData);
} catch (IOException e) {
throw new RuntimeException(e);
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
while (input.readBoolean()) {
lasers.add(new LaserData().readData(input));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
for (LaserData laser : lasers) {
output.writeBoolean(true);
laser.writeData(output);
}
output.writeBoolean(false);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
tagetPosX = input.readInt();
tagetPosY = input.readInt();
tagetPosZ = input.readInt();
slot = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(tagetPosX);
output.writeInt(tagetPosY);
output.writeInt(tagetPosZ);
output.writeInt(slot);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
inventorySlot = input.readInt();
slot = input.readInt();
pipePosX = input.readInt();
pipePosY = input.readInt();
pipePosZ = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(inventorySlot);
output.writeInt(slot);
output.writeInt(pipePosX);
output.writeInt(pipePosY);
output.writeInt(pipePosZ);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
slot = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
super.writeData(output);
output.writeInt(slot);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
initData();
super.writeData(output);
output.writeInt(stat_session_sent);
output.writeInt(stat_session_recieved);
output.writeInt(stat_session_relayed);
output.writeLong(stat_lifetime_sent);
output.writeLong(stat_lifetime_recieved);
output.writeLong(stat_lifetime_relayed);
output.writeInt(server_routing_table_size);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
super.readData(input);
stat_session_sent = input.readInt();
stat_session_recieved = input.readInt();
stat_session_relayed = input.readInt();
stat_lifetime_sent = input.readLong();
stat_lifetime_recieved = input.readLong();
stat_lifetime_relayed = input.readLong();
server_routing_table_size = input.readInt();
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void processPacket(EntityPlayer player) {
MovingObjectPosition box = FMLClientHandler.instance().getClient().objectMouseOver;
if (box == null) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(RoutingUpdateTargetResponse.class).setMode(TargetMode.None));
} else if (box.typeOfHit == MovingObjectType.BLOCK) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(RoutingUpdateTargetResponse.class).setMode(TargetMode.Block)
.setAdditions(new Object[] { box.blockX, box.blockY, box.blockZ }));
} else if (box.typeOfHit == MovingObjectType.ENTITY) {
MainProxy.sendPacketToServer(PacketHandler.getPacket(RoutingUpdateTargetResponse.class).setMode(TargetMode.Entity)
.setAdditions(new Object[] { box.entityHit.getEntityId() }));
}
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {
exitRoute = input.readExitRoute(MainProxy.getClientMainWorld());
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void writeData(LPDataOutput output) throws IOException {
output.writeExitRoute(exitRoute);
} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
public void readData(LPDataInput input) throws IOException {} | 0 | Java | CWE-502 | Deserialization of Untrusted Data | The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | https://cwe.mitre.org/data/definitions/502.html | vulnerable |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.