├── .gitignore ├── LICENSE ├── README.md ├── advisory ├── DSpace__DSpace_CVE-2016-10726_4.4.json ├── DSpace__DSpace_CVE-2022-31192_5.10.json ├── DSpace__DSpace_CVE-2022-31194_5.10.json ├── DSpace__DSpace_CVE-2022-31195_5.10.json ├── ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json ├── ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json ├── Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json ├── OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json ├── SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json ├── alibaba__nacos_CVE-2021-44667_2.0.3.json ├── alibaba__one-java-agent_CVE-2022-25842_0.0.1.json ├── apache__activemq_CVE-2014-3576_5.10.1.json ├── apache__activemq_CVE-2019-0222_5.15.8.json ├── apache__activemq_CVE-2020-11998_5.15.12.json ├── apache__camel_CVE-2018-8041_2.20.3.json ├── apache__camel_CVE-2019-0194_2.21.4.json ├── apache__dolphinscheduler_CVE-2022-26884_2.0.5.json ├── apache__dolphinscheduler_CVE-2022-34662_2.0.9.json ├── apache__dolphinscheduler_CVE-2023-49109_3.2.0.json ├── apache__dolphinscheduler_CVE-2023-51770_3.2.0.json ├── apache__dubbo_CVE-2021-30180_2.7.9.json ├── apache__flink_CVE-2020-17519_1.11.2.json ├── apache__incubator-dubbo_CVE-2021-30181_2.6.8.json ├── apache__jspwiki_CVE-2019-0225_2.11.0.M2.json ├── apache__jspwiki_CVE-2019-10076_2.11.0.M3.json ├── apache__jspwiki_CVE-2019-10077_2.11.0.M3.json ├── apache__jspwiki_CVE-2019-10078_2.11.0.M3.json ├── apache__jspwiki_CVE-2019-10089_2.11.0.M4.json ├── apache__jspwiki_CVE-2022-46907_2.11.3.json ├── apache__mina-sshd_CVE-2023-35887_2.9.2.json ├── apache__myfaces_CVE-2011-4367_2.0.11.json ├── apache__nifi_CVE-2022-33140_1.16.2.json ├── apache__rocketmq_CVE-2019-17572_4.6.0.json ├── apache__rocketmq_CVE-2023-33246_5.1.0.json ├── apache__rocketmq_CVE-2023-37582_4.9.6.json ├── apache__shiro_CVE-2023-34478_1.11.0.json ├── apache__shiro_CVE-2023-46749_1.12.0.json ├── apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json ├── apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json ├── apache__struts_CVE-2020-17530_2.5.25.json ├── apache__tika_CVE-2018-11762_1.18.json ├── apache__uima-uimaj_CVE-2022-32287_3.3.0.json ├── asf__commons-io_CVE-2021-29425_2.6.json ├── asf__commons-text_CVE-2022-42889_1.9.json ├── asf__cxf_CVE-2016-6812_3.0.11.json ├── asf__cxf_CVE-2019-17573_3.2.11.json ├── asf__james-project_CVE-2022-22931_3.6.0.json ├── asf__karaf_CVE-2022-22932_4.3.5.json ├── asf__nifi_CVE-2023-34468_1.21.0.json ├── asf__nifi_CVE-2023-36542_1.22.0.json ├── asf__tapestry-5_CVE-2019-0207_5.4.4.json ├── aws__aws-sdk-java_CVE-2022-31159_1.12.260.json ├── codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json ├── codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json ├── codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json ├── codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json ├── codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json ├── diffplug__goomph_CVE-2022-26049_3.37.1.json ├── dromara__hutool_CVE-2018-17297_4.1.11.json ├── eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json ├── eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json ├── fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json ├── ff4j__ff4j_CVE-2022-44262_1.8.13.json ├── hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json ├── hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json ├── hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json ├── jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json ├── jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json ├── jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json ├── jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json ├── jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json ├── jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json ├── jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json ├── jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json ├── jlangch__venice_CVE-2022-36007_1.10.16.json ├── jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json ├── joniles__mpxj_CVE-2020-35460_8.3.4.json ├── jstachio__jstachio_CVE-2023-33962_1.0.0.json ├── keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json ├── keycloak__keycloak_CVE-2022-1274_20.0.3.json ├── keycloak__keycloak_CVE-2022-3782_20.0.1.json ├── keycloak__keycloak_CVE-2022-4137_20.0.3.json ├── keycloak__keycloak_CVE-2022-4361_21.1.1.json ├── kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json ├── nahsra__antisamy_CVE-2016-10006_1.5.3.json ├── nahsra__antisamy_CVE-2017-14735_1.5.6.json ├── nahsra__antisamy_CVE-2022-28367_1.6.5.json ├── nahsra__antisamy_CVE-2022-29577_1.6.6.1.json ├── payara__Payara_CVE-2022-37422_5.2022.2.json ├── perwendel__spark_CVE-2016-9177_2.5.1.json ├── perwendel__spark_CVE-2018-9159_2.7.1.json ├── rhuss__jolokia_CVE-2018-1000129_1.4.0.json ├── spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json ├── spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json ├── spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json ├── spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json ├── spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json ├── square__retrofit_CVE-2018-1000850_2.4.0.json ├── srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json ├── testng-team__testng_CVE-2022-4065_7.5.json ├── undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json ├── vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json ├── vert-x3__vertx-web_CVE-2019-17640_3.9.3.json ├── whitesource__curekit_CVE-2022-23082_1.1.3.json ├── wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json ├── x-stream__xstream_CVE-2013-7285_1.4.6.json ├── x-stream__xstream_CVE-2020-26217_1.4.14-java7.json ├── x-stream__xstream_CVE-2021-21345_1.4.15.json ├── xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json ├── xuxueli__xxl-job_CVE-2020-29204_2.2.0.json ├── xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json ├── xwiki__xwiki-commons_CVE-2023-29201_14.5.json ├── xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.json ├── xwiki__xwiki-commons_CVE-2023-31126_14.10.3.json ├── xwiki__xwiki-commons_CVE-2023-36471_14.10.5.json ├── xwiki__xwiki-rendering_CVE-2023-32070_14.5.json ├── xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.json ├── yamcs__yamcs_CVE-2023-45277_5.8.6.json ├── yamcs__yamcs_CVE-2023-45278_5.8.6.json └── zeroturnaround__zt-zip_CVE-2018-1002201_1.12.json ├── baselines ├── output_infer_result.py ├── output_snyk_result.py ├── output_spotbugs_result.py ├── readme.md ├── results │ ├── .gitignore │ └── .keep ├── run_codeql.py ├── run_infer.py ├── run_snyk.py └── run_spotbugs.py ├── data ├── README.md ├── build_info.csv ├── fix_info.csv └── project_info.csv ├── java-env ├── .gitignore └── .keep ├── package-names ├── DSpace__DSpace_CVE-2016-10726_4.4.txt ├── DSpace__DSpace_CVE-2022-31192_5.10.txt ├── DSpace__DSpace_CVE-2022-31194_5.10.txt ├── DSpace__DSpace_CVE-2022-31195_5.10.txt ├── ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.txt ├── ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.txt ├── Graylog2__graylog2-server_CVE-2023-41044_5.1.2.txt ├── OWASP__json-sanitizer_CVE-2020-13973_1.2.0.txt ├── SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.txt ├── alibaba__nacos_CVE-2021-44667_2.0.3.txt ├── alibaba__one-java-agent_CVE-2022-25842_0.0.1.txt ├── apache__activemq_CVE-2014-3576_5.10.2.txt ├── apache__activemq_CVE-2019-0222_5.15.8.txt ├── apache__activemq_CVE-2020-11998_5.15.12.txt ├── apache__camel_CVE-2018-8041_2.20.3.txt ├── apache__camel_CVE-2019-0194_2.21.4.txt ├── apache__dolphinscheduler_CVE-2022-26884_2.0.5.txt ├── apache__dolphinscheduler_CVE-2022-34662_2.0.9.txt ├── apache__dolphinscheduler_CVE-2023-49109_3.2.0.txt ├── apache__dolphinscheduler_CVE-2023-51770_3.2.0.txt ├── apache__dubbo_CVE-2021-30180_2.7.9.txt ├── apache__flink_CVE-2020-17519_1.11.2.txt ├── apache__incubator-dubbo_CVE-2021-30181_2.6.8.txt ├── apache__jspwiki_CVE-2019-0225_2.11.0.M2.txt ├── apache__jspwiki_CVE-2019-10076_2.11.0.M3.txt ├── apache__jspwiki_CVE-2019-10077_2.11.0.M3.txt ├── apache__jspwiki_CVE-2019-10078_2.11.0.M3.txt ├── apache__jspwiki_CVE-2019-10089_2.11.0.M4.txt ├── apache__jspwiki_CVE-2022-46907_2.11.3.txt ├── apache__mina-sshd_CVE-2023-35887_2.9.2.txt ├── apache__myfaces_CVE-2011-4367_2.0.11.txt ├── apache__nifi_CVE-2022-33140_1.16.2.txt ├── apache__rocketmq_CVE-2019-17572_4.6.0.txt ├── apache__rocketmq_CVE-2023-33246_5.1.0.txt ├── apache__rocketmq_CVE-2023-37582_4.9.6.txt ├── apache__shiro_CVE-2023-34478_1.11.0.txt ├── apache__shiro_CVE-2023-46749_1.12.0.txt ├── apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.txt ├── apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.txt ├── apache__struts_CVE-2020-17530_2.5.25.txt ├── apache__tika_CVE-2018-11762_1.18.txt ├── apache__uima-uimaj_CVE-2022-32287_3.3.0.txt ├── asf__commons-io_CVE-2021-29425_2.6.txt ├── asf__commons-text_CVE-2022-42889_1.9.txt ├── asf__cxf_CVE-2016-6812_3.0.11.txt ├── asf__cxf_CVE-2019-17573_3.2.11.txt ├── asf__james-project_CVE-2022-22931_3.6.0.txt ├── asf__karaf_CVE-2022-22932_4.3.5.txt ├── asf__nifi_CVE-2023-34468_1.21.0.txt ├── asf__nifi_CVE-2023-36542_1.22.0.txt ├── asf__tapestry-5_CVE-2019-0207_5.4.4.txt ├── aws__aws-sdk-java_CVE-2022-31159_1.12.260.txt ├── codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.txt ├── codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.txt ├── codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.txt ├── codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.txt ├── codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.txt ├── diffplug__goomph_CVE-2022-26049_3.37.1.txt ├── dromara__hutool_CVE-2018-17297_4.1.11.txt ├── eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.txt ├── eclipse__hawkbit_CVE-2020-27219_0.3.0M6.txt ├── fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.txt ├── ff4j__ff4j_CVE-2022-44262_1.8.13.txt ├── hapifhir__hapi-fhir_CVE-2023-24057_5.6.91.txt ├── hapifhir__hapi-fhir_CVE-2023-28465_5.6.105.txt ├── hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.txt ├── jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.txt ├── jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.txt ├── jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.txt ├── jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.txt ├── jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.txt ├── jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.txt ├── jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.txt ├── jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.txt ├── jlangch__venice_CVE-2022-36007_1.10.16.txt ├── jmrozanec__cron-utils_CVE-2021-41269_9.1.5.txt ├── joniles__mpxj_CVE-2020-35460_8.3.4.txt ├── jstachio__jstachio_CVE-2023-33962_1.0.0.txt ├── keycloak__keycloak_CVE-2014-3656_1.0.5.Final.txt ├── keycloak__keycloak_CVE-2022-1274_20.0.4.txt ├── keycloak__keycloak_CVE-2022-3782_20.0.1.txt ├── keycloak__keycloak_CVE-2022-4137_20.0.4.txt ├── keycloak__keycloak_CVE-2022-4361_21.1.1.txt ├── kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.txt ├── nahsra__antisamy_CVE-2016-10006_1.5.3.txt ├── nahsra__antisamy_CVE-2017-14735_1.5.6.txt ├── nahsra__antisamy_CVE-2022-28367_1.6.5.txt ├── nahsra__antisamy_CVE-2022-29577_1.6.6.1.txt ├── payara__Payara_CVE-2022-37422_5.2022.2.txt ├── perwendel__spark_CVE-2016-9177_2.5.1.txt ├── perwendel__spark_CVE-2018-9159_2.7.1.txt ├── rhuss__jolokia_CVE-2018-1000129_1.4.0.txt ├── spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.txt ├── spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.txt ├── spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.txt ├── spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.txt ├── spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.txt ├── square__retrofit_CVE-2018-1000850_2.4.0.txt ├── srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.txt ├── testng-team__testng_CVE-2022-4065_7.5.txt ├── undertow-io__undertow_CVE-2014-7816_1.0.16.Final.txt ├── vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.txt ├── vert-x3__vertx-web_CVE-2019-17640_3.9.3.txt ├── whitesource__curekit_CVE-2022-23082_1.1.3.txt ├── wildfly__wildfly_CVE-2018-1047_11.0.0.Final.txt ├── x-stream__xstream_CVE-2013-7285_1.4.6.txt ├── x-stream__xstream_CVE-2020-26217_1.4.14-java7.txt ├── x-stream__xstream_CVE-2021-21345_1.4.15.txt ├── xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.txt ├── xuxueli__xxl-job_CVE-2020-29204_2.2.0.txt ├── xwiki__xwiki-commons_CVE-2022-24897_12.6.6.txt ├── xwiki__xwiki-commons_CVE-2023-29201_14.6.txt ├── xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.txt ├── xwiki__xwiki-commons_CVE-2023-31126_14.10.3.txt ├── xwiki__xwiki-commons_CVE-2023-36471_14.10.5.txt ├── xwiki__xwiki-rendering_CVE-2023-32070_14.6.txt ├── xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.txt ├── yamcs__yamcs_CVE-2023-45277_5.8.6.txt ├── yamcs__yamcs_CVE-2023-45278_5.8.6.txt └── zeroturnaround__zt-zip_CVE-2018-1002201_1.12.txt ├── patches ├── apache__camel_CVE-2018-8041_2.20.3.patch ├── apache__camel_CVE-2019-0194_2.21.4.patch ├── jstachio__jstachio_CVE-2023-33962_1.0.0.patch ├── keycloak__keycloak_CVE-2022-1274_20.0.4.patch ├── keycloak__keycloak_CVE-2022-4137_20.0.4.patch ├── keycloak__keycloak_CVE-2022-4361_21.1.1.patch ├── testng-team__testng_CVE-2022-4065_7.5.patch └── xwiki__xwiki-commons_CVE-2022-24897_12.6.6.patch ├── resources ├── dataset-collection.png └── visualizer-screenshot.png ├── scripts ├── .gitignore ├── build_one.py ├── fetch_one.py ├── gradle_version.json ├── jdk_version.json ├── mvn_version.json ├── setup.py ├── setup_gradle.py ├── setup_jdk.py └── setup_mvn.py └── visualization ├── css └── basic.css ├── index.html └── js ├── basic.js └── config.js /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | __pycache__ 3 | 4 | project-sources 5 | build-info 6 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/README.md -------------------------------------------------------------------------------- /advisory/DSpace__DSpace_CVE-2016-10726_4.4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/DSpace__DSpace_CVE-2016-10726_4.4.json -------------------------------------------------------------------------------- /advisory/DSpace__DSpace_CVE-2022-31192_5.10.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/DSpace__DSpace_CVE-2022-31192_5.10.json -------------------------------------------------------------------------------- /advisory/DSpace__DSpace_CVE-2022-31194_5.10.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/DSpace__DSpace_CVE-2022-31194_5.10.json -------------------------------------------------------------------------------- /advisory/DSpace__DSpace_CVE-2022-31195_5.10.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/DSpace__DSpace_CVE-2022-31195_5.10.json -------------------------------------------------------------------------------- /advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json -------------------------------------------------------------------------------- /advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json -------------------------------------------------------------------------------- /advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json -------------------------------------------------------------------------------- /advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json -------------------------------------------------------------------------------- /advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json -------------------------------------------------------------------------------- /advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json -------------------------------------------------------------------------------- /advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json -------------------------------------------------------------------------------- /advisory/apache__activemq_CVE-2014-3576_5.10.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__activemq_CVE-2014-3576_5.10.1.json -------------------------------------------------------------------------------- /advisory/apache__activemq_CVE-2019-0222_5.15.8.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__activemq_CVE-2019-0222_5.15.8.json -------------------------------------------------------------------------------- /advisory/apache__activemq_CVE-2020-11998_5.15.12.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__activemq_CVE-2020-11998_5.15.12.json -------------------------------------------------------------------------------- /advisory/apache__camel_CVE-2018-8041_2.20.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__camel_CVE-2018-8041_2.20.3.json -------------------------------------------------------------------------------- /advisory/apache__camel_CVE-2019-0194_2.21.4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__camel_CVE-2019-0194_2.21.4.json -------------------------------------------------------------------------------- /advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json -------------------------------------------------------------------------------- /advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json -------------------------------------------------------------------------------- /advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json -------------------------------------------------------------------------------- /advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json -------------------------------------------------------------------------------- /advisory/apache__dubbo_CVE-2021-30180_2.7.9.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__dubbo_CVE-2021-30180_2.7.9.json -------------------------------------------------------------------------------- /advisory/apache__flink_CVE-2020-17519_1.11.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__flink_CVE-2020-17519_1.11.2.json -------------------------------------------------------------------------------- /advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json -------------------------------------------------------------------------------- /advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json -------------------------------------------------------------------------------- /advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json -------------------------------------------------------------------------------- /advisory/apache__myfaces_CVE-2011-4367_2.0.11.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__myfaces_CVE-2011-4367_2.0.11.json -------------------------------------------------------------------------------- /advisory/apache__nifi_CVE-2022-33140_1.16.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__nifi_CVE-2022-33140_1.16.2.json -------------------------------------------------------------------------------- /advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json -------------------------------------------------------------------------------- /advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json -------------------------------------------------------------------------------- /advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json -------------------------------------------------------------------------------- /advisory/apache__shiro_CVE-2023-34478_1.11.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__shiro_CVE-2023-34478_1.11.0.json -------------------------------------------------------------------------------- /advisory/apache__shiro_CVE-2023-46749_1.12.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__shiro_CVE-2023-46749_1.12.0.json -------------------------------------------------------------------------------- /advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json -------------------------------------------------------------------------------- /advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json -------------------------------------------------------------------------------- /advisory/apache__struts_CVE-2020-17530_2.5.25.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__struts_CVE-2020-17530_2.5.25.json -------------------------------------------------------------------------------- /advisory/apache__tika_CVE-2018-11762_1.18.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__tika_CVE-2018-11762_1.18.json -------------------------------------------------------------------------------- /advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json -------------------------------------------------------------------------------- /advisory/asf__commons-io_CVE-2021-29425_2.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__commons-io_CVE-2021-29425_2.6.json -------------------------------------------------------------------------------- /advisory/asf__commons-text_CVE-2022-42889_1.9.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__commons-text_CVE-2022-42889_1.9.json -------------------------------------------------------------------------------- /advisory/asf__cxf_CVE-2016-6812_3.0.11.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__cxf_CVE-2016-6812_3.0.11.json -------------------------------------------------------------------------------- /advisory/asf__cxf_CVE-2019-17573_3.2.11.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__cxf_CVE-2019-17573_3.2.11.json -------------------------------------------------------------------------------- /advisory/asf__james-project_CVE-2022-22931_3.6.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__james-project_CVE-2022-22931_3.6.0.json -------------------------------------------------------------------------------- /advisory/asf__karaf_CVE-2022-22932_4.3.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__karaf_CVE-2022-22932_4.3.5.json -------------------------------------------------------------------------------- /advisory/asf__nifi_CVE-2023-34468_1.21.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__nifi_CVE-2023-34468_1.21.0.json -------------------------------------------------------------------------------- /advisory/asf__nifi_CVE-2023-36542_1.22.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__nifi_CVE-2023-36542_1.22.0.json -------------------------------------------------------------------------------- /advisory/asf__tapestry-5_CVE-2019-0207_5.4.4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/asf__tapestry-5_CVE-2019-0207_5.4.4.json -------------------------------------------------------------------------------- /advisory/aws__aws-sdk-java_CVE-2022-31159_1.12.260.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/aws__aws-sdk-java_CVE-2022-31159_1.12.260.json -------------------------------------------------------------------------------- /advisory/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json -------------------------------------------------------------------------------- /advisory/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json -------------------------------------------------------------------------------- /advisory/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json -------------------------------------------------------------------------------- /advisory/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json -------------------------------------------------------------------------------- /advisory/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json -------------------------------------------------------------------------------- /advisory/diffplug__goomph_CVE-2022-26049_3.37.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/diffplug__goomph_CVE-2022-26049_3.37.1.json -------------------------------------------------------------------------------- /advisory/dromara__hutool_CVE-2018-17297_4.1.11.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/dromara__hutool_CVE-2018-17297_4.1.11.json -------------------------------------------------------------------------------- /advisory/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json -------------------------------------------------------------------------------- /advisory/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json -------------------------------------------------------------------------------- /advisory/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json -------------------------------------------------------------------------------- /advisory/ff4j__ff4j_CVE-2022-44262_1.8.13.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/ff4j__ff4j_CVE-2022-44262_1.8.13.json -------------------------------------------------------------------------------- /advisory/hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json -------------------------------------------------------------------------------- /advisory/hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json -------------------------------------------------------------------------------- /advisory/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json -------------------------------------------------------------------------------- /advisory/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json -------------------------------------------------------------------------------- /advisory/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json -------------------------------------------------------------------------------- /advisory/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json -------------------------------------------------------------------------------- /advisory/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json -------------------------------------------------------------------------------- /advisory/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json -------------------------------------------------------------------------------- /advisory/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json -------------------------------------------------------------------------------- /advisory/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json -------------------------------------------------------------------------------- /advisory/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json -------------------------------------------------------------------------------- /advisory/jlangch__venice_CVE-2022-36007_1.10.16.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jlangch__venice_CVE-2022-36007_1.10.16.json -------------------------------------------------------------------------------- /advisory/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json -------------------------------------------------------------------------------- /advisory/joniles__mpxj_CVE-2020-35460_8.3.4.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/joniles__mpxj_CVE-2020-35460_8.3.4.json -------------------------------------------------------------------------------- /advisory/jstachio__jstachio_CVE-2023-33962_1.0.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/jstachio__jstachio_CVE-2023-33962_1.0.0.json -------------------------------------------------------------------------------- /advisory/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json -------------------------------------------------------------------------------- /advisory/keycloak__keycloak_CVE-2022-1274_20.0.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/keycloak__keycloak_CVE-2022-1274_20.0.3.json -------------------------------------------------------------------------------- /advisory/keycloak__keycloak_CVE-2022-3782_20.0.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/keycloak__keycloak_CVE-2022-3782_20.0.1.json -------------------------------------------------------------------------------- /advisory/keycloak__keycloak_CVE-2022-4137_20.0.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/keycloak__keycloak_CVE-2022-4137_20.0.3.json -------------------------------------------------------------------------------- /advisory/keycloak__keycloak_CVE-2022-4361_21.1.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/keycloak__keycloak_CVE-2022-4361_21.1.1.json -------------------------------------------------------------------------------- /advisory/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json -------------------------------------------------------------------------------- /advisory/nahsra__antisamy_CVE-2016-10006_1.5.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/nahsra__antisamy_CVE-2016-10006_1.5.3.json -------------------------------------------------------------------------------- /advisory/nahsra__antisamy_CVE-2017-14735_1.5.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/nahsra__antisamy_CVE-2017-14735_1.5.6.json -------------------------------------------------------------------------------- /advisory/nahsra__antisamy_CVE-2022-28367_1.6.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/nahsra__antisamy_CVE-2022-28367_1.6.5.json -------------------------------------------------------------------------------- /advisory/nahsra__antisamy_CVE-2022-29577_1.6.6.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/nahsra__antisamy_CVE-2022-29577_1.6.6.1.json -------------------------------------------------------------------------------- /advisory/payara__Payara_CVE-2022-37422_5.2022.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/payara__Payara_CVE-2022-37422_5.2022.2.json -------------------------------------------------------------------------------- /advisory/perwendel__spark_CVE-2016-9177_2.5.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/perwendel__spark_CVE-2016-9177_2.5.1.json -------------------------------------------------------------------------------- /advisory/perwendel__spark_CVE-2018-9159_2.7.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/perwendel__spark_CVE-2018-9159_2.7.1.json -------------------------------------------------------------------------------- /advisory/rhuss__jolokia_CVE-2018-1000129_1.4.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/rhuss__jolokia_CVE-2018-1000129_1.4.0.json -------------------------------------------------------------------------------- /advisory/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json -------------------------------------------------------------------------------- /advisory/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json -------------------------------------------------------------------------------- /advisory/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json -------------------------------------------------------------------------------- /advisory/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json -------------------------------------------------------------------------------- /advisory/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json -------------------------------------------------------------------------------- /advisory/square__retrofit_CVE-2018-1000850_2.4.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/square__retrofit_CVE-2018-1000850_2.4.0.json -------------------------------------------------------------------------------- /advisory/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json -------------------------------------------------------------------------------- /advisory/testng-team__testng_CVE-2022-4065_7.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/testng-team__testng_CVE-2022-4065_7.5.json -------------------------------------------------------------------------------- /advisory/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json -------------------------------------------------------------------------------- /advisory/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json -------------------------------------------------------------------------------- /advisory/vert-x3__vertx-web_CVE-2019-17640_3.9.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/vert-x3__vertx-web_CVE-2019-17640_3.9.3.json -------------------------------------------------------------------------------- /advisory/whitesource__curekit_CVE-2022-23082_1.1.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/whitesource__curekit_CVE-2022-23082_1.1.3.json -------------------------------------------------------------------------------- /advisory/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json -------------------------------------------------------------------------------- /advisory/x-stream__xstream_CVE-2013-7285_1.4.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/x-stream__xstream_CVE-2013-7285_1.4.6.json -------------------------------------------------------------------------------- /advisory/x-stream__xstream_CVE-2020-26217_1.4.14-java7.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/x-stream__xstream_CVE-2020-26217_1.4.14-java7.json -------------------------------------------------------------------------------- /advisory/x-stream__xstream_CVE-2021-21345_1.4.15.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/x-stream__xstream_CVE-2021-21345_1.4.15.json -------------------------------------------------------------------------------- /advisory/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json -------------------------------------------------------------------------------- /advisory/xuxueli__xxl-job_CVE-2020-29204_2.2.0.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xuxueli__xxl-job_CVE-2020-29204_2.2.0.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-commons_CVE-2023-29201_14.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-commons_CVE-2023-29201_14.5.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-commons_CVE-2023-31126_14.10.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-commons_CVE-2023-31126_14.10.3.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-commons_CVE-2023-36471_14.10.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-commons_CVE-2023-36471_14.10.5.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-rendering_CVE-2023-32070_14.5.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-rendering_CVE-2023-32070_14.5.json -------------------------------------------------------------------------------- /advisory/xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.json -------------------------------------------------------------------------------- /advisory/yamcs__yamcs_CVE-2023-45277_5.8.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/yamcs__yamcs_CVE-2023-45277_5.8.6.json -------------------------------------------------------------------------------- /advisory/yamcs__yamcs_CVE-2023-45278_5.8.6.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/yamcs__yamcs_CVE-2023-45278_5.8.6.json -------------------------------------------------------------------------------- /advisory/zeroturnaround__zt-zip_CVE-2018-1002201_1.12.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/advisory/zeroturnaround__zt-zip_CVE-2018-1002201_1.12.json -------------------------------------------------------------------------------- /baselines/output_infer_result.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/output_infer_result.py -------------------------------------------------------------------------------- /baselines/output_snyk_result.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/output_snyk_result.py -------------------------------------------------------------------------------- /baselines/output_spotbugs_result.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/output_spotbugs_result.py -------------------------------------------------------------------------------- /baselines/readme.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /baselines/results/.gitignore: -------------------------------------------------------------------------------- 1 | *.csv 2 | -------------------------------------------------------------------------------- /baselines/results/.keep: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /baselines/run_codeql.py: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /baselines/run_infer.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/run_infer.py -------------------------------------------------------------------------------- /baselines/run_snyk.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/run_snyk.py -------------------------------------------------------------------------------- /baselines/run_spotbugs.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/baselines/run_spotbugs.py -------------------------------------------------------------------------------- /data/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/data/README.md -------------------------------------------------------------------------------- /data/build_info.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/data/build_info.csv -------------------------------------------------------------------------------- /data/fix_info.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/data/fix_info.csv -------------------------------------------------------------------------------- /data/project_info.csv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/data/project_info.csv -------------------------------------------------------------------------------- /java-env/.gitignore: -------------------------------------------------------------------------------- 1 | *.zip 2 | *.tar.gz 3 | 4 | apache-maven* 5 | jdk* 6 | gradle* 7 | -------------------------------------------------------------------------------- /java-env/.keep: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /package-names/DSpace__DSpace_CVE-2016-10726_4.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/DSpace__DSpace_CVE-2016-10726_4.4.txt -------------------------------------------------------------------------------- /package-names/DSpace__DSpace_CVE-2022-31192_5.10.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/DSpace__DSpace_CVE-2022-31192_5.10.txt -------------------------------------------------------------------------------- /package-names/DSpace__DSpace_CVE-2022-31194_5.10.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/DSpace__DSpace_CVE-2022-31194_5.10.txt -------------------------------------------------------------------------------- /package-names/DSpace__DSpace_CVE-2022-31195_5.10.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/DSpace__DSpace_CVE-2022-31195_5.10.txt -------------------------------------------------------------------------------- /package-names/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.txt -------------------------------------------------------------------------------- /package-names/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.txt -------------------------------------------------------------------------------- /package-names/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.txt -------------------------------------------------------------------------------- /package-names/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.txt: -------------------------------------------------------------------------------- 1 | com.google.json 2 | -------------------------------------------------------------------------------- /package-names/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.txt -------------------------------------------------------------------------------- /package-names/alibaba__nacos_CVE-2021-44667_2.0.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/alibaba__nacos_CVE-2021-44667_2.0.3.txt -------------------------------------------------------------------------------- /package-names/alibaba__one-java-agent_CVE-2022-25842_0.0.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/alibaba__one-java-agent_CVE-2022-25842_0.0.1.txt -------------------------------------------------------------------------------- /package-names/apache__activemq_CVE-2014-3576_5.10.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__activemq_CVE-2014-3576_5.10.2.txt -------------------------------------------------------------------------------- /package-names/apache__activemq_CVE-2019-0222_5.15.8.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__activemq_CVE-2019-0222_5.15.8.txt -------------------------------------------------------------------------------- /package-names/apache__activemq_CVE-2020-11998_5.15.12.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__activemq_CVE-2020-11998_5.15.12.txt -------------------------------------------------------------------------------- /package-names/apache__camel_CVE-2018-8041_2.20.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__camel_CVE-2018-8041_2.20.3.txt -------------------------------------------------------------------------------- /package-names/apache__camel_CVE-2019-0194_2.21.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__camel_CVE-2019-0194_2.21.4.txt -------------------------------------------------------------------------------- /package-names/apache__dolphinscheduler_CVE-2022-26884_2.0.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__dolphinscheduler_CVE-2022-26884_2.0.5.txt -------------------------------------------------------------------------------- /package-names/apache__dolphinscheduler_CVE-2022-34662_2.0.9.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__dolphinscheduler_CVE-2022-34662_2.0.9.txt -------------------------------------------------------------------------------- /package-names/apache__dolphinscheduler_CVE-2023-49109_3.2.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__dolphinscheduler_CVE-2023-49109_3.2.0.txt -------------------------------------------------------------------------------- /package-names/apache__dolphinscheduler_CVE-2023-51770_3.2.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__dolphinscheduler_CVE-2023-51770_3.2.0.txt -------------------------------------------------------------------------------- /package-names/apache__dubbo_CVE-2021-30180_2.7.9.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__dubbo_CVE-2021-30180_2.7.9.txt -------------------------------------------------------------------------------- /package-names/apache__flink_CVE-2020-17519_1.11.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__flink_CVE-2020-17519_1.11.2.txt -------------------------------------------------------------------------------- /package-names/apache__incubator-dubbo_CVE-2021-30181_2.6.8.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__incubator-dubbo_CVE-2021-30181_2.6.8.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2019-0225_2.11.0.M2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2019-0225_2.11.0.M2.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2019-10076_2.11.0.M3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2019-10076_2.11.0.M3.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2019-10077_2.11.0.M3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2019-10077_2.11.0.M3.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2019-10078_2.11.0.M3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2019-10078_2.11.0.M3.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2019-10089_2.11.0.M4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2019-10089_2.11.0.M4.txt -------------------------------------------------------------------------------- /package-names/apache__jspwiki_CVE-2022-46907_2.11.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__jspwiki_CVE-2022-46907_2.11.3.txt -------------------------------------------------------------------------------- /package-names/apache__mina-sshd_CVE-2023-35887_2.9.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__mina-sshd_CVE-2023-35887_2.9.2.txt -------------------------------------------------------------------------------- /package-names/apache__myfaces_CVE-2011-4367_2.0.11.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__myfaces_CVE-2011-4367_2.0.11.txt -------------------------------------------------------------------------------- /package-names/apache__nifi_CVE-2022-33140_1.16.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__nifi_CVE-2022-33140_1.16.2.txt -------------------------------------------------------------------------------- /package-names/apache__rocketmq_CVE-2019-17572_4.6.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__rocketmq_CVE-2019-17572_4.6.0.txt -------------------------------------------------------------------------------- /package-names/apache__rocketmq_CVE-2023-33246_5.1.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__rocketmq_CVE-2023-33246_5.1.0.txt -------------------------------------------------------------------------------- /package-names/apache__rocketmq_CVE-2023-37582_4.9.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__rocketmq_CVE-2023-37582_4.9.6.txt -------------------------------------------------------------------------------- /package-names/apache__shiro_CVE-2023-34478_1.11.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__shiro_CVE-2023-34478_1.11.0.txt -------------------------------------------------------------------------------- /package-names/apache__shiro_CVE-2023-46749_1.12.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__shiro_CVE-2023-46749_1.12.0.txt -------------------------------------------------------------------------------- /package-names/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.txt -------------------------------------------------------------------------------- /package-names/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.txt -------------------------------------------------------------------------------- /package-names/apache__struts_CVE-2020-17530_2.5.25.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__struts_CVE-2020-17530_2.5.25.txt -------------------------------------------------------------------------------- /package-names/apache__tika_CVE-2018-11762_1.18.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__tika_CVE-2018-11762_1.18.txt -------------------------------------------------------------------------------- /package-names/apache__uima-uimaj_CVE-2022-32287_3.3.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/apache__uima-uimaj_CVE-2022-32287_3.3.0.txt -------------------------------------------------------------------------------- /package-names/asf__commons-io_CVE-2021-29425_2.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__commons-io_CVE-2021-29425_2.6.txt -------------------------------------------------------------------------------- /package-names/asf__commons-text_CVE-2022-42889_1.9.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__commons-text_CVE-2022-42889_1.9.txt -------------------------------------------------------------------------------- /package-names/asf__cxf_CVE-2016-6812_3.0.11.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__cxf_CVE-2016-6812_3.0.11.txt -------------------------------------------------------------------------------- /package-names/asf__cxf_CVE-2019-17573_3.2.11.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__cxf_CVE-2019-17573_3.2.11.txt -------------------------------------------------------------------------------- /package-names/asf__james-project_CVE-2022-22931_3.6.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__james-project_CVE-2022-22931_3.6.0.txt -------------------------------------------------------------------------------- /package-names/asf__karaf_CVE-2022-22932_4.3.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__karaf_CVE-2022-22932_4.3.5.txt -------------------------------------------------------------------------------- /package-names/asf__nifi_CVE-2023-34468_1.21.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__nifi_CVE-2023-34468_1.21.0.txt -------------------------------------------------------------------------------- /package-names/asf__nifi_CVE-2023-36542_1.22.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__nifi_CVE-2023-36542_1.22.0.txt -------------------------------------------------------------------------------- /package-names/asf__tapestry-5_CVE-2019-0207_5.4.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/asf__tapestry-5_CVE-2019-0207_5.4.4.txt -------------------------------------------------------------------------------- /package-names/aws__aws-sdk-java_CVE-2022-31159_1.12.260.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/aws__aws-sdk-java_CVE-2022-31159_1.12.260.txt -------------------------------------------------------------------------------- /package-names/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.txt -------------------------------------------------------------------------------- /package-names/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.txt -------------------------------------------------------------------------------- /package-names/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.txt -------------------------------------------------------------------------------- /package-names/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.txt -------------------------------------------------------------------------------- /package-names/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.txt -------------------------------------------------------------------------------- /package-names/diffplug__goomph_CVE-2022-26049_3.37.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/diffplug__goomph_CVE-2022-26049_3.37.1.txt -------------------------------------------------------------------------------- /package-names/dromara__hutool_CVE-2018-17297_4.1.11.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/dromara__hutool_CVE-2018-17297_4.1.11.txt -------------------------------------------------------------------------------- /package-names/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.txt -------------------------------------------------------------------------------- /package-names/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.txt -------------------------------------------------------------------------------- /package-names/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.txt -------------------------------------------------------------------------------- /package-names/ff4j__ff4j_CVE-2022-44262_1.8.13.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/ff4j__ff4j_CVE-2022-44262_1.8.13.txt -------------------------------------------------------------------------------- /package-names/hapifhir__hapi-fhir_CVE-2023-24057_5.6.91.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/hapifhir__hapi-fhir_CVE-2023-24057_5.6.91.txt -------------------------------------------------------------------------------- /package-names/hapifhir__hapi-fhir_CVE-2023-28465_5.6.105.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/hapifhir__hapi-fhir_CVE-2023-28465_5.6.105.txt -------------------------------------------------------------------------------- /package-names/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.txt -------------------------------------------------------------------------------- /package-names/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.txt: -------------------------------------------------------------------------------- 1 | org.jenkinsci.plugins.workflow.multibranch 2 | -------------------------------------------------------------------------------- /package-names/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.txt -------------------------------------------------------------------------------- /package-names/jlangch__venice_CVE-2022-36007_1.10.16.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jlangch__venice_CVE-2022-36007_1.10.16.txt -------------------------------------------------------------------------------- /package-names/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.txt -------------------------------------------------------------------------------- /package-names/joniles__mpxj_CVE-2020-35460_8.3.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/joniles__mpxj_CVE-2020-35460_8.3.4.txt -------------------------------------------------------------------------------- /package-names/jstachio__jstachio_CVE-2023-33962_1.0.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/jstachio__jstachio_CVE-2023-33962_1.0.0.txt -------------------------------------------------------------------------------- /package-names/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.txt -------------------------------------------------------------------------------- /package-names/keycloak__keycloak_CVE-2022-1274_20.0.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/keycloak__keycloak_CVE-2022-1274_20.0.4.txt -------------------------------------------------------------------------------- /package-names/keycloak__keycloak_CVE-2022-3782_20.0.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/keycloak__keycloak_CVE-2022-3782_20.0.1.txt -------------------------------------------------------------------------------- /package-names/keycloak__keycloak_CVE-2022-4137_20.0.4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/keycloak__keycloak_CVE-2022-4137_20.0.4.txt -------------------------------------------------------------------------------- /package-names/keycloak__keycloak_CVE-2022-4361_21.1.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/keycloak__keycloak_CVE-2022-4361_21.1.1.txt -------------------------------------------------------------------------------- /package-names/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.txt -------------------------------------------------------------------------------- /package-names/nahsra__antisamy_CVE-2016-10006_1.5.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/nahsra__antisamy_CVE-2016-10006_1.5.3.txt -------------------------------------------------------------------------------- /package-names/nahsra__antisamy_CVE-2017-14735_1.5.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/nahsra__antisamy_CVE-2017-14735_1.5.6.txt -------------------------------------------------------------------------------- /package-names/nahsra__antisamy_CVE-2022-28367_1.6.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/nahsra__antisamy_CVE-2022-28367_1.6.5.txt -------------------------------------------------------------------------------- /package-names/nahsra__antisamy_CVE-2022-29577_1.6.6.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/nahsra__antisamy_CVE-2022-29577_1.6.6.1.txt -------------------------------------------------------------------------------- /package-names/payara__Payara_CVE-2022-37422_5.2022.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/payara__Payara_CVE-2022-37422_5.2022.2.txt -------------------------------------------------------------------------------- /package-names/perwendel__spark_CVE-2016-9177_2.5.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/perwendel__spark_CVE-2016-9177_2.5.1.txt -------------------------------------------------------------------------------- /package-names/perwendel__spark_CVE-2018-9159_2.7.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/perwendel__spark_CVE-2018-9159_2.7.1.txt -------------------------------------------------------------------------------- /package-names/rhuss__jolokia_CVE-2018-1000129_1.4.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/rhuss__jolokia_CVE-2018-1000129_1.4.0.txt -------------------------------------------------------------------------------- /package-names/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.txt -------------------------------------------------------------------------------- /package-names/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.txt -------------------------------------------------------------------------------- /package-names/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.txt -------------------------------------------------------------------------------- /package-names/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.txt -------------------------------------------------------------------------------- /package-names/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.txt -------------------------------------------------------------------------------- /package-names/square__retrofit_CVE-2018-1000850_2.4.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/square__retrofit_CVE-2018-1000850_2.4.0.txt -------------------------------------------------------------------------------- /package-names/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.txt -------------------------------------------------------------------------------- /package-names/testng-team__testng_CVE-2022-4065_7.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/testng-team__testng_CVE-2022-4065_7.5.txt -------------------------------------------------------------------------------- /package-names/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.txt -------------------------------------------------------------------------------- /package-names/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.txt -------------------------------------------------------------------------------- /package-names/vert-x3__vertx-web_CVE-2019-17640_3.9.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/vert-x3__vertx-web_CVE-2019-17640_3.9.3.txt -------------------------------------------------------------------------------- /package-names/whitesource__curekit_CVE-2022-23082_1.1.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/whitesource__curekit_CVE-2022-23082_1.1.3.txt -------------------------------------------------------------------------------- /package-names/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.txt -------------------------------------------------------------------------------- /package-names/x-stream__xstream_CVE-2013-7285_1.4.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/x-stream__xstream_CVE-2013-7285_1.4.6.txt -------------------------------------------------------------------------------- /package-names/x-stream__xstream_CVE-2020-26217_1.4.14-java7.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/x-stream__xstream_CVE-2020-26217_1.4.14-java7.txt -------------------------------------------------------------------------------- /package-names/x-stream__xstream_CVE-2021-21345_1.4.15.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/x-stream__xstream_CVE-2021-21345_1.4.15.txt -------------------------------------------------------------------------------- /package-names/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.txt -------------------------------------------------------------------------------- /package-names/xuxueli__xxl-job_CVE-2020-29204_2.2.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xuxueli__xxl-job_CVE-2020-29204_2.2.0.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-commons_CVE-2023-29201_14.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-commons_CVE-2023-29201_14.6.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-commons_CVE-2023-31126_14.10.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-commons_CVE-2023-31126_14.10.3.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-commons_CVE-2023-36471_14.10.5.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-commons_CVE-2023-36471_14.10.5.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-rendering_CVE-2023-32070_14.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-rendering_CVE-2023-32070_14.6.txt -------------------------------------------------------------------------------- /package-names/xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/xwiki__xwiki-rendering_CVE-2023-37908_14.10.3.txt -------------------------------------------------------------------------------- /package-names/yamcs__yamcs_CVE-2023-45277_5.8.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/yamcs__yamcs_CVE-2023-45277_5.8.6.txt -------------------------------------------------------------------------------- /package-names/yamcs__yamcs_CVE-2023-45278_5.8.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/yamcs__yamcs_CVE-2023-45278_5.8.6.txt -------------------------------------------------------------------------------- /package-names/zeroturnaround__zt-zip_CVE-2018-1002201_1.12.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/package-names/zeroturnaround__zt-zip_CVE-2018-1002201_1.12.txt -------------------------------------------------------------------------------- /patches/apache__camel_CVE-2018-8041_2.20.3.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/apache__camel_CVE-2018-8041_2.20.3.patch -------------------------------------------------------------------------------- /patches/apache__camel_CVE-2019-0194_2.21.4.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/apache__camel_CVE-2019-0194_2.21.4.patch -------------------------------------------------------------------------------- /patches/jstachio__jstachio_CVE-2023-33962_1.0.0.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/jstachio__jstachio_CVE-2023-33962_1.0.0.patch -------------------------------------------------------------------------------- /patches/keycloak__keycloak_CVE-2022-1274_20.0.4.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/keycloak__keycloak_CVE-2022-1274_20.0.4.patch -------------------------------------------------------------------------------- /patches/keycloak__keycloak_CVE-2022-4137_20.0.4.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/keycloak__keycloak_CVE-2022-4137_20.0.4.patch -------------------------------------------------------------------------------- /patches/keycloak__keycloak_CVE-2022-4361_21.1.1.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/keycloak__keycloak_CVE-2022-4361_21.1.1.patch -------------------------------------------------------------------------------- /patches/testng-team__testng_CVE-2022-4065_7.5.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/testng-team__testng_CVE-2022-4065_7.5.patch -------------------------------------------------------------------------------- /patches/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.patch: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/patches/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.patch -------------------------------------------------------------------------------- /resources/dataset-collection.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/resources/dataset-collection.png -------------------------------------------------------------------------------- /resources/visualizer-screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/resources/visualizer-screenshot.png -------------------------------------------------------------------------------- /scripts/.gitignore: -------------------------------------------------------------------------------- 1 | private 2 | -------------------------------------------------------------------------------- /scripts/build_one.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/build_one.py -------------------------------------------------------------------------------- /scripts/fetch_one.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/fetch_one.py -------------------------------------------------------------------------------- /scripts/gradle_version.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/gradle_version.json -------------------------------------------------------------------------------- /scripts/jdk_version.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/jdk_version.json -------------------------------------------------------------------------------- /scripts/mvn_version.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/mvn_version.json -------------------------------------------------------------------------------- /scripts/setup.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/setup.py -------------------------------------------------------------------------------- /scripts/setup_gradle.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/setup_gradle.py -------------------------------------------------------------------------------- /scripts/setup_jdk.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/setup_jdk.py -------------------------------------------------------------------------------- /scripts/setup_mvn.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/scripts/setup_mvn.py -------------------------------------------------------------------------------- /visualization/css/basic.css: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/visualization/css/basic.css -------------------------------------------------------------------------------- /visualization/index.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/visualization/index.html -------------------------------------------------------------------------------- /visualization/js/basic.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/visualization/js/basic.js -------------------------------------------------------------------------------- /visualization/js/config.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/iris-sast/cwe-bench-java/HEAD/visualization/js/config.js --------------------------------------------------------------------------------