Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68 values | dataset_name stringclasses 1 value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1 value |
|---|---|---|---|---|---|---|---|---|
11,000 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117055/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_0040136b);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
badSink(uStack_10);
return;
}
| ['gcc'] |
11,001 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117055/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,002 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117056/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = badSource(0);
if (uVar1 < 6) {
printLine(&UNK_00401358);
}
else {
puVar2 = (undefined4 *)func_0x00400bb0(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400b10(puVar2);
}
return;
}
| ['gcc'] |
11,003 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117056/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,004 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad()
{
size_t data;
/* define a function pointer */
void (*funcPtr) (size_t) = badSink;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* use the function pointer */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117058/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
code *pcStack_18;
undefined8 uStack_10;
pcStack_18 = badSink;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_0040137b);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
(*pcStack_18)(uStack_10);
return;
}
| ['gcc'] |
11,005 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117058/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,006 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_badData = data;
badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117059/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_0040137b);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_badData = uStack_10;
badSink();
return;
}
| ['gcc'] |
11,007 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117059/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,008 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401334);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,009 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,010 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401338);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,011 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004013e8);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,012 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401420);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,013 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401354);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,014 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,015 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(param_1);
return;
}
| ['gcc'] |
11,016 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,017 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,018 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401358);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,019 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401418);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,020 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401450);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,021 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401374);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,022 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,023 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(param_1);
return;
}
| ['gcc'] |
11,024 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,025 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,026 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(param_1);
return;
}
| ['gcc'] |
11,027 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,028 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,029 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401378);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,030 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401448);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,031 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401480);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,032 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401384);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,033 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,034 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(param_1);
return;
}
| ['gcc'] |
11,035 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,036 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,037 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(param_1);
return;
}
| ['gcc'] |
11,038 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,039 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,040 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(param_1);
return;
}
| ['gcc'] |
11,041 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,042 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,043 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401388);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,044 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401488);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,045 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_004014c0);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,046 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(0);
if (uVar1 < 6) {
printLine(&UNK_00401348);
}
else {
puVar2 = (undefined4 *)func_0x00400bb0(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400b10(puVar2);
}
return;
}
| ['gcc'] |
11,047 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,048 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(size_t data)
{
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
return data;
} | ['/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(undefined8 param_1)
{
long lVar1;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined8 uStack_18;
undefined2 uStack_10;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
uStack_10 = 0;
lVar1 = func_0x00400b70(&uStack_28,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401344);
uStack_30 = param_1;
}
else {
uStack_30 = func_0x00400be0(&uStack_28,0,0);
}
return uStack_30;
}
| ['gcc'] |
11,049 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource(size_t data)
{
/* FIX: Use a relatively small number for memory allocation */
data = 20;
return data;
} | ['/* FIX: Use a relatively small number for memory allocation */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource(void)
{
return 0x14;
}
| ['gcc'] |
11,050 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource(size_t data)
{
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
return data;
} | ['/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource(undefined8 param_1)
{
long lVar1;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined8 uStack_18;
undefined2 uStack_10;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
uStack_10 = 0;
lVar1 = func_0x00400b70(&uStack_28,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_004013e4);
uStack_30 = param_1;
}
else {
uStack_30 = func_0x00400be0(&uStack_28,0,0);
}
return uStack_30;
}
| ['gcc'] |
11,051 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401344);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(&uStack_10);
return;
}
| ['gcc'] |
11,052 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,053 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,054 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_004013f8);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,055 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink(ulong *param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *param_1;
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401430);
}
else {
puVar2 = (undefined4 *)func_0x00400bb0(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400b10(puVar2);
}
return;
}
| ['gcc'] |
11,056 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401354);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(&uStack_10);
return;
}
| ['gcc'] |
11,057 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,058 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401358);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,059 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401408);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,060 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink(ulong *param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *param_1;
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401440);
}
else {
puVar2 = (undefined4 *)func_0x00400bb0(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400b10(puVar2);
}
return;
}
| ['gcc'] |
11,061 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad()
{
size_t data;
/* define a function pointer */
void (*funcPtr) (size_t) = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* use the function pointer */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
code *pcStack_18;
undefined8 uStack_10;
pcStack_18 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401344);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
(*pcStack_18)(uStack_10);
return;
}
| ['gcc'] |
11,062 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,063 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,064 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004013f8);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,065 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401430);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,066 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad()
{
size_t data;
size_t dataArray[5];
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
/* put data in array */
dataArray[2] = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(dataArray);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* put data in array */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad(void)
{
long lVar1;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined2 uStack_40;
undefined auStack_38 [16];
undefined8 uStack_28;
undefined8 uStack_10;
uStack_10 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
lVar1 = func_0x00400b70(&uStack_58,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401354);
}
else {
uStack_10 = func_0x00400be0(&uStack_58,0,0);
}
uStack_28 = uStack_10;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(auStack_38);
return;
}
| ['gcc'] |
11,067 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,068 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(size_t dataArray[])
{
/* copy data out of dataArray */
size_t data = dataArray[2];
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* copy data out of dataArray */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(long param_1)
{
undefined4 *puVar1;
if (*(ulong *)(param_1 + 0x10) < 6) {
printLine(&UNK_00401358);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*(ulong *)(param_1 + 0x10));
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,069 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink(size_t dataArray[])
{
size_t data = dataArray[2];
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink(long param_1)
{
undefined4 *puVar1;
if (*(ulong *)(param_1 + 0x10) < 6) {
printLine(&UNK_00401408);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(*(ulong *)(param_1 + 0x10));
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,070 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink(size_t dataArray[])
{
size_t data = dataArray[2];
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink(long param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *(ulong *)(param_1 + 0x10);
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401440);
}
else {
puVar2 = (undefined4 *)func_0x00400bb0(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400b10(puVar2);
}
return;
}
| ['gcc'] |
11,071 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad()
{
size_t data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
myStruct.structFirst = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(myStruct);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_18;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401344);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
uStack_18 = uStack_10;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,072 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,073 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,074 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401408);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,075 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401440);
}
else {
puVar1 = (undefined4 *)func_0x00400bb0(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,076 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
else
{
printLine("fgets() failed.");
}
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad(void)
{
long lVar1;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined2 uStack_20;
undefined8 uStack_10;
uStack_10 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin);
if (lVar1 == 0) {
printLine(&UNK_00401344);
}
else {
uStack_10 = func_0x00400be0(&uStack_38,0,0);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData = uStack_10;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink();
return;
}
| ['gcc'] |
11,077 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,078 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink(void)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)
func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,079 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink(void)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData < 6) {
printLine(&UNK_00401408);
}
else {
puVar1 = (undefined4 *)
func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,080 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink(void)
{
undefined4 *puVar1;
if ((CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData < 6) ||
(99 < CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData)) {
printLine(&UNK_00401440);
}
else {
puVar1 = (undefined4 *)
func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400b10(puVar1);
}
return;
}
| ['gcc'] |
11,081 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117079/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,082 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117079/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,083 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(1)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(1)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117080/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,084 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117080/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,085 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(5==5)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(5==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117081/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,086 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117081/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,087 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(STATIC_CONST_TRUE)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(STATIC_CONST_TRUE)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117082/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401280,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401288);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,088 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117082/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,089 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticTrue)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(staticTrue)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117083/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (staticTrue != 0) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (staticTrue != 0) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,090 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117083/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,091 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(STATIC_CONST_FIVE==5)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(STATIC_CONST_FIVE==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117084/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_0040127c,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,092 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117084/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,093 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticFive==5)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(staticFive==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117085/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (staticFive == 5) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (staticFive == 5) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,094 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117085/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,095 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticReturnsTrue())
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(staticReturnsTrue())
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117086/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad(void)
{
int iVar1;
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
func_0x00400ab0(stdin,&UNK_00401298,&uStack_18);
}
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
if (uStack_18 < 6) {
printLine(&UNK_004012a0);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,096 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117086/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,097 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(GLOBAL_CONST_TRUE)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(GLOBAL_CONST_TRUE)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117087/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (GLOBAL_CONST_TRUE != 0) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (GLOBAL_CONST_TRUE != 0) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,098 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117087/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,099 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(globalTrue)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(globalTrue)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117088/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (globalTrue != 0) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (globalTrue != 0) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.