Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
11,000
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117055/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_0040136b); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } badSink(uStack_10); return; }
['gcc']
11,001
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117055/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_41_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,002
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad() { size_t data; /* Initialize data */ data = 0; data = badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117056/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = badSource(0); if (uVar1 < 6) { printLine(&UNK_00401358); } else { puVar2 = (undefined4 *)func_0x00400bb0(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400b10(puVar2); } return; }
['gcc']
11,003
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117056/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_42_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,004
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad() { size_t data; /* define a function pointer */ void (*funcPtr) (size_t) = badSink; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } /* use the function pointer */ funcPtr(data); }
['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* use the function pointer */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117058/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; code *pcStack_18; undefined8 uStack_10; pcStack_18 = badSink; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_0040137b); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } (*pcStack_18)(uStack_10); return; }
['gcc']
11,005
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117058/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_44_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,006
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_badData = data; badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117059/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_0040137b); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_badData = uStack_10; badSink(); return; }
['gcc']
11,007
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117059/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_45_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,008
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401334); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(uStack_10); return; }
['gcc']
11,009
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,010
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401338); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,011
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004013e8); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,012
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117060/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_51b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401420); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,013
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401354); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(uStack_10); return; }
['gcc']
11,014
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,015
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(param_1); return; }
['gcc']
11,016
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(param_1); return; }
['gcc']
11,017
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(param_1); return; }
['gcc']
11,018
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401358); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,019
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401418); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,020
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117061/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_52c_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401450); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,021
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401374); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(uStack_10); return; }
['gcc']
11,022
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,023
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(param_1); return; }
['gcc']
11,024
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(param_1); return; }
['gcc']
11,025
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(param_1); return; }
['gcc']
11,026
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(param_1); return; }
['gcc']
11,027
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(param_1); return; }
['gcc']
11,028
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(param_1); return; }
['gcc']
11,029
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401378); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,030
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401448); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,031
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117062/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_53d_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401480); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,032
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401384); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(uStack_10); return; }
['gcc']
11,033
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,034
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(param_1); return; }
['gcc']
11,035
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(param_1); return; }
['gcc']
11,036
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(param_1); return; }
['gcc']
11,037
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(param_1); return; }
['gcc']
11,038
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(param_1); return; }
['gcc']
11,039
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(param_1); return; }
['gcc']
11,040
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(param_1); return; }
['gcc']
11,041
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(param_1); return; }
['gcc']
11,042
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54d_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(param_1); return; }
['gcc']
11,043
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401388); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,044
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401488); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,045
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117063/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_54e_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_004014c0); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,046
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad() { size_t data; /* Initialize data */ data = 0; data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(0); if (uVar1 < 6) { printLine(&UNK_00401348); } else { puVar2 = (undefined4 *)func_0x00400bb0(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400b10(puVar2); } return; }
['gcc']
11,047
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,048
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(size_t data) { { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } return data; }
['/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_badSource(undefined8 param_1) { long lVar1; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined8 uStack_18; undefined2 uStack_10; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; uStack_10 = 0; lVar1 = func_0x00400b70(&uStack_28,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401344); uStack_30 = param_1; } else { uStack_30 = func_0x00400be0(&uStack_28,0,0); } return uStack_30; }
['gcc']
11,049
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource(size_t data) { /* FIX: Use a relatively small number for memory allocation */ data = 20; return data; }
['/* FIX: Use a relatively small number for memory allocation */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodG2BSource(void) { return 0x14; }
['gcc']
11,050
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource(size_t data) { { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } return data; }
['/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117064/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_61b_goodB2GSource(undefined8 param_1) { long lVar1; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined8 uStack_18; undefined2 uStack_10; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; uStack_10 = 0; lVar1 = func_0x00400b70(&uStack_28,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_004013e4); uStack_30 = param_1; } else { uStack_30 = func_0x00400be0(&uStack_28,0,0); } return uStack_30; }
['gcc']
11,051
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401344); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(&uStack_10); return; }
['gcc']
11,052
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,053
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_badSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *)func_0x00400bb0(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,054
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodG2BSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_004013f8); } else { puVar1 = (undefined4 *)func_0x00400bb0(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,055
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117066/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_63b_goodB2GSink(ulong *param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *param_1; if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401430); } else { puVar2 = (undefined4 *)func_0x00400bb0(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400b10(puVar2); } return; }
['gcc']
11,056
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401354); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(&uStack_10); return; }
['gcc']
11,057
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,058
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_badSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401358); } else { puVar1 = (undefined4 *)func_0x00400bb0(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,059
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodG2BSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401408); } else { puVar1 = (undefined4 *)func_0x00400bb0(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,060
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117067/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_64b_goodB2GSink(ulong *param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *param_1; if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401440); } else { puVar2 = (undefined4 *)func_0x00400bb0(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400b10(puVar2); } return; }
['gcc']
11,061
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad() { size_t data; /* define a function pointer */ void (*funcPtr) (size_t) = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } /* use the function pointer */ funcPtr(data); }
['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* use the function pointer */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; code *pcStack_18; undefined8 uStack_10; pcStack_18 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401344); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } (*pcStack_18)(uStack_10); return; }
['gcc']
11,062
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,063
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,064
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004013f8); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,065
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117068/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_65b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401430); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,066
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad() { size_t data; size_t dataArray[5]; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } /* put data in array */ dataArray[2] = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(dataArray); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */', '/* put data in array */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_bad(void) { long lVar1; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined2 uStack_40; undefined auStack_38 [16]; undefined8 uStack_28; undefined8 uStack_10; uStack_10 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; lVar1 = func_0x00400b70(&uStack_58,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401354); } else { uStack_10 = func_0x00400be0(&uStack_58,0,0); } uStack_28 = uStack_10; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(auStack_38); return; }
['gcc']
11,067
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,068
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(size_t dataArray[]) { /* copy data out of dataArray */ size_t data = dataArray[2]; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* copy data out of dataArray */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_badSink(long param_1) { undefined4 *puVar1; if (*(ulong *)(param_1 + 0x10) < 6) { printLine(&UNK_00401358); } else { puVar1 = (undefined4 *)func_0x00400bb0(*(ulong *)(param_1 + 0x10)); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,069
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink(size_t dataArray[]) { size_t data = dataArray[2]; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodG2BSink(long param_1) { undefined4 *puVar1; if (*(ulong *)(param_1 + 0x10) < 6) { printLine(&UNK_00401408); } else { puVar1 = (undefined4 *)func_0x00400bb0(*(ulong *)(param_1 + 0x10)); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,070
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink(size_t dataArray[]) { size_t data = dataArray[2]; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117069/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_66b_goodB2GSink(long param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *(ulong *)(param_1 + 0x10); if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401440); } else { puVar2 = (undefined4 *)func_0x00400bb0(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400b10(puVar2); } return; }
['gcc']
11,071
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad() { size_t data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } myStruct.structFirst = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(myStruct); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_18; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401344); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } uStack_18 = uStack_10; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(uStack_10); return; }
['gcc']
11,072
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,073
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,074
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401408); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,075
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117070/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_67b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401440); } else { puVar1 = (undefined4 *)func_0x00400bb0(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,076
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad() { size_t data; /* Initialize data */ data = 0; { char inputBuffer[CHAR_ARRAY_SIZE] = ""; /* POTENTIAL FLAW: Read data from the console using fgets() */ if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL) { /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } else { printLine("fgets() failed."); } } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fgets() */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_bad(void) { long lVar1; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined2 uStack_20; undefined8 uStack_10; uStack_10 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; lVar1 = func_0x00400b70(&uStack_38,0x1a,stdin); if (lVar1 == 0) { printLine(&UNK_00401344); } else { uStack_10 = func_0x00400be0(&uStack_38,0,0); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData = uStack_10; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink(); return; }
['gcc']
11,077
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,078
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_badSink(void) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *) func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_badData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,079
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodG2BSink(void) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData < 6) { printLine(&UNK_00401408); } else { puVar1 = (undefined4 *) func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodG2BData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,080
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117071/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68b_goodB2GSink(void) { undefined4 *puVar1; if ((CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData < 6) || (99 < CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData)) { printLine(&UNK_00401440); } else { puVar1 = (undefined4 *) func_0x00400bb0(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fgets_68_goodB2GData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400b10(puVar1); } return; }
['gcc']
11,081
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117079/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,082
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117079/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_01_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,083
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad() { size_t data; /* Initialize data */ data = 0; if(1) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(1) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117080/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,084
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117080/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_02_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,085
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad() { size_t data; /* Initialize data */ data = 0; if(5==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(5==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117081/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,086
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117081/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_03_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,087
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad() { size_t data; /* Initialize data */ data = 0; if(STATIC_CONST_TRUE) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(STATIC_CONST_TRUE) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117082/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401280,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401288); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,088
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117082/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_04_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,089
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad() { size_t data; /* Initialize data */ data = 0; if(staticTrue) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(staticTrue) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117083/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (staticTrue != 0) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (staticTrue != 0) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,090
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117083/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_05_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,091
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad() { size_t data; /* Initialize data */ data = 0; if(STATIC_CONST_FIVE==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(STATIC_CONST_FIVE==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117084/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_0040127c,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,092
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117084/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_06_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,093
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad() { size_t data; /* Initialize data */ data = 0; if(staticFive==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(staticFive==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117085/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (staticFive == 5) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (staticFive == 5) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,094
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117085/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_07_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,095
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad() { size_t data; /* Initialize data */ data = 0; if(staticReturnsTrue()) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(staticReturnsTrue()) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117086/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_bad(void) { int iVar1; ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { func_0x00400ab0(stdin,&UNK_00401298,&uStack_18); } iVar1 = staticReturnsTrue(); if (iVar1 != 0) { if (uStack_18 < 6) { printLine(&UNK_004012a0); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,096
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117086/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_08_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,097
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad() { size_t data; /* Initialize data */ data = 0; if(GLOBAL_CONST_TRUE) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(GLOBAL_CONST_TRUE) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117087/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (GLOBAL_CONST_TRUE != 0) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (GLOBAL_CONST_TRUE != 0) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,098
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117087/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_09_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,099
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad() { size_t data; /* Initialize data */ data = 0; if(globalTrue) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(globalTrue) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117088/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (globalTrue != 0) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (globalTrue != 0) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']