Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68 values | dataset_name stringclasses 1 value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1 value |
|---|---|---|---|---|---|---|---|---|
11,100 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117088/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,101 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(globalReturnsTrue())
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(globalReturnsTrue())
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117089/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad(void)
{
int iVar1;
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,102 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117089/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,103 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(globalReturnsTrueOrFalse())
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
else
{
/* FIX: Use a relatively small number for memory allocation */
data = 20;
}
if(globalReturnsTrueOrFalse())
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
else
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* FIX: Use a relatively small number for memory allocation */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117090/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad(void)
{
int iVar1;
ulong uStack_20;
undefined4 *puStack_18;
undefined4 *puStack_10;
uStack_20 = 0;
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 == 0) {
uStack_20 = 0x14;
}
else {
func_0x00400ab0(stdin,&UNK_004012e8,&uStack_20);
}
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 == 0) {
if ((uStack_20 < 6) || (99 < uStack_20)) {
printLine(&UNK_00401328);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_20);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
else if (uStack_20 < 6) {
printLine(&UNK_004012f0);
}
else {
puStack_18 = (undefined4 *)func_0x00400b40(uStack_20);
*puStack_18 = 0x6c6c6568;
*(undefined2 *)(puStack_18 + 1) = 0x6f;
printLine(puStack_18);
func_0x00400aa0(puStack_18);
}
return;
}
| ['gcc'] |
11,104 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117090/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,105 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(GLOBAL_CONST_FIVE==5)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(GLOBAL_CONST_FIVE==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117091/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (GLOBAL_CONST_FIVE == 5) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (GLOBAL_CONST_FIVE == 5) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,106 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117091/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,107 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(globalFive==5)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
if(globalFive==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117092/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
if (globalFive == 5) {
func_0x00400ab0(stdin,&UNK_00401278,&uStack_18);
}
if (globalFive == 5) {
if (uStack_18 < 6) {
printLine(&UNK_00401280);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
}
return;
}
| ['gcc'] |
11,108 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117092/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,109 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad()
{
size_t data;
/* Initialize data */
data = 0;
switch(6)
{
case 6:
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
switch(7)
{
case 7:
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117093/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,110 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117093/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,111 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad()
{
size_t data;
/* Initialize data */
data = 0;
while(1)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
break;
}
while(1)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
break;
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117094/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,112 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117094/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,113 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad()
{
int i,j;
size_t data;
/* Initialize data */
data = 0;
for(i = 0; i < 1; i++)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
}
for(j = 0; j < 1; j++)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117095/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad(void)
{
ulong uStack_20;
undefined4 *puStack_18;
int iStack_10;
int iStack_c;
uStack_20 = 0;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
func_0x00400ab0(stdin,&UNK_00401288,&uStack_20);
}
for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) {
if (uStack_20 < 6) {
printLine(&UNK_00401290);
}
else {
puStack_18 = (undefined4 *)func_0x00400b40(uStack_20);
*puStack_18 = 0x6c6c6568;
*(undefined2 *)(puStack_18 + 1) = 0x6f;
printLine(puStack_18);
func_0x00400aa0(puStack_18);
}
}
return;
}
| ['gcc'] |
11,114 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117095/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,115 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad()
{
size_t data;
/* Initialize data */
data = 0;
goto source;
source:
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
goto sink;
sink:
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117096/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad(void)
{
ulong uStack_18;
undefined4 *puStack_10;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_18);
if (uStack_18 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_10 = (undefined4 *)func_0x00400b40(uStack_18);
*puStack_10 = 0x6c6c6568;
*(undefined2 *)(puStack_10 + 1) = 0x6f;
printLine(puStack_10);
func_0x00400aa0(puStack_10);
}
return;
}
| ['gcc'] |
11,116 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117096/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,117 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
badStatic = 1; /* true */
badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* true */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117097/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_004012bb,&uStack_10);
badStatic = 1;
badSink(uStack_10);
return;
}
| ['gcc'] |
11,118 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117097/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
11,119 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal = 1; /* true */
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* true */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal = 1;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(uStack_10);
return;
}
| ['gcc'] |
11,120 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
11,121 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal != 0) {
if (param_1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
}
return;
}
| ['gcc'] |
11,122 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Global)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
}
} | ['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Global == 0) {
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401420);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
}
else {
printLine(&UNK_00401408);
}
return;
}
| ['gcc'] |
11,123 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Global)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Global != 0) {
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401420);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
}
return;
}
| ['gcc'] |
11,124 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BGlobal)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BGlobal != 0) {
if (param_1 < 6) {
printLine(&UNK_00401460);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
}
return;
}
| ['gcc'] |
11,125 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
{
size_t dataCopy = data;
size_t data = dataCopy;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117099/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad(void)
{
ulong uStack_28;
undefined4 *puStack_20;
ulong uStack_18;
ulong uStack_10;
uStack_28 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_28);
uStack_10 = uStack_28;
uStack_18 = uStack_28;
if (uStack_28 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_20 = (undefined4 *)func_0x00400b40(uStack_28);
*puStack_20 = 0x6c6c6568;
*(undefined2 *)(puStack_20 + 1) = 0x6f;
printLine(puStack_20);
func_0x00400aa0(puStack_20);
}
return;
}
| ['gcc'] |
11,126 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117099/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,127 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad()
{
size_t data;
size_t *dataPtr1 = &data;
size_t *dataPtr2 = &data;
/* Initialize data */
data = 0;
{
size_t data = *dataPtr1;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
*dataPtr1 = data;
}
{
size_t data = *dataPtr2;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117100/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad |
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad(void)
{
ulong uStack_38;
ulong uStack_30;
undefined4 *puStack_28;
ulong uStack_20;
ulong *puStack_18;
ulong *puStack_10;
puStack_10 = &uStack_30;
puStack_18 = &uStack_30;
uStack_30 = 0;
uStack_38 = 0;
func_0x00400ab0(stdin,&UNK_00401298,&uStack_38);
*puStack_10 = uStack_38;
uStack_20 = *puStack_18;
if (uStack_20 < 6) {
printLine(&UNK_004012a0);
}
else {
puStack_28 = (undefined4 *)func_0x00400b40(uStack_20);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400aa0(puStack_28);
}
return;
}
| ['gcc'] |
11,128 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117100/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,129 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad()
{
size_t data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_unionType myUnion;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
myUnion.unionFirst = data;
{
size_t data = myUnion.unionSecond;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117102/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad(void)
{
ulong uStack_20;
undefined4 *puStack_18;
ulong uStack_10;
uStack_20 = 0;
func_0x00400ab0(stdin,&UNK_00401268,&uStack_20);
uStack_10 = uStack_20;
if (uStack_20 < 6) {
printLine(&UNK_00401270);
}
else {
puStack_18 = (undefined4 *)func_0x00400b40(uStack_20);
*puStack_18 = 0x6c6c6568;
*(undefined2 *)(puStack_18 + 1) = 0x6f;
printLine(puStack_18);
func_0x00400aa0(puStack_18);
}
return;
}
| ['gcc'] |
11,130 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117102/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,131 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117103/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_004012ab,&uStack_10);
badSink(uStack_10);
return;
}
| ['gcc'] |
11,132 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117103/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,133 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117104/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = badSource(0);
if (uVar1 < 6) {
printLine(&UNK_00401290);
}
else {
puVar2 = (undefined4 *)func_0x00400b40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400aa0(puVar2);
}
return;
}
| ['gcc'] |
11,134 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117104/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,135 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_badData = data;
badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117107/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_004012bb,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_badData = uStack_10;
badSink();
return;
}
| ['gcc'] |
11,136 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117107/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,137 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401274,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,138 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,139 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401278);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,140 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401318);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,141 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401350);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,142 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401294,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,143 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,144 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(param_1);
return;
}
| ['gcc'] |
11,145 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,146 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,147 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401298);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,148 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401358);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,149 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401390);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,150 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_004012b4,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,151 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,152 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(param_1);
return;
}
| ['gcc'] |
11,153 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,154 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,155 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(param_1);
return;
}
| ['gcc'] |
11,156 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,157 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,158 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004012b8);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,159 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401388);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,160 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_004013c0);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,161 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_004012c4,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,162 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,163 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(param_1);
return;
}
| ['gcc'] |
11,164 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,165 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,166 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(param_1);
return;
}
| ['gcc'] |
11,167 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,168 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,169 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(param_1);
return;
}
| ['gcc'] |
11,170 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,171 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,172 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004012c8);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,173 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004013c8);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,174 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401400);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,175 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(0);
if (uVar1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar2 = (undefined4 *)func_0x00400b40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400aa0(puVar2);
}
return;
}
| ['gcc'] |
11,176 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,177 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(size_t data)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
return data;
} | ['/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(undefined8 param_1)
{
undefined8 uStack_10;
uStack_10 = param_1;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
return uStack_10;
}
| ['gcc'] |
11,178 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource(size_t data)
{
/* FIX: Use a relatively small number for memory allocation */
data = 20;
return data;
} | ['/* FIX: Use a relatively small number for memory allocation */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource(void)
{
return 0x14;
}
| ['gcc'] |
11,179 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource(size_t data)
{
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
return data;
} | ['/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource(undefined8 param_1)
{
undefined8 uStack_10;
uStack_10 = param_1;
func_0x00400ab0(stdin,&UNK_00401324,&uStack_10);
return uStack_10;
}
| ['gcc'] |
11,180 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(&uStack_10);
return;
}
| ['gcc'] |
11,181 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,182 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,183 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401338);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,184 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink(size_t * dataPtr)
{
size_t data = *dataPtr;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink(ulong *param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *param_1;
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401370);
}
else {
puVar2 = (undefined4 *)func_0x00400b40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400aa0(puVar2);
}
return;
}
| ['gcc'] |
11,185 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(&uStack_10);
return;
}
| ['gcc'] |
11,186 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,187 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,188 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink(ulong *param_1)
{
undefined4 *puVar1;
if (*param_1 < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,189 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
size_t * dataPtr = (size_t *)dataVoidPtr;
/* dereference dataPtr into data */
size_t data = (*dataPtr);
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink(ulong *param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *param_1;
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401380);
}
else {
puVar2 = (undefined4 *)func_0x00400b40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400aa0(puVar2);
}
return;
}
| ['gcc'] |
11,190 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad()
{
size_t data;
/* define a function pointer */
void (*funcPtr) (size_t) = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* use the function pointer */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad(void)
{
undefined8 uStack_18;
code *pcStack_10;
pcStack_10 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink;
uStack_18 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_18);
(*pcStack_10)(uStack_18);
return;
}
| ['gcc'] |
11,191 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,192 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,193 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401338);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,194 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401370);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,195 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad()
{
size_t data;
size_t dataArray[5];
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
/* put data in array */
dataArray[2] = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(dataArray);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* put data in array */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad(void)
{
undefined auStack_38 [16];
undefined8 uStack_28;
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
uStack_28 = uStack_10;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(auStack_38);
return;
}
| ['gcc'] |
11,196 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,197 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(size_t dataArray[])
{
/* copy data out of dataArray */
size_t data = dataArray[2];
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* copy data out of dataArray */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(long param_1)
{
undefined4 *puVar1;
if (*(ulong *)(param_1 + 0x10) < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*(ulong *)(param_1 + 0x10));
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,198 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink(size_t dataArray[])
{
size_t data = dataArray[2];
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink(long param_1)
{
undefined4 *puVar1;
if (*(ulong *)(param_1 + 0x10) < 6) {
printLine(&UNK_00401348);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(*(ulong *)(param_1 + 0x10));
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,199 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink(size_t dataArray[])
{
size_t data = dataArray[2];
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink(long param_1)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = *(ulong *)(param_1 + 0x10);
if ((uVar1 < 6) || (99 < uVar1)) {
printLine(&UNK_00401380);
}
else {
puVar2 = (undefined4 *)func_0x00400b40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400aa0(puVar2);
}
return;
}
| ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.