Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
11,100
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117088/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_10_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,101
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad() { size_t data; /* Initialize data */ data = 0; if(globalReturnsTrue()) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(globalReturnsTrue()) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117089/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_bad(void) { int iVar1; ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } iVar1 = globalReturnsTrue(); if (iVar1 != 0) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,102
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117089/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_11_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,103
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad() { size_t data; /* Initialize data */ data = 0; if(globalReturnsTrueOrFalse()) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } else { /* FIX: Use a relatively small number for memory allocation */ data = 20; } if(globalReturnsTrueOrFalse()) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } else { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* FIX: Use a relatively small number for memory allocation */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117090/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_bad(void) { int iVar1; ulong uStack_20; undefined4 *puStack_18; undefined4 *puStack_10; uStack_20 = 0; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { uStack_20 = 0x14; } else { func_0x00400ab0(stdin,&UNK_004012e8,&uStack_20); } iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { if ((uStack_20 < 6) || (99 < uStack_20)) { printLine(&UNK_00401328); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_20); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } else if (uStack_20 < 6) { printLine(&UNK_004012f0); } else { puStack_18 = (undefined4 *)func_0x00400b40(uStack_20); *puStack_18 = 0x6c6c6568; *(undefined2 *)(puStack_18 + 1) = 0x6f; printLine(puStack_18); func_0x00400aa0(puStack_18); } return; }
['gcc']
11,104
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117090/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_12_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,105
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad() { size_t data; /* Initialize data */ data = 0; if(GLOBAL_CONST_FIVE==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(GLOBAL_CONST_FIVE==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117091/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (GLOBAL_CONST_FIVE == 5) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (GLOBAL_CONST_FIVE == 5) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,106
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117091/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_13_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,107
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad() { size_t data; /* Initialize data */ data = 0; if(globalFive==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } if(globalFive==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117092/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; if (globalFive == 5) { func_0x00400ab0(stdin,&UNK_00401278,&uStack_18); } if (globalFive == 5) { if (uStack_18 < 6) { printLine(&UNK_00401280); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } } return; }
['gcc']
11,108
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117092/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_14_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,109
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad() { size_t data; /* Initialize data */ data = 0; switch(6) { case 6: /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } switch(7) { case 7: { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117093/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,110
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117093/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_15_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,111
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad() { size_t data; /* Initialize data */ data = 0; while(1) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); break; } while(1) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117094/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,112
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117094/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_16_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,113
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad() { int i,j; size_t data; /* Initialize data */ data = 0; for(i = 0; i < 1; i++) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); } for(j = 0; j < 1; j++) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117095/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_bad(void) { ulong uStack_20; undefined4 *puStack_18; int iStack_10; int iStack_c; uStack_20 = 0; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { func_0x00400ab0(stdin,&UNK_00401288,&uStack_20); } for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) { if (uStack_20 < 6) { printLine(&UNK_00401290); } else { puStack_18 = (undefined4 *)func_0x00400b40(uStack_20); *puStack_18 = 0x6c6c6568; *(undefined2 *)(puStack_18 + 1) = 0x6f; printLine(puStack_18); func_0x00400aa0(puStack_18); } } return; }
['gcc']
11,114
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117095/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_17_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,115
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad() { size_t data; /* Initialize data */ data = 0; goto source; source: /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); goto sink; sink: { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117096/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_bad(void) { ulong uStack_18; undefined4 *puStack_10; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_18); if (uStack_18 < 6) { printLine(&UNK_00401270); } else { puStack_10 = (undefined4 *)func_0x00400b40(uStack_18); *puStack_10 = 0x6c6c6568; *(undefined2 *)(puStack_10 + 1) = 0x6f; printLine(puStack_10); func_0x00400aa0(puStack_10); } return; }
['gcc']
11,116
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117096/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_18_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,117
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); badStatic = 1; /* true */ badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* true */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117097/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_004012bb,&uStack_10); badStatic = 1; badSink(uStack_10); return; }
['gcc']
11,118
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good() { goodB2G1(); goodB2G2(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117097/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_21_good(void) { goodB2G1(); goodB2G2(); goodG2B(); return; }
['gcc']
11,119
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal = 1; /* true */ CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* true */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal = 1; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(uStack_10); return; }
['gcc']
11,120
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good() { goodB2G1(); goodB2G2(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_good(void) { goodB2G1(); goodB2G2(); goodG2B(); return; }
['gcc']
11,121
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badSink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_badGlobal != 0) { if (param_1 < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } } return; }
['gcc']
11,122
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Global) { /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); } else { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } } }
['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Sink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G1Global == 0) { if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401420); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } } else { printLine(&UNK_00401408); } return; }
['gcc']
11,123
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Global) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Sink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodB2G2Global != 0) { if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401420); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } } return; }
['gcc']
11,124
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BGlobal) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117098/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_22_goodG2BGlobal != 0) { if (param_1 < 6) { printLine(&UNK_00401460); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } } return; }
['gcc']
11,125
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); { size_t dataCopy = data; size_t data = dataCopy; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117099/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_bad(void) { ulong uStack_28; undefined4 *puStack_20; ulong uStack_18; ulong uStack_10; uStack_28 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_28); uStack_10 = uStack_28; uStack_18 = uStack_28; if (uStack_28 < 6) { printLine(&UNK_00401270); } else { puStack_20 = (undefined4 *)func_0x00400b40(uStack_28); *puStack_20 = 0x6c6c6568; *(undefined2 *)(puStack_20 + 1) = 0x6f; printLine(puStack_20); func_0x00400aa0(puStack_20); } return; }
['gcc']
11,126
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117099/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_31_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,127
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad() { size_t data; size_t *dataPtr1 = &data; size_t *dataPtr2 = &data; /* Initialize data */ data = 0; { size_t data = *dataPtr1; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); *dataPtr1 = data; } { size_t data = *dataPtr2; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117100/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad
/* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_bad(void) { ulong uStack_38; ulong uStack_30; undefined4 *puStack_28; ulong uStack_20; ulong *puStack_18; ulong *puStack_10; puStack_10 = &uStack_30; puStack_18 = &uStack_30; uStack_30 = 0; uStack_38 = 0; func_0x00400ab0(stdin,&UNK_00401298,&uStack_38); *puStack_10 = uStack_38; uStack_20 = *puStack_18; if (uStack_20 < 6) { printLine(&UNK_004012a0); } else { puStack_28 = (undefined4 *)func_0x00400b40(uStack_20); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400aa0(puStack_28); } return; }
['gcc']
11,128
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117100/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_32_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,129
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad() { size_t data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_unionType myUnion; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); myUnion.unionFirst = data; { size_t data = myUnion.unionSecond; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117102/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_bad(void) { ulong uStack_20; undefined4 *puStack_18; ulong uStack_10; uStack_20 = 0; func_0x00400ab0(stdin,&UNK_00401268,&uStack_20); uStack_10 = uStack_20; if (uStack_20 < 6) { printLine(&UNK_00401270); } else { puStack_18 = (undefined4 *)func_0x00400b40(uStack_20); *puStack_18 = 0x6c6c6568; *(undefined2 *)(puStack_18 + 1) = 0x6f; printLine(puStack_18); func_0x00400aa0(puStack_18); } return; }
['gcc']
11,130
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117102/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_34_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,131
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117103/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_004012ab,&uStack_10); badSink(uStack_10); return; }
['gcc']
11,132
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117103/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_41_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,133
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad() { size_t data; /* Initialize data */ data = 0; data = badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117104/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = badSource(0); if (uVar1 < 6) { printLine(&UNK_00401290); } else { puVar2 = (undefined4 *)func_0x00400b40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400aa0(puVar2); } return; }
['gcc']
11,134
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117104/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_42_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,135
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_badData = data; badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117107/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_004012bb,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_badData = uStack_10; badSink(); return; }
['gcc']
11,136
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117107/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_45_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,137
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401274,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(uStack_10); return; }
['gcc']
11,138
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,139
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401278); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,140
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401318); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,141
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117108/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_51b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401350); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,142
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401294,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(uStack_10); return; }
['gcc']
11,143
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,144
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(param_1); return; }
['gcc']
11,145
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(param_1); return; }
['gcc']
11,146
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(param_1); return; }
['gcc']
11,147
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401298); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,148
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401358); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,149
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117109/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_52c_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401390); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,150
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_004012b4,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(uStack_10); return; }
['gcc']
11,151
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,152
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(param_1); return; }
['gcc']
11,153
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(param_1); return; }
['gcc']
11,154
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(param_1); return; }
['gcc']
11,155
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(param_1); return; }
['gcc']
11,156
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(param_1); return; }
['gcc']
11,157
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(param_1); return; }
['gcc']
11,158
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004012b8); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,159
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401388); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,160
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117110/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_53d_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_004013c0); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,161
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_004012c4,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(uStack_10); return; }
['gcc']
11,162
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,163
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(param_1); return; }
['gcc']
11,164
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(param_1); return; }
['gcc']
11,165
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(param_1); return; }
['gcc']
11,166
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(param_1); return; }
['gcc']
11,167
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(param_1); return; }
['gcc']
11,168
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(param_1); return; }
['gcc']
11,169
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(param_1); return; }
['gcc']
11,170
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(param_1); return; }
['gcc']
11,171
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54d_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(param_1); return; }
['gcc']
11,172
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004012c8); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,173
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004013c8); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,174
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117111/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_54e_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401400); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,175
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad() { size_t data; /* Initialize data */ data = 0; data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(0); if (uVar1 < 6) { printLine(&UNK_00401288); } else { puVar2 = (undefined4 *)func_0x00400b40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400aa0(puVar2); } return; }
['gcc']
11,176
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,177
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(size_t data) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); return data; }
['/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_badSource(undefined8 param_1) { undefined8 uStack_10; uStack_10 = param_1; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); return uStack_10; }
['gcc']
11,178
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource(size_t data) { /* FIX: Use a relatively small number for memory allocation */ data = 20; return data; }
['/* FIX: Use a relatively small number for memory allocation */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodG2BSource(void) { return 0x14; }
['gcc']
11,179
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource(size_t data) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); return data; }
['/* POTENTIAL FLAW: Read data from the console using fscanf() */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117112/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_61b_goodB2GSource(undefined8 param_1) { undefined8 uStack_10; uStack_10 = param_1; func_0x00400ab0(stdin,&UNK_00401324,&uStack_10); return uStack_10; }
['gcc']
11,180
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(&uStack_10); return; }
['gcc']
11,181
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,182
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_badSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,183
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodG2BSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401338); } else { puVar1 = (undefined4 *)func_0x00400b40(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,184
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink(size_t * dataPtr) { size_t data = *dataPtr; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117114/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_63b_goodB2GSink(ulong *param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *param_1; if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401370); } else { puVar2 = (undefined4 *)func_0x00400b40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400aa0(puVar2); } return; }
['gcc']
11,185
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(&uStack_10); return; }
['gcc']
11,186
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,187
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_badSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,188
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodG2BSink(ulong *param_1) { undefined4 *puVar1; if (*param_1 < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *)func_0x00400b40(*param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,189
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ size_t * dataPtr = (size_t *)dataVoidPtr; /* dereference dataPtr into data */ size_t data = (*dataPtr); { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117115/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_64b_goodB2GSink(ulong *param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *param_1; if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401380); } else { puVar2 = (undefined4 *)func_0x00400b40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400aa0(puVar2); } return; }
['gcc']
11,190
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad() { size_t data; /* define a function pointer */ void (*funcPtr) (size_t) = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); /* use the function pointer */ funcPtr(data); }
['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* use the function pointer */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_bad(void) { undefined8 uStack_18; code *pcStack_10; pcStack_10 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink; uStack_18 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_18); (*pcStack_10)(uStack_18); return; }
['gcc']
11,191
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,192
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,193
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401338); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,194
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117116/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_65b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401370); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,195
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad() { size_t data; size_t dataArray[5]; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); /* put data in array */ dataArray[2] = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(dataArray); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* put data in array */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_bad(void) { undefined auStack_38 [16]; undefined8 uStack_28; undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); uStack_28 = uStack_10; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(auStack_38); return; }
['gcc']
11,196
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,197
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(size_t dataArray[]) { /* copy data out of dataArray */ size_t data = dataArray[2]; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* copy data out of dataArray */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_badSink(long param_1) { undefined4 *puVar1; if (*(ulong *)(param_1 + 0x10) < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(*(ulong *)(param_1 + 0x10)); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,198
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink(size_t dataArray[]) { size_t data = dataArray[2]; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodG2BSink(long param_1) { undefined4 *puVar1; if (*(ulong *)(param_1 + 0x10) < 6) { printLine(&UNK_00401348); } else { puVar1 = (undefined4 *)func_0x00400b40(*(ulong *)(param_1 + 0x10)); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,199
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink(size_t dataArray[]) { size_t data = dataArray[2]; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117117/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_66b_goodB2GSink(long param_1) { ulong uVar1; undefined4 *puVar2; uVar1 = *(ulong *)(param_1 + 0x10); if ((uVar1 < 6) || (99 < uVar1)) { printLine(&UNK_00401380); } else { puVar2 = (undefined4 *)func_0x00400b40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400aa0(puVar2); } return; }
['gcc']