Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
12,200
void CWE78_OS_Command_Injection__char_connect_socket_execl_67_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117982/CWE78_OS_Command_Injection__char_connect_socket_execl_67a.c
CWE78_OS_Command_Injection__char_connect_socket_execl_67_good
void CWE78_OS_Command_Injection__char_connect_socket_execl_67_good(void) { goodG2B(); return; }
['gcc']
12,201
void CWE78_OS_Command_Injection__char_connect_socket_execl_67b_badSink(CWE78_OS_Command_Injection__char_connect_socket_execl_67_structType myStruct) { char * data = myStruct.structFirst; /* execl - specify the path where the command is located */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117982/CWE78_OS_Command_Injection__char_connect_socket_execl_67b.c
CWE78_OS_Command_Injection__char_connect_socket_execl_67b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execl_67b_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040161b,&UNK_0040161b,&UNK_00401618,&UNK_00401614,param_1,0); return; }
['gcc']
12,202
void CWE78_OS_Command_Injection__char_connect_socket_execl_67b_goodG2BSink(CWE78_OS_Command_Injection__char_connect_socket_execl_67_structType myStruct) { char * data = myStruct.structFirst; /* execl - specify the path where the command is located */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117982/CWE78_OS_Command_Injection__char_connect_socket_execl_67b.c
CWE78_OS_Command_Injection__char_connect_socket_execl_67b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execl_67b_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214,param_1,0); return; }
['gcc']
12,203
void CWE78_OS_Command_Injection__char_connect_socket_execl_68_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execl_68_badData = data; CWE78_OS_Command_Injection__char_connect_socket_execl_68b_badSink(); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117983/CWE78_OS_Command_Injection__char_connect_socket_execl_68a.c
CWE78_OS_Command_Injection__char_connect_socket_execl_68_bad
void CWE78_OS_Command_Injection__char_connect_socket_execl_68_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401614); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execl_68_badData = puStack_10; CWE78_OS_Command_Injection__char_connect_socket_execl_68b_badSink(); return; }
['gcc']
12,204
void CWE78_OS_Command_Injection__char_connect_socket_execl_68_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117983/CWE78_OS_Command_Injection__char_connect_socket_execl_68a.c
CWE78_OS_Command_Injection__char_connect_socket_execl_68_good
void CWE78_OS_Command_Injection__char_connect_socket_execl_68_good(void) { goodG2B(); return; }
['gcc']
12,205
void CWE78_OS_Command_Injection__char_connect_socket_execl_68b_badSink() { char * data = CWE78_OS_Command_Injection__char_connect_socket_execl_68_badData; /* execl - specify the path where the command is located */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117983/CWE78_OS_Command_Injection__char_connect_socket_execl_68b.c
CWE78_OS_Command_Injection__char_connect_socket_execl_68b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execl_68b_badSink(void) { func_0x00400d60(&UNK_0040161b,&UNK_0040161b,&UNK_00401618,&UNK_00401614, CWE78_OS_Command_Injection__char_connect_socket_execl_68_badData,0); return; }
['gcc']
12,206
void CWE78_OS_Command_Injection__char_connect_socket_execl_68b_goodG2BSink() { char * data = CWE78_OS_Command_Injection__char_connect_socket_execl_68_goodG2BData; /* execl - specify the path where the command is located */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117983/CWE78_OS_Command_Injection__char_connect_socket_execl_68b.c
CWE78_OS_Command_Injection__char_connect_socket_execl_68b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execl_68b_goodG2BSink(void) { func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214, CWE78_OS_Command_Injection__char_connect_socket_execl_68_goodG2BData,0); return; }
['gcc']
12,207
void CWE78_OS_Command_Injection__char_connect_socket_execlp_01_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117991/CWE78_OS_Command_Injection__char_connect_socket_execlp_01.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_01_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_01_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,208
void CWE78_OS_Command_Injection__char_connect_socket_execlp_01_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117991/CWE78_OS_Command_Injection__char_connect_socket_execlp_01.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_01_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_01_good(void) { goodG2B(); return; }
['gcc']
12,209
void CWE78_OS_Command_Injection__char_connect_socket_execlp_02_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117992/CWE78_OS_Command_Injection__char_connect_socket_execlp_02.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_02_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_02_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,210
void CWE78_OS_Command_Injection__char_connect_socket_execlp_02_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117992/CWE78_OS_Command_Injection__char_connect_socket_execlp_02.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_02_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_02_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,211
void CWE78_OS_Command_Injection__char_connect_socket_execlp_03_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(5==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117993/CWE78_OS_Command_Injection__char_connect_socket_execlp_03.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_03_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_03_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,212
void CWE78_OS_Command_Injection__char_connect_socket_execlp_03_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117993/CWE78_OS_Command_Injection__char_connect_socket_execlp_03.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_03_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_03_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,213
void CWE78_OS_Command_Injection__char_connect_socket_execlp_04_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(STATIC_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117994/CWE78_OS_Command_Injection__char_connect_socket_execlp_04.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_04_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_04_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015fc); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_0040160d,&UNK_0040160d,&UNK_0040160a,&UNK_00401606,puStack_10,0); return; }
['gcc']
12,214
void CWE78_OS_Command_Injection__char_connect_socket_execlp_04_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117994/CWE78_OS_Command_Injection__char_connect_socket_execlp_04.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_04_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_04_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,215
void CWE78_OS_Command_Injection__char_connect_socket_execlp_05_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(staticTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117995/CWE78_OS_Command_Injection__char_connect_socket_execlp_05.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_05_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_05_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (staticTrue != 0) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,216
void CWE78_OS_Command_Injection__char_connect_socket_execlp_05_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117995/CWE78_OS_Command_Injection__char_connect_socket_execlp_05.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_05_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_05_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,217
void CWE78_OS_Command_Injection__char_connect_socket_execlp_06_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(STATIC_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117996/CWE78_OS_Command_Injection__char_connect_socket_execlp_06.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_06_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_06_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f8); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_00401609,&UNK_00401609,&UNK_00401606,&UNK_00401602,puStack_10,0); return; }
['gcc']
12,218
void CWE78_OS_Command_Injection__char_connect_socket_execlp_06_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117996/CWE78_OS_Command_Injection__char_connect_socket_execlp_06.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_06_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_06_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,219
void CWE78_OS_Command_Injection__char_connect_socket_execlp_07_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(staticFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117997/CWE78_OS_Command_Injection__char_connect_socket_execlp_07.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_07_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_07_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (staticFive == 5) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,220
void CWE78_OS_Command_Injection__char_connect_socket_execlp_07_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117997/CWE78_OS_Command_Injection__char_connect_socket_execlp_07.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_07_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_07_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,221
void CWE78_OS_Command_Injection__char_connect_socket_execlp_08_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(staticReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117998/CWE78_OS_Command_Injection__char_connect_socket_execlp_08.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_08_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_08_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401614); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401625,&UNK_00401625,&UNK_00401622,&UNK_0040161e,puStack_10,0); return; }
['gcc']
12,222
void CWE78_OS_Command_Injection__char_connect_socket_execlp_08_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117998/CWE78_OS_Command_Injection__char_connect_socket_execlp_08.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_08_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_08_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,223
void CWE78_OS_Command_Injection__char_connect_socket_execlp_09_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(GLOBAL_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117999/CWE78_OS_Command_Injection__char_connect_socket_execlp_09.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_09_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_09_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (GLOBAL_CONST_TRUE != 0) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,224
void CWE78_OS_Command_Injection__char_connect_socket_execlp_09_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117999/CWE78_OS_Command_Injection__char_connect_socket_execlp_09.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_09_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_09_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,225
void CWE78_OS_Command_Injection__char_connect_socket_execlp_10_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118000/CWE78_OS_Command_Injection__char_connect_socket_execlp_10.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_10_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_10_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (globalTrue != 0) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,226
void CWE78_OS_Command_Injection__char_connect_socket_execlp_10_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118000/CWE78_OS_Command_Injection__char_connect_socket_execlp_10.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_10_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_10_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,227
void CWE78_OS_Command_Injection__char_connect_socket_execlp_11_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118001/CWE78_OS_Command_Injection__char_connect_socket_execlp_11.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_11_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_11_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,228
void CWE78_OS_Command_Injection__char_connect_socket_execlp_11_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118001/CWE78_OS_Command_Injection__char_connect_socket_execlp_11.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_11_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_11_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,229
void CWE78_OS_Command_Injection__char_connect_socket_execlp_12_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalReturnsTrueOrFalse()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } else { /* FIX: Append a fixed string to data (not user / external input) */ strcat(data, "*.*"); } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* FIX: Append a fixed string to data (not user / external input) */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118002/CWE78_OS_Command_Injection__char_connect_socket_execlp_12.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_12_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_12_bad(void) { char cVar1; int iVar2; ulong uVar3; undefined8 *puVar4; byte bVar5; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; bVar5 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iVar2 = globalReturnsTrueOrFalse(); if (iVar2 == 0) { uVar3 = 0xffffffffffffffff; puVar4 = puStack_10; do { if (uVar3 == 0) break; uVar3 = uVar3 - 1; cVar1 = *(char *)puVar4; puVar4 = (undefined8 *)((long)puVar4 + (ulong)bVar5 * -2 + 1); } while (cVar1 != '\0'); *(undefined4 *)((long)puStack_10 + (~uVar3 - 1)) = 0x2a2e2a; } else { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401624); uStack_a6 = func_0x00400c80(0x6987); iVar2 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar2 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(char *)((long)puStack_10 + lStack_20), 99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(char *)((long)puStack_10 + iStack_24 + lStack_20) = '\0'; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401635,&UNK_00401635,&UNK_00401632,&UNK_0040162e,puStack_10,0); return; }
['gcc']
12,230
void CWE78_OS_Command_Injection__char_connect_socket_execlp_12_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118002/CWE78_OS_Command_Injection__char_connect_socket_execlp_12.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_12_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_12_good(void) { goodG2B(); return; }
['gcc']
12,231
void CWE78_OS_Command_Injection__char_connect_socket_execlp_13_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(GLOBAL_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118003/CWE78_OS_Command_Injection__char_connect_socket_execlp_13.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_13_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_13_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (GLOBAL_CONST_FIVE == 5) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,232
void CWE78_OS_Command_Injection__char_connect_socket_execlp_13_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118003/CWE78_OS_Command_Injection__char_connect_socket_execlp_13.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_13_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_13_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,233
void CWE78_OS_Command_Injection__char_connect_socket_execlp_14_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118004/CWE78_OS_Command_Injection__char_connect_socket_execlp_14.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_14_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_14_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; if (globalFive == 5) { iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015f4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } } func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,234
void CWE78_OS_Command_Injection__char_connect_socket_execlp_14_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118004/CWE78_OS_Command_Injection__char_connect_socket_execlp_14.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_14_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_14_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,235
void CWE78_OS_Command_Injection__char_connect_socket_execlp_15_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; switch(6) { case 6: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118005/CWE78_OS_Command_Injection__char_connect_socket_execlp_15.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_15_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_15_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,236
void CWE78_OS_Command_Injection__char_connect_socket_execlp_15_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118005/CWE78_OS_Command_Injection__char_connect_socket_execlp_15.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_15_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_15_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,237
void CWE78_OS_Command_Injection__char_connect_socket_execlp_16_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; while(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118006/CWE78_OS_Command_Injection__char_connect_socket_execlp_16.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_16_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_16_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,238
void CWE78_OS_Command_Injection__char_connect_socket_execlp_16_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118006/CWE78_OS_Command_Injection__char_connect_socket_execlp_16.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_16_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_16_good(void) { goodG2B(); return; }
['gcc']
12,239
void CWE78_OS_Command_Injection__char_connect_socket_execlp_17_bad() { int i; char * data; char dataBuffer[100] = ""; data = dataBuffer; for(i = 0; i < 1; i++) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118007/CWE78_OS_Command_Injection__char_connect_socket_execlp_17.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_17_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_17_bad(void) { int iVar1; undefined2 uStack_b8; undefined2 uStack_b6; undefined4 uStack_b4; undefined8 uStack_a8; undefined8 uStack_a0; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined4 uStack_48; undefined *puStack_38; int iStack_2c; long lStack_28; int iStack_1c; undefined8 *puStack_18; int iStack_c; uStack_a8 = 0; uStack_a0 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; puStack_18 = &uStack_a8; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400c70(puStack_18); iStack_1c = func_0x00400d90(2,1,6); if (iStack_1c != -1) { func_0x00400cb0(&uStack_b8,0,0x10); uStack_b8 = 2; uStack_b4 = func_0x00400d00(&UNK_00401604); uStack_b6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_b8,0x10); if (((iVar1 != -1) && (iStack_2c = func_0x00400c40(iStack_1c,(long)puStack_18 + lStack_28,99 - lStack_28,0), iStack_2c != -1)) && (iStack_2c != 0)) { *(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0; puStack_38 = (undefined *)func_0x00400c90(puStack_18,0xd); if (puStack_38 != (undefined *)0x0) { *puStack_38 = 0; } puStack_38 = (undefined *)func_0x00400c90(puStack_18,10); if (puStack_38 != (undefined *)0x0) { *puStack_38 = 0; } } } if (iStack_1c != -1) { func_0x00400cc0(iStack_1c); } } func_0x00400d60(&UNK_00401615,&UNK_00401615,&UNK_00401612,&UNK_0040160e,puStack_18,0); return; }
['gcc']
12,240
void CWE78_OS_Command_Injection__char_connect_socket_execlp_17_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118007/CWE78_OS_Command_Injection__char_connect_socket_execlp_17.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_17_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_17_good(void) { goodG2B(); return; }
['gcc']
12,241
void CWE78_OS_Command_Injection__char_connect_socket_execlp_18_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; goto source; source: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118008/CWE78_OS_Command_Injection__char_connect_socket_execlp_18.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_18_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_18_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_004015e4); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } func_0x00400d60(&UNK_004015f5,&UNK_004015f5,&UNK_004015f2,&UNK_004015ee,puStack_10,0); return; }
['gcc']
12,242
void CWE78_OS_Command_Injection__char_connect_socket_execlp_18_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118008/CWE78_OS_Command_Injection__char_connect_socket_execlp_18.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_18_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_18_good(void) { goodG2B(); return; }
['gcc']
12,243
void CWE78_OS_Command_Injection__char_connect_socket_execlp_21_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; badStatic = 1; /* true */ data = badSource(data); /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* true */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118009/CWE78_OS_Command_Injection__char_connect_socket_execlp_21.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_21_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_21_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; badStatic = 1; puStack_10 = (undefined8 *)badSource(puStack_10); func_0x00400d60(&UNK_00401615,&UNK_00401615,&UNK_00401612,&UNK_0040160e,puStack_10,0); return; }
['gcc']
12,244
void CWE78_OS_Command_Injection__char_connect_socket_execlp_21_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118009/CWE78_OS_Command_Injection__char_connect_socket_execlp_21.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_21_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_21_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,245
void CWE78_OS_Command_Injection__char_connect_socket_execlp_22_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badGlobal = 1; /* true */ data = CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badSource(data); /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* true */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118010/CWE78_OS_Command_Injection__char_connect_socket_execlp_22a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_22_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_22_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badGlobal = 1; puStack_10 = (undefined8 *) CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badSource(puStack_10); func_0x00400d60(&UNK_0040160b,&UNK_0040160b,&UNK_00401608,&UNK_00401604,puStack_10,0); return; }
['gcc']
12,246
void CWE78_OS_Command_Injection__char_connect_socket_execlp_22_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118010/CWE78_OS_Command_Injection__char_connect_socket_execlp_22a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_22_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_22_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
12,247
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badSource(char * data) { if(CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badGlobal) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } return data; }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118010/CWE78_OS_Command_Injection__char_connect_socket_execlp_22b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badSource
long CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badSource(long param_1) { int iVar1; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined *puStack_28; int iStack_1c; long lStack_18; int iStack_c; if (CWE78_OS_Command_Injection__char_connect_socket_execlp_22_badGlobal != 0) { iStack_c = 0xffffffff; lStack_18 = func_0x00400c70(param_1); iStack_c = func_0x00400d90(2,1,6); if (iStack_c != -1) { func_0x00400cb0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = func_0x00400d00(&UNK_00401604); uStack_36 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_c,&uStack_38,0x10); if (((iVar1 != -1) && (iStack_1c = func_0x00400c40(iStack_c,param_1 + lStack_18,99 - lStack_18,0), iStack_1c != -1)) && (iStack_1c != 0)) { *(undefined *)(param_1 + iStack_1c + lStack_18) = 0; puStack_28 = (undefined *)func_0x00400c90(param_1,0xd); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } puStack_28 = (undefined *)func_0x00400c90(param_1,10); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } } } if (iStack_c != -1) { func_0x00400cc0(iStack_c); } } return param_1; }
['gcc']
12,248
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B1Source(char * data) { if(CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B1Global) { /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); } else { /* FIX: Append a fixed string to data (not user / external input) */ strcat(data, "*.*"); } return data; }
['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Append a fixed string to data (not user / external input) */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118010/CWE78_OS_Command_Injection__char_connect_socket_execlp_22b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B1Source
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B1Source(char *param_1) { char cVar1; ulong uVar2; char *pcVar3; if (CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B1Global == 0) { uVar2 = 0xffffffffffffffff; pcVar3 = param_1; do { if (uVar2 == 0) break; uVar2 = uVar2 - 1; cVar1 = *pcVar3; pcVar3 = pcVar3 + 1; } while (cVar1 != '\0'); *(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a; } else { printLine(&UNK_00401334); } return param_1; }
['gcc']
12,249
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B2Source(char * data) { if(CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B2Global) { /* FIX: Append a fixed string to data (not user / external input) */ strcat(data, "*.*"); } return data; }
['/* FIX: Append a fixed string to data (not user / external input) */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118010/CWE78_OS_Command_Injection__char_connect_socket_execlp_22b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B2Source
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B2Source(char *param_1) { char cVar1; ulong uVar2; char *pcVar3; if (CWE78_OS_Command_Injection__char_connect_socket_execlp_22_goodG2B2Global != 0) { uVar2 = 0xffffffffffffffff; pcVar3 = param_1; do { if (uVar2 == 0) break; uVar2 = uVar2 - 1; cVar1 = *pcVar3; pcVar3 = pcVar3 + 1; } while (cVar1 != '\0'); *(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a; } return param_1; }
['gcc']
12,250
void CWE78_OS_Command_Injection__char_connect_socket_execlp_31_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } { char * dataCopy = data; char * data = dataCopy; /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); } }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118011/CWE78_OS_Command_Injection__char_connect_socket_execlp_31.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_31_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_31_bad(void) { int iVar1; undefined2 uStack_b8; undefined2 uStack_b6; undefined4 uStack_b4; undefined8 uStack_a8; undefined8 uStack_a0; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined4 uStack_48; undefined8 *puStack_40; undefined8 *puStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_a8 = 0; uStack_a0 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; puStack_10 = &uStack_a8; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_b8,0,0x10); uStack_b8 = 2; uStack_b4 = func_0x00400d00(&UNK_00401604); uStack_b6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_b8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } puStack_38 = puStack_10; puStack_40 = puStack_10; func_0x00400d60(&UNK_00401615,&UNK_00401615,&UNK_00401612,&UNK_0040160e,puStack_10,0); return; }
['gcc']
12,251
void CWE78_OS_Command_Injection__char_connect_socket_execlp_31_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118011/CWE78_OS_Command_Injection__char_connect_socket_execlp_31.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_31_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_31_good(void) { goodG2B(); return; }
['gcc']
12,252
void CWE78_OS_Command_Injection__char_connect_socket_execlp_32_bad() { char * data; char * *dataPtr1 = &data; char * *dataPtr2 = &data; char dataBuffer[100] = ""; data = dataBuffer; { char * data = *dataPtr1; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } *dataPtr1 = data; } { char * data = *dataPtr2; /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); } }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118012/CWE78_OS_Command_Injection__char_connect_socket_execlp_32.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_32_bad
/* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE78_OS_Command_Injection__char_connect_socket_execlp_32_bad(void) { int iVar1; undefined2 uStack_c8; undefined2 uStack_c6; undefined4 uStack_c4; undefined8 uStack_b8; undefined8 uStack_b0; undefined8 uStack_a8; undefined8 uStack_a0; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined4 uStack_58; undefined8 *puStack_50; undefined8 *puStack_48; undefined *puStack_40; int iStack_34; long lStack_30; int iStack_24; undefined8 *puStack_20; undefined8 **ppuStack_18; undefined8 **ppuStack_10; ppuStack_10 = &puStack_50; ppuStack_18 = &puStack_50; uStack_b8 = 0; uStack_b0 = 0; uStack_a8 = 0; uStack_a0 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; puStack_50 = &uStack_b8; iStack_24 = 0xffffffff; puStack_20 = puStack_50; lStack_30 = func_0x00400c70(puStack_50); iStack_24 = func_0x00400d90(2,1,6); if (iStack_24 != -1) { func_0x00400cb0(&uStack_c8,0,0x10); uStack_c8 = 2; uStack_c4 = func_0x00400d00(&UNK_00401624); uStack_c6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_24,&uStack_c8,0x10); if (((iVar1 != -1) && (iStack_34 = func_0x00400c40(iStack_24,(long)puStack_20 + lStack_30,99 - lStack_30,0), iStack_34 != -1)) && (iStack_34 != 0)) { *(undefined *)((long)puStack_20 + iStack_34 + lStack_30) = 0; puStack_40 = (undefined *)func_0x00400c90(puStack_20,0xd); if (puStack_40 != (undefined *)0x0) { *puStack_40 = 0; } puStack_40 = (undefined *)func_0x00400c90(puStack_20,10); if (puStack_40 != (undefined *)0x0) { *puStack_40 = 0; } } } if (iStack_24 != -1) { func_0x00400cc0(iStack_24); } *ppuStack_10 = puStack_20; puStack_48 = *ppuStack_18; func_0x00400d60(&UNK_00401635,&UNK_00401635,&UNK_00401632,&UNK_0040162e,puStack_48,0); return; }
['gcc']
12,253
void CWE78_OS_Command_Injection__char_connect_socket_execlp_32_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118012/CWE78_OS_Command_Injection__char_connect_socket_execlp_32.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_32_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_32_good(void) { goodG2B(); return; }
['gcc']
12,254
void CWE78_OS_Command_Injection__char_connect_socket_execlp_34_bad() { char * data; CWE78_OS_Command_Injection__char_connect_socket_execlp_34_unionType myUnion; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } myUnion.unionFirst = data; { char * data = myUnion.unionSecond; /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); } }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118014/CWE78_OS_Command_Injection__char_connect_socket_execlp_34.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_34_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_34_bad(void) { int iVar1; undefined2 uStack_b8; undefined2 uStack_b6; undefined4 uStack_b4; undefined8 uStack_a8; undefined8 uStack_a0; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined4 uStack_48; undefined8 *puStack_40; undefined8 *puStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_a8 = 0; uStack_a0 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; puStack_10 = &uStack_a8; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_b8,0,0x10); uStack_b8 = 2; uStack_b4 = func_0x00400d00(&UNK_00401604); uStack_b6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_b8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } puStack_40 = puStack_10; puStack_38 = puStack_10; func_0x00400d60(&UNK_00401615,&UNK_00401615,&UNK_00401612,&UNK_0040160e,puStack_10,0); return; }
['gcc']
12,255
void CWE78_OS_Command_Injection__char_connect_socket_execlp_34_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118014/CWE78_OS_Command_Injection__char_connect_socket_execlp_34.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_34_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_34_good(void) { goodG2B(); return; }
['gcc']
12,256
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_badSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118015/CWE78_OS_Command_Injection__char_connect_socket_execlp_41.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_41_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040160b,&UNK_0040160b,&UNK_00401608,&UNK_00401604,param_1,0); return; }
['gcc']
12,257
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_41_badSink(data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118015/CWE78_OS_Command_Injection__char_connect_socket_execlp_41.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_41_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_0040160e); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_41_badSink(puStack_10); return; }
['gcc']
12,258
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_goodG2BSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118015/CWE78_OS_Command_Injection__char_connect_socket_execlp_41.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_41_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,param_1,0); return; }
['gcc']
12,259
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118015/CWE78_OS_Command_Injection__char_connect_socket_execlp_41.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_41_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_41_good(void) { goodG2B(); return; }
['gcc']
12,260
void CWE78_OS_Command_Injection__char_connect_socket_execlp_42_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; data = badSource(data); /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118016/CWE78_OS_Command_Injection__char_connect_socket_execlp_42.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_42_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_42_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; puStack_10 = (undefined8 *)badSource(puStack_10); func_0x00400d60(&UNK_00401605,&UNK_00401605,&UNK_00401602,&UNK_004015fe,puStack_10,0); return; }
['gcc']
12,261
void CWE78_OS_Command_Injection__char_connect_socket_execlp_42_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118016/CWE78_OS_Command_Injection__char_connect_socket_execlp_42.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_42_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_42_good(void) { goodG2B(); return; }
['gcc']
12,262
void CWE78_OS_Command_Injection__char_connect_socket_execlp_44_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118018/CWE78_OS_Command_Injection__char_connect_socket_execlp_44.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_44_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_44_good(void) { goodG2B(); return; }
['gcc']
12,263
void CWE78_OS_Command_Injection__char_connect_socket_execlp_45_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_45_badData = data; badSink(); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118019/CWE78_OS_Command_Injection__char_connect_socket_execlp_45.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_45_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_45_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_0040161e); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_45_badData = puStack_10; badSink(); return; }
['gcc']
12,264
void CWE78_OS_Command_Injection__char_connect_socket_execlp_45_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118019/CWE78_OS_Command_Injection__char_connect_socket_execlp_45.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_45_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_45_good(void) { goodG2B(); return; }
['gcc']
12,265
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_badSink(data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118020/CWE78_OS_Command_Injection__char_connect_socket_execlp_51a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_51_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401604); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_badSink(puStack_10); return; }
['gcc']
12,266
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118020/CWE78_OS_Command_Injection__char_connect_socket_execlp_51a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_51_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51_good(void) { goodG2B(); return; }
['gcc']
12,267
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_badSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118020/CWE78_OS_Command_Injection__char_connect_socket_execlp_51b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040160b,&UNK_0040160b,&UNK_00401608,&UNK_00401604,param_1,0); return; }
['gcc']
12,268
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_goodG2BSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118020/CWE78_OS_Command_Injection__char_connect_socket_execlp_51b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_51b_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,param_1,0); return; }
['gcc']
12,269
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_badSink(data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401624); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_badSink(puStack_10); return; }
['gcc']
12,270
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52_good(void) { goodG2B(); return; }
['gcc']
12,271
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_badSink(param_1); return; }
['gcc']
12,272
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52b_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_goodG2BSink(param_1); return; }
['gcc']
12,273
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_badSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040162b,&UNK_0040162b,&UNK_00401628,&UNK_00401624,param_1,0); return; }
['gcc']
12,274
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_goodG2BSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118021/CWE78_OS_Command_Injection__char_connect_socket_execlp_52c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_52c_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214,param_1,0); return; }
['gcc']
12,275
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_badSink(data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401634); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_badSink(puStack_10); return; }
['gcc']
12,276
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53_good(void) { goodG2B(); return; }
['gcc']
12,277
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_badSink(param_1); return; }
['gcc']
12,278
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53b_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_goodG2BSink(param_1); return; }
['gcc']
12,279
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_badSink(param_1); return; }
['gcc']
12,280
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53c_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_goodG2BSink(param_1); return; }
['gcc']
12,281
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_badSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53d.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040163b,&UNK_0040163b,&UNK_00401638,&UNK_00401634,param_1,0); return; }
['gcc']
12,282
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_goodG2BSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118022/CWE78_OS_Command_Injection__char_connect_socket_execlp_53d.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_53d_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040123b,&UNK_0040123b,&UNK_00401238,&UNK_00401234,param_1,0); return; }
['gcc']
12,283
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_badSink(data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined *puStack_30; int iStack_24; long lStack_20; int iStack_14; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_10 = &uStack_98; iStack_14 = 0xffffffff; lStack_20 = func_0x00400c70(puStack_10); iStack_14 = func_0x00400d90(2,1,6); if (iStack_14 != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401654); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_14,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_24 = func_0x00400c40(iStack_14,(long)puStack_10 + lStack_20,99 - lStack_20,0), iStack_24 != -1)) && (iStack_24 != 0)) { *(undefined *)((long)puStack_10 + iStack_24 + lStack_20) = 0; puStack_30 = (undefined *)func_0x00400c90(puStack_10,0xd); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } puStack_30 = (undefined *)func_0x00400c90(puStack_10,10); if (puStack_30 != (undefined *)0x0) { *puStack_30 = 0; } } } if (iStack_14 != -1) { func_0x00400cc0(iStack_14); } CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_badSink(puStack_10); return; }
['gcc']
12,284
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54_good(void) { goodG2B(); return; }
['gcc']
12,285
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_badSink(param_1); return; }
['gcc']
12,286
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54b_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_goodG2BSink(param_1); return; }
['gcc']
12,287
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_badSink(param_1); return; }
['gcc']
12,288
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54c.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54c_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_goodG2BSink(param_1); return; }
['gcc']
12,289
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_badSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_badSink(data); }
[]
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54d.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_badSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_badSink(param_1); return; }
['gcc']
12,290
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_goodG2BSink(char * data) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54d.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54d_goodG2BSink(undefined8 param_1) { CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_goodG2BSink(param_1); return; }
['gcc']
12,291
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_badSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54e.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_badSink(undefined8 param_1) { func_0x00400d60(&UNK_0040165b,&UNK_0040165b,&UNK_00401658,&UNK_00401654,param_1,0); return; }
['gcc']
12,292
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_goodG2BSink(char * data) { /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118023/CWE78_OS_Command_Injection__char_connect_socket_execlp_54e.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_goodG2BSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_54e_goodG2BSink(undefined8 param_1) { func_0x00400a80(&UNK_0040125b,&UNK_0040125b,&UNK_00401258,&UNK_00401254,param_1,0); return; }
['gcc']
12,293
void CWE78_OS_Command_Injection__char_connect_socket_execlp_61_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; data = CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_badSource(data); /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118024/CWE78_OS_Command_Injection__char_connect_socket_execlp_61a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_61_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_61_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; puStack_10 = (undefined8 *) CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_badSource(puStack_10); func_0x00400d60(&UNK_004015fb,&UNK_004015fb,&UNK_004015f8,&UNK_004015f4,puStack_10,0); return; }
['gcc']
12,294
void CWE78_OS_Command_Injection__char_connect_socket_execlp_61_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118024/CWE78_OS_Command_Injection__char_connect_socket_execlp_61a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_61_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_61_good(void) { goodG2B(); return; }
['gcc']
12,295
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_badSource(char * data) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } return data; }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118024/CWE78_OS_Command_Injection__char_connect_socket_execlp_61b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_badSource
long CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_badSource(long param_1) { int iVar1; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined *puStack_28; int iStack_1c; long lStack_18; int iStack_c; iStack_c = 0xffffffff; lStack_18 = func_0x00400c70(param_1); iStack_c = func_0x00400d90(2,1,6); if (iStack_c != -1) { func_0x00400cb0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = func_0x00400d00(&UNK_004015f4); uStack_36 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_c,&uStack_38,0x10); if (((iVar1 != -1) && (iStack_1c = func_0x00400c40(iStack_c,param_1 + lStack_18,99 - lStack_18,0), iStack_1c != -1 )) && (iStack_1c != 0)) { *(undefined *)(param_1 + iStack_1c + lStack_18) = 0; puStack_28 = (undefined *)func_0x00400c90(param_1,0xd); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } puStack_28 = (undefined *)func_0x00400c90(param_1,10); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } } } if (iStack_c != -1) { func_0x00400cc0(iStack_c); } return param_1; }
['gcc']
12,296
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_goodG2BSource(char * data) { /* FIX: Append a fixed string to data (not user / external input) */ strcat(data, "*.*"); return data; }
['/* FIX: Append a fixed string to data (not user / external input) */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118024/CWE78_OS_Command_Injection__char_connect_socket_execlp_61b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_goodG2BSource
char * CWE78_OS_Command_Injection__char_connect_socket_execlp_61b_goodG2BSource(char *param_1) { char cVar1; ulong uVar2; char *pcVar3; uVar2 = 0xffffffffffffffff; pcVar3 = param_1; do { if (uVar2 == 0) break; uVar2 = uVar2 - 1; cVar1 = *pcVar3; pcVar3 = pcVar3 + 1; } while (cVar1 != '\0'); *(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a; return param_1; }
['gcc']
12,297
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; char *replace; SOCKET connectSocket = INVALID_SOCKET; size_t dataLen = strlen(data); do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a connect socket */ connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = inet_addr(IP_ADDRESS); service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed, make sure to recv one * less char than is in the recv_buf in order to append a terminator */ /* Abort on error or the connection was closed */ recvResult = recv(connectSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* Append null terminator */ data[dataLen + recvResult / sizeof(char)] = '\0'; /* Eliminate CRLF */ replace = strchr(data, '\r'); if (replace) { *replace = '\0'; } replace = strchr(data, '\n'); if (replace) { *replace = '\0'; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE78_OS_Command_Injection__char_connect_socket_execlp_63b_badSink(&data); }
['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118026/CWE78_OS_Command_Injection__char_connect_socket_execlp_63a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_63_bad
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63_bad(void) { int iVar1; undefined2 uStack_a8; undefined2 uStack_a6; undefined4 uStack_a4; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined8 *puStack_30; undefined *puStack_28; int iStack_1c; long lStack_18; int iStack_c; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_30 = &uStack_98; iStack_c = 0xffffffff; lStack_18 = func_0x00400c70(puStack_30); iStack_c = func_0x00400d90(2,1,6); if (iStack_c != -1) { func_0x00400cb0(&uStack_a8,0,0x10); uStack_a8 = 2; uStack_a4 = func_0x00400d00(&UNK_00401614); uStack_a6 = func_0x00400c80(0x6987); iVar1 = func_0x00400d50(iStack_c,&uStack_a8,0x10); if (((iVar1 != -1) && (iStack_1c = func_0x00400c40(iStack_c,(long)puStack_30 + lStack_18,99 - lStack_18,0), iStack_1c != -1)) && (iStack_1c != 0)) { *(undefined *)((long)puStack_30 + lStack_18 + iStack_1c) = 0; puStack_28 = (undefined *)func_0x00400c90(puStack_30,0xd); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } puStack_28 = (undefined *)func_0x00400c90(puStack_30,10); if (puStack_28 != (undefined *)0x0) { *puStack_28 = 0; } } } if (iStack_c != -1) { func_0x00400cc0(iStack_c); } CWE78_OS_Command_Injection__char_connect_socket_execlp_63b_badSink(&puStack_30); return; }
['gcc']
12,298
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118026/CWE78_OS_Command_Injection__char_connect_socket_execlp_63a.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_63_good
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63_good(void) { goodG2B(); return; }
['gcc']
12,299
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63b_badSink(char * * dataPtr) { char * data = *dataPtr; /* execlp - searches for the location of the command among * the directories specified by the PATH environment variable */ /* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */ EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL); }
['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */']
['CWE78']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/118026/CWE78_OS_Command_Injection__char_connect_socket_execlp_63b.c
CWE78_OS_Command_Injection__char_connect_socket_execlp_63b_badSink
void CWE78_OS_Command_Injection__char_connect_socket_execlp_63b_badSink(undefined8 *param_1) { func_0x00400d60(&UNK_0040161b,&UNK_0040161b,&UNK_00401618,&UNK_00401614,*param_1,0); return; }
['gcc']