Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68 values | dataset_name stringclasses 1 value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1 value |
|---|---|---|---|---|---|---|---|---|
13,800 | void CWE78_OS_Command_Injection__char_listen_socket_execl_54c_goodG2BSink(char * data)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119895/CWE78_OS_Command_Injection__char_listen_socket_execl_54c.c | CWE78_OS_Command_Injection__char_listen_socket_execl_54c_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_54c_goodG2BSink(undefined8 param_1)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
13,801 | void CWE78_OS_Command_Injection__char_listen_socket_execl_54d_badSink(char * data)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54e_badSink(data);
} | [] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119895/CWE78_OS_Command_Injection__char_listen_socket_execl_54d.c | CWE78_OS_Command_Injection__char_listen_socket_execl_54d_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_54d_badSink(undefined8 param_1)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54e_badSink(param_1);
return;
}
| ['gcc'] |
13,802 | void CWE78_OS_Command_Injection__char_listen_socket_execl_54d_goodG2BSink(char * data)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119895/CWE78_OS_Command_Injection__char_listen_socket_execl_54d.c | CWE78_OS_Command_Injection__char_listen_socket_execl_54d_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_54d_goodG2BSink(undefined8 param_1)
{
CWE78_OS_Command_Injection__char_listen_socket_execl_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
13,803 | void CWE78_OS_Command_Injection__char_listen_socket_execl_54e_badSink(char * data)
{
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119895/CWE78_OS_Command_Injection__char_listen_socket_execl_54e.c | CWE78_OS_Command_Injection__char_listen_socket_execl_54e_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_54e_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_004016eb,&UNK_004016eb,&UNK_004016e8,&UNK_004016e4,param_1,0);
return;
}
| ['gcc'] |
13,804 | void CWE78_OS_Command_Injection__char_listen_socket_execl_54e_goodG2BSink(char * data)
{
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119895/CWE78_OS_Command_Injection__char_listen_socket_execl_54e.c | CWE78_OS_Command_Injection__char_listen_socket_execl_54e_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_54e_goodG2BSink(undefined8 param_1)
{
func_0x00400a80(&UNK_0040125b,&UNK_0040125b,&UNK_00401258,&UNK_00401254,param_1,0);
return;
}
| ['gcc'] |
13,805 | void CWE78_OS_Command_Injection__char_listen_socket_execl_61_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
data = CWE78_OS_Command_Injection__char_listen_socket_execl_61b_badSource(data);
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119896/CWE78_OS_Command_Injection__char_listen_socket_execl_61a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_61_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_61_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
puStack_10 = (undefined8 *)
CWE78_OS_Command_Injection__char_listen_socket_execl_61b_badSource(puStack_10);
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_10,0);
return;
}
| ['gcc'] |
13,806 | void CWE78_OS_Command_Injection__char_listen_socket_execl_61_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119896/CWE78_OS_Command_Injection__char_listen_socket_execl_61a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_61_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_61_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,807 | char * CWE78_OS_Command_Injection__char_listen_socket_execl_61b_badSource(char * data)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
return data;
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119896/CWE78_OS_Command_Injection__char_listen_socket_execl_61b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_61b_badSource |
long CWE78_OS_Command_Injection__char_listen_socket_execl_61b_badSource(long param_1)
{
int iVar1;
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined *puStack_28;
int iStack_1c;
long lStack_18;
int iStack_10;
int iStack_c;
iStack_10 = 0xffffffff;
iStack_c = -1;
lStack_18 = func_0x00400ca0(param_1);
iStack_10 = func_0x00400dd0(2,1,6);
if (iStack_10 != -1) {
func_0x00400ce0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_10,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) &&
((iStack_1c = func_0x00400c70(iStack_c,param_1 + lStack_18,99 - lStack_18,0), iStack_1c != -1
&& (iStack_1c != 0)))) {
*(undefined *)(param_1 + iStack_1c + lStack_18) = 0;
puStack_28 = (undefined *)func_0x00400cc0(param_1,0xd);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
puStack_28 = (undefined *)func_0x00400cc0(param_1,10);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
}
}
if (iStack_10 != -1) {
func_0x00400cf0(iStack_10);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
return param_1;
}
| ['gcc'] |
13,808 | char * CWE78_OS_Command_Injection__char_listen_socket_execl_61b_goodG2BSource(char * data)
{
/* FIX: Append a fixed string to data (not user / external input) */
strcat(data, "*.*");
return data;
} | ['/* FIX: Append a fixed string to data (not user / external input) */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119896/CWE78_OS_Command_Injection__char_listen_socket_execl_61b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_61b_goodG2BSource |
char * CWE78_OS_Command_Injection__char_listen_socket_execl_61b_goodG2BSource(char *param_1)
{
char cVar1;
ulong uVar2;
char *pcVar3;
uVar2 = 0xffffffffffffffff;
pcVar3 = param_1;
do {
if (uVar2 == 0) break;
uVar2 = uVar2 - 1;
cVar1 = *pcVar3;
pcVar3 = pcVar3 + 1;
} while (cVar1 != '\0');
*(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a;
return param_1;
}
| ['gcc'] |
13,809 | void CWE78_OS_Command_Injection__char_listen_socket_execl_63_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execl_63b_badSink(&data);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119898/CWE78_OS_Command_Injection__char_listen_socket_execl_63a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_63_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_63_bad(void)
{
int iVar1;
undefined2 uStack_a8;
undefined2 uStack_a6;
undefined4 uStack_a4;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined4 uStack_38;
undefined8 *puStack_30;
undefined *puStack_28;
int iStack_1c;
long lStack_18;
int iStack_10;
int iStack_c;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
puStack_30 = &uStack_98;
iStack_10 = 0xffffffff;
iStack_c = -1;
lStack_18 = func_0x00400ca0(puStack_30);
iStack_10 = func_0x00400dd0(2,1,6);
if (iStack_10 != -1) {
func_0x00400ce0(&uStack_a8,0,0x10);
uStack_a8 = 2;
uStack_a4 = 0;
uStack_a6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_10,&uStack_a8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) &&
((iStack_1c = func_0x00400c70(iStack_c,(long)puStack_30 + lStack_18,99 - lStack_18,0),
iStack_1c != -1 && (iStack_1c != 0)))) {
*(undefined *)((long)puStack_30 + lStack_18 + iStack_1c) = 0;
puStack_28 = (undefined *)func_0x00400cc0(puStack_30,0xd);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
puStack_28 = (undefined *)func_0x00400cc0(puStack_30,10);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
}
}
if (iStack_10 != -1) {
func_0x00400cf0(iStack_10);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execl_63b_badSink(&puStack_30);
return;
}
| ['gcc'] |
13,810 | void CWE78_OS_Command_Injection__char_listen_socket_execl_63_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119898/CWE78_OS_Command_Injection__char_listen_socket_execl_63a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_63_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_63_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,811 | void CWE78_OS_Command_Injection__char_listen_socket_execl_63b_badSink(char * * dataPtr)
{
char * data = *dataPtr;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119898/CWE78_OS_Command_Injection__char_listen_socket_execl_63b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_63b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_63b_badSink(undefined8 *param_1)
{
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,*param_1,0);
return;
}
| ['gcc'] |
13,812 | void CWE78_OS_Command_Injection__char_listen_socket_execl_63b_goodG2BSink(char * * dataPtr)
{
char * data = *dataPtr;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119898/CWE78_OS_Command_Injection__char_listen_socket_execl_63b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_63b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_63b_goodG2BSink(undefined8 *param_1)
{
func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,*param_1,0);
return;
}
| ['gcc'] |
13,813 | void CWE78_OS_Command_Injection__char_listen_socket_execl_64_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execl_64b_badSink(&data);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119899/CWE78_OS_Command_Injection__char_listen_socket_execl_64a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_64_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_64_bad(void)
{
int iVar1;
undefined2 uStack_a8;
undefined2 uStack_a6;
undefined4 uStack_a4;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined4 uStack_38;
undefined8 *puStack_30;
undefined *puStack_28;
int iStack_1c;
long lStack_18;
int iStack_10;
int iStack_c;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
puStack_30 = &uStack_98;
iStack_10 = 0xffffffff;
iStack_c = -1;
lStack_18 = func_0x00400ca0(puStack_30);
iStack_10 = func_0x00400dd0(2,1,6);
if (iStack_10 != -1) {
func_0x00400ce0(&uStack_a8,0,0x10);
uStack_a8 = 2;
uStack_a4 = 0;
uStack_a6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_10,&uStack_a8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) &&
((iStack_1c = func_0x00400c70(iStack_c,(long)puStack_30 + lStack_18,99 - lStack_18,0),
iStack_1c != -1 && (iStack_1c != 0)))) {
*(undefined *)((long)puStack_30 + lStack_18 + iStack_1c) = 0;
puStack_28 = (undefined *)func_0x00400cc0(puStack_30,0xd);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
puStack_28 = (undefined *)func_0x00400cc0(puStack_30,10);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
}
}
if (iStack_10 != -1) {
func_0x00400cf0(iStack_10);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execl_64b_badSink(&puStack_30);
return;
}
| ['gcc'] |
13,814 | void CWE78_OS_Command_Injection__char_listen_socket_execl_64_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119899/CWE78_OS_Command_Injection__char_listen_socket_execl_64a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_64_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_64_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,815 | void CWE78_OS_Command_Injection__char_listen_socket_execl_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
char * * dataPtr = (char * *)dataVoidPtr;
/* dereference dataPtr into data */
char * data = (*dataPtr);
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119899/CWE78_OS_Command_Injection__char_listen_socket_execl_64b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_64b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_64b_badSink(undefined8 *param_1)
{
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,*param_1,0);
return;
}
| ['gcc'] |
13,816 | void CWE78_OS_Command_Injection__char_listen_socket_execl_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
char * * dataPtr = (char * *)dataVoidPtr;
/* dereference dataPtr into data */
char * data = (*dataPtr);
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119899/CWE78_OS_Command_Injection__char_listen_socket_execl_64b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_64b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_64b_goodG2BSink(undefined8 *param_1)
{
func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214,*param_1,0);
return;
}
| ['gcc'] |
13,817 | void CWE78_OS_Command_Injection__char_listen_socket_execl_65_bad()
{
char * data;
/* define a function pointer */
void (*funcPtr) (char *) = CWE78_OS_Command_Injection__char_listen_socket_execl_65b_badSink;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* use the function pointer */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119900/CWE78_OS_Command_Injection__char_listen_socket_execl_65a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_65_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_65_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_40;
int iStack_34;
long lStack_30;
int iStack_24;
undefined8 *puStack_20;
code *pcStack_18;
int iStack_c;
pcStack_18 = CWE78_OS_Command_Injection__char_listen_socket_execl_65b_badSink;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_20 = &uStack_a8;
iStack_24 = 0xffffffff;
iStack_c = -1;
lStack_30 = func_0x00400ca0(puStack_20);
iStack_24 = func_0x00400dd0(2,1,6);
if (iStack_24 != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_24,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_24,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_24,0,0), iStack_c != -1)) &&
((iStack_34 = func_0x00400c70(iStack_c,(long)puStack_20 + lStack_30,99 - lStack_30,0),
iStack_34 != -1 && (iStack_34 != 0)))) {
*(undefined *)((long)puStack_20 + iStack_34 + lStack_30) = 0;
puStack_40 = (undefined *)func_0x00400cc0(puStack_20,0xd);
if (puStack_40 != (undefined *)0x0) {
*puStack_40 = 0;
}
puStack_40 = (undefined *)func_0x00400cc0(puStack_20,10);
if (puStack_40 != (undefined *)0x0) {
*puStack_40 = 0;
}
}
}
if (iStack_24 != -1) {
func_0x00400cf0(iStack_24);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
(*pcStack_18)(puStack_20);
return;
}
| ['gcc'] |
13,818 | void CWE78_OS_Command_Injection__char_listen_socket_execl_65_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119900/CWE78_OS_Command_Injection__char_listen_socket_execl_65a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_65_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_65_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,819 | void CWE78_OS_Command_Injection__char_listen_socket_execl_65b_badSink(char * data)
{
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119900/CWE78_OS_Command_Injection__char_listen_socket_execl_65b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_65b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_65b_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,param_1,0);
return;
}
| ['gcc'] |
13,820 | void CWE78_OS_Command_Injection__char_listen_socket_execl_65b_goodG2BSink(char * data)
{
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119900/CWE78_OS_Command_Injection__char_listen_socket_execl_65b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_65b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_65b_goodG2BSink(undefined8 param_1)
{
func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,param_1,0);
return;
}
| ['gcc'] |
13,821 | void CWE78_OS_Command_Injection__char_listen_socket_execl_66_bad()
{
char * data;
char * dataArray[5];
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* put data in array */
dataArray[2] = data;
CWE78_OS_Command_Injection__char_listen_socket_execl_66b_badSink(dataArray);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* put data in array */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119901/CWE78_OS_Command_Injection__char_listen_socket_execl_66a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_66_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_66_bad(void)
{
int iVar1;
undefined2 uStack_e8;
undefined2 uStack_e6;
undefined4 uStack_e4;
undefined8 uStack_d8;
undefined8 uStack_d0;
undefined8 uStack_c8;
undefined8 uStack_c0;
undefined8 uStack_b8;
undefined8 uStack_b0;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined4 uStack_78;
undefined auStack_68 [16];
undefined8 *puStack_58;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_d8 = 0;
uStack_d0 = 0;
uStack_c8 = 0;
uStack_c0 = 0;
uStack_b8 = 0;
uStack_b0 = 0;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
puStack_18 = &uStack_d8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_e8,0,0x10);
uStack_e8 = 2;
uStack_e4 = 0;
uStack_e6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_e8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
puStack_58 = puStack_18;
CWE78_OS_Command_Injection__char_listen_socket_execl_66b_badSink(auStack_68);
return;
}
| ['gcc'] |
13,822 | void CWE78_OS_Command_Injection__char_listen_socket_execl_66_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119901/CWE78_OS_Command_Injection__char_listen_socket_execl_66a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_66_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_66_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,823 | void CWE78_OS_Command_Injection__char_listen_socket_execl_66b_badSink(char * dataArray[])
{
/* copy data out of dataArray */
char * data = dataArray[2];
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* copy data out of dataArray */', '/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119901/CWE78_OS_Command_Injection__char_listen_socket_execl_66b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_66b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_66b_badSink(long param_1)
{
func_0x00400da0(&UNK_004016cb,&UNK_004016cb,&UNK_004016c8,&UNK_004016c4,
*(undefined8 *)(param_1 + 0x10),0);
return;
}
| ['gcc'] |
13,824 | void CWE78_OS_Command_Injection__char_listen_socket_execl_66b_goodG2BSink(char * dataArray[])
{
char * data = dataArray[2];
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119901/CWE78_OS_Command_Injection__char_listen_socket_execl_66b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_66b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_66b_goodG2BSink(long param_1)
{
func_0x00400a80(&UNK_0040122b,&UNK_0040122b,&UNK_00401228,&UNK_00401224,
*(undefined8 *)(param_1 + 0x10),0);
return;
}
| ['gcc'] |
13,825 | void CWE78_OS_Command_Injection__char_listen_socket_execl_67_bad()
{
char * data;
CWE78_OS_Command_Injection__char_listen_socket_execl_67_structType myStruct;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
myStruct.structFirst = data;
CWE78_OS_Command_Injection__char_listen_socket_execl_67b_badSink(myStruct);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119902/CWE78_OS_Command_Injection__char_listen_socket_execl_67a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_67_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_67_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined8 *puStack_40;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
puStack_40 = puStack_18;
CWE78_OS_Command_Injection__char_listen_socket_execl_67b_badSink(puStack_18);
return;
}
| ['gcc'] |
13,826 | void CWE78_OS_Command_Injection__char_listen_socket_execl_67_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119902/CWE78_OS_Command_Injection__char_listen_socket_execl_67a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_67_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_67_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,827 | void CWE78_OS_Command_Injection__char_listen_socket_execl_67b_badSink(CWE78_OS_Command_Injection__char_listen_socket_execl_67_structType myStruct)
{
char * data = myStruct.structFirst;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119902/CWE78_OS_Command_Injection__char_listen_socket_execl_67b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_67b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_67b_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,param_1,0);
return;
}
| ['gcc'] |
13,828 | void CWE78_OS_Command_Injection__char_listen_socket_execl_67b_goodG2BSink(CWE78_OS_Command_Injection__char_listen_socket_execl_67_structType myStruct)
{
char * data = myStruct.structFirst;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119902/CWE78_OS_Command_Injection__char_listen_socket_execl_67b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_67b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_67b_goodG2BSink(undefined8 param_1)
{
func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214,param_1,0);
return;
}
| ['gcc'] |
13,829 | void CWE78_OS_Command_Injection__char_listen_socket_execl_68_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execl_68_badData = data;
CWE78_OS_Command_Injection__char_listen_socket_execl_68b_badSink();
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119903/CWE78_OS_Command_Injection__char_listen_socket_execl_68a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_68_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execl_68_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execl_68_badData = puStack_18;
CWE78_OS_Command_Injection__char_listen_socket_execl_68b_badSink();
return;
}
| ['gcc'] |
13,830 | void CWE78_OS_Command_Injection__char_listen_socket_execl_68_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119903/CWE78_OS_Command_Injection__char_listen_socket_execl_68a.c | CWE78_OS_Command_Injection__char_listen_socket_execl_68_good |
void CWE78_OS_Command_Injection__char_listen_socket_execl_68_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,831 | void CWE78_OS_Command_Injection__char_listen_socket_execl_68b_badSink()
{
char * data = CWE78_OS_Command_Injection__char_listen_socket_execl_68_badData;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119903/CWE78_OS_Command_Injection__char_listen_socket_execl_68b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_68b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_68b_badSink(void)
{
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,
CWE78_OS_Command_Injection__char_listen_socket_execl_68_badData,0);
return;
}
| ['gcc'] |
13,832 | void CWE78_OS_Command_Injection__char_listen_socket_execl_68b_goodG2BSink()
{
char * data = CWE78_OS_Command_Injection__char_listen_socket_execl_68_goodG2BData;
/* execl - specify the path where the command is located */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECL(COMMAND_INT_PATH, COMMAND_INT_PATH, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execl - specify the path where the command is located */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119903/CWE78_OS_Command_Injection__char_listen_socket_execl_68b.c | CWE78_OS_Command_Injection__char_listen_socket_execl_68b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execl_68b_goodG2BSink(void)
{
func_0x00400a80(&UNK_0040121b,&UNK_0040121b,&UNK_00401218,&UNK_00401214,
CWE78_OS_Command_Injection__char_listen_socket_execl_68_goodG2BData,0);
return;
}
| ['gcc'] |
13,833 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_01_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119911/CWE78_OS_Command_Injection__char_listen_socket_execlp_01.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_01_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_01_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,834 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_01_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119911/CWE78_OS_Command_Injection__char_listen_socket_execlp_01.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_01_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_01_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,835 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_02_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119912/CWE78_OS_Command_Injection__char_listen_socket_execlp_02.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_02_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_02_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,836 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_02_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119912/CWE78_OS_Command_Injection__char_listen_socket_execlp_02.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_02_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_02_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,837 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_03_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(5==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119913/CWE78_OS_Command_Injection__char_listen_socket_execlp_03.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_03_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_03_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,838 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_03_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119913/CWE78_OS_Command_Injection__char_listen_socket_execlp_03.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_03_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_03_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,839 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_04_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(STATIC_CONST_TRUE)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119914/CWE78_OS_Command_Injection__char_listen_socket_execlp_04.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_04_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_04_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_00401693,&UNK_00401693,&UNK_00401690,&UNK_0040168c,puStack_18,0);
return;
}
| ['gcc'] |
13,840 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_04_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119914/CWE78_OS_Command_Injection__char_listen_socket_execlp_04.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_04_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_04_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,841 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_05_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(staticTrue)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119915/CWE78_OS_Command_Injection__char_listen_socket_execlp_05.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_05_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_05_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
if (staticTrue != 0) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,842 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_05_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119915/CWE78_OS_Command_Injection__char_listen_socket_execlp_05.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_05_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_05_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,843 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_06_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(STATIC_CONST_FIVE==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119916/CWE78_OS_Command_Injection__char_listen_socket_execlp_06.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_06_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_06_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168f,&UNK_0040168f,&UNK_0040168c,&UNK_00401688,puStack_18,0);
return;
}
| ['gcc'] |
13,844 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_06_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119916/CWE78_OS_Command_Injection__char_listen_socket_execlp_06.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_06_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_06_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,845 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_07_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(staticFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119917/CWE78_OS_Command_Injection__char_listen_socket_execlp_07.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_07_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_07_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
if (staticFive == 5) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,846 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_07_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119917/CWE78_OS_Command_Injection__char_listen_socket_execlp_07.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_07_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_07_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,847 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_08_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(staticReturnsTrue())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119918/CWE78_OS_Command_Injection__char_listen_socket_execlp_08.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_08_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_08_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_004016ab,&UNK_004016ab,&UNK_004016a8,&UNK_004016a4,puStack_18,0);
return;
}
| ['gcc'] |
13,848 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_08_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119918/CWE78_OS_Command_Injection__char_listen_socket_execlp_08.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_08_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_08_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,849 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_09_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119919/CWE78_OS_Command_Injection__char_listen_socket_execlp_09.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_09_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_09_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,850 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_10_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalTrue)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119920/CWE78_OS_Command_Injection__char_listen_socket_execlp_10.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_10_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_10_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
if (globalTrue != 0) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,851 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_10_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119920/CWE78_OS_Command_Injection__char_listen_socket_execlp_10.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_10_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_10_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,852 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_11_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalReturnsTrue())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119921/CWE78_OS_Command_Injection__char_listen_socket_execlp_11.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_11_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_11_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,853 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_11_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119921/CWE78_OS_Command_Injection__char_listen_socket_execlp_11.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_11_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_11_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,854 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_12_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalReturnsTrueOrFalse())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
else
{
/* FIX: Append a fixed string to data (not user / external input) */
strcat(data, "*.*");
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* FIX: Append a fixed string to data (not user / external input) */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119922/CWE78_OS_Command_Injection__char_listen_socket_execlp_12.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_12_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_12_bad(void)
{
char cVar1;
int iVar2;
ulong uVar3;
undefined8 *puVar4;
byte bVar5;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
bVar5 = 0;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iVar2 = globalReturnsTrueOrFalse();
if (iVar2 == 0) {
uVar3 = 0xffffffffffffffff;
puVar4 = puStack_18;
do {
if (uVar3 == 0) break;
uVar3 = uVar3 - 1;
cVar1 = *(char *)puVar4;
puVar4 = (undefined8 *)((long)puVar4 + (ulong)bVar5 * -2 + 1);
} while (cVar1 != '\0');
*(undefined4 *)((long)puStack_18 + (~uVar3 - 1)) = 0x2a2e2a;
}
else {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar2 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar2 != -1) && (iVar2 = func_0x00400d70(iStack_1c,5), iVar2 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(char *)((long)puStack_18 + lStack_28),
99 - lStack_28,0), iStack_2c != -1 && (iStack_2c != 0)))) {
*(char *)((long)puStack_18 + iStack_2c + lStack_28) = '\0';
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_004016cb,&UNK_004016cb,&UNK_004016c8,&UNK_004016c4,puStack_18,0);
return;
}
| ['gcc'] |
13,855 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_12_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119922/CWE78_OS_Command_Injection__char_listen_socket_execlp_12.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_12_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_12_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,856 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_13_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(GLOBAL_CONST_FIVE==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119923/CWE78_OS_Command_Injection__char_listen_socket_execlp_13.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_13_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_13_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
if (GLOBAL_CONST_FIVE == 5) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,857 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_13_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119923/CWE78_OS_Command_Injection__char_listen_socket_execlp_13.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_13_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_13_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,858 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_14_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119924/CWE78_OS_Command_Injection__char_listen_socket_execlp_14.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_14_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_14_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
if (globalFive == 5) {
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,859 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_14_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119924/CWE78_OS_Command_Injection__char_listen_socket_execlp_14.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_14_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_14_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,860 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_15_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
switch(6)
{
case 6:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119925/CWE78_OS_Command_Injection__char_listen_socket_execlp_15.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_15_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_15_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,861 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_15_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119925/CWE78_OS_Command_Injection__char_listen_socket_execlp_15.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_15_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_15_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,862 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_16_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
while(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
break;
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119926/CWE78_OS_Command_Injection__char_listen_socket_execlp_16.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_16_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_16_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,863 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_16_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119926/CWE78_OS_Command_Injection__char_listen_socket_execlp_16.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_16_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_16_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,864 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_17_bad()
{
int i;
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
for(i = 0; i < 1; i++)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119927/CWE78_OS_Command_Injection__char_listen_socket_execlp_17.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_17_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_17_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_10;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
iStack_1c = 0xffffffff;
iStack_10 = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_10 = func_0x00400d90(iStack_1c,0,0), iStack_10 != -1)) &&
((iStack_2c = func_0x00400c70(iStack_10,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_10 != -1) {
func_0x00400cf0(iStack_10);
}
}
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,865 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_17_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119927/CWE78_OS_Command_Injection__char_listen_socket_execlp_17.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_17_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_17_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,866 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_18_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
goto source;
source:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119928/CWE78_OS_Command_Injection__char_listen_socket_execlp_18.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_18_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_18_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_18,0);
return;
}
| ['gcc'] |
13,867 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_18_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119928/CWE78_OS_Command_Injection__char_listen_socket_execlp_18.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_18_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_18_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,868 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_21_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
badStatic = 1; /* true */
data = badSource(data);
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* true */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119929/CWE78_OS_Command_Injection__char_listen_socket_execlp_21.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_21_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_21_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
badStatic = 1;
puStack_10 = (undefined8 *)badSource(puStack_10);
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_10,0);
return;
}
| ['gcc'] |
13,869 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_21_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119929/CWE78_OS_Command_Injection__char_listen_socket_execlp_21.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_21_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_21_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,870 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_22_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badGlobal = 1; /* true */
data = CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badSource(data);
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* true */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119930/CWE78_OS_Command_Injection__char_listen_socket_execlp_22a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_22_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_22_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badGlobal = 1;
puStack_10 = (undefined8 *)
CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badSource(puStack_10);
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_10,0);
return;
}
| ['gcc'] |
13,871 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_22_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119930/CWE78_OS_Command_Injection__char_listen_socket_execlp_22a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_22_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_22_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
13,872 | char * CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badSource(char * data)
{
if(CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badGlobal)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
return data;
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119930/CWE78_OS_Command_Injection__char_listen_socket_execlp_22b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badSource |
long CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badSource(long param_1)
{
int iVar1;
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined *puStack_28;
int iStack_1c;
long lStack_18;
int iStack_10;
int iStack_c;
if (CWE78_OS_Command_Injection__char_listen_socket_execlp_22_badGlobal != 0) {
iStack_10 = 0xffffffff;
iStack_c = -1;
lStack_18 = func_0x00400ca0(param_1);
iStack_10 = func_0x00400dd0(2,1,6);
if (iStack_10 != -1) {
func_0x00400ce0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_10,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) &&
((iStack_1c = func_0x00400c70(iStack_c,param_1 + lStack_18,99 - lStack_18,0),
iStack_1c != -1 && (iStack_1c != 0)))) {
*(undefined *)(param_1 + iStack_1c + lStack_18) = 0;
puStack_28 = (undefined *)func_0x00400cc0(param_1,0xd);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
puStack_28 = (undefined *)func_0x00400cc0(param_1,10);
if (puStack_28 != (undefined *)0x0) {
*puStack_28 = 0;
}
}
}
if (iStack_10 != -1) {
func_0x00400cf0(iStack_10);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
}
return param_1;
}
| ['gcc'] |
13,873 | char * CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B1Source(char * data)
{
if(CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B1Global)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
/* FIX: Append a fixed string to data (not user / external input) */
strcat(data, "*.*");
}
return data;
} | ['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Append a fixed string to data (not user / external input) */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119930/CWE78_OS_Command_Injection__char_listen_socket_execlp_22b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B1Source |
char * CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B1Source(char *param_1)
{
char cVar1;
ulong uVar2;
char *pcVar3;
if (CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B1Global == 0) {
uVar2 = 0xffffffffffffffff;
pcVar3 = param_1;
do {
if (uVar2 == 0) break;
uVar2 = uVar2 - 1;
cVar1 = *pcVar3;
pcVar3 = pcVar3 + 1;
} while (cVar1 != '\0');
*(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a;
}
else {
printLine(&UNK_00401334);
}
return param_1;
}
| ['gcc'] |
13,874 | char * CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B2Source(char * data)
{
if(CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B2Global)
{
/* FIX: Append a fixed string to data (not user / external input) */
strcat(data, "*.*");
}
return data;
} | ['/* FIX: Append a fixed string to data (not user / external input) */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119930/CWE78_OS_Command_Injection__char_listen_socket_execlp_22b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B2Source |
char * CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B2Source(char *param_1)
{
char cVar1;
ulong uVar2;
char *pcVar3;
if (CWE78_OS_Command_Injection__char_listen_socket_execlp_22_goodG2B2Global != 0) {
uVar2 = 0xffffffffffffffff;
pcVar3 = param_1;
do {
if (uVar2 == 0) break;
uVar2 = uVar2 - 1;
cVar1 = *pcVar3;
pcVar3 = pcVar3 + 1;
} while (cVar1 != '\0');
*(undefined4 *)(param_1 + (~uVar2 - 1)) = 0x2a2e2a;
}
return param_1;
}
| ['gcc'] |
13,875 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_31_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
{
char * dataCopy = data;
char * data = dataCopy;
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
}
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119931/CWE78_OS_Command_Injection__char_listen_socket_execlp_31.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_31_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_31_bad(void)
{
int iVar1;
undefined2 uStack_c8;
undefined2 uStack_c6;
undefined4 uStack_c4;
undefined8 uStack_b8;
undefined8 uStack_b0;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined4 uStack_58;
undefined8 *puStack_48;
undefined8 *puStack_40;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_b8 = 0;
uStack_b0 = 0;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
puStack_18 = &uStack_b8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_c8,0,0x10);
uStack_c8 = 2;
uStack_c4 = 0;
uStack_c6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_c8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
puStack_40 = puStack_18;
puStack_48 = puStack_18;
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,876 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_31_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119931/CWE78_OS_Command_Injection__char_listen_socket_execlp_31.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_31_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_31_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,877 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_32_bad()
{
char * data;
char * *dataPtr1 = &data;
char * *dataPtr2 = &data;
char dataBuffer[100] = "";
data = dataBuffer;
{
char * data = *dataPtr1;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
*dataPtr1 = data;
}
{
char * data = *dataPtr2;
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
}
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119932/CWE78_OS_Command_Injection__char_listen_socket_execlp_32.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_32_bad |
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE78_OS_Command_Injection__char_listen_socket_execlp_32_bad(void)
{
int iVar1;
undefined2 uStack_d8;
undefined2 uStack_d6;
undefined4 uStack_d4;
undefined8 uStack_c8;
undefined8 uStack_c0;
undefined8 uStack_b8;
undefined8 uStack_b0;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined4 uStack_68;
undefined8 *puStack_58;
undefined8 *puStack_50;
undefined *puStack_48;
int iStack_3c;
long lStack_38;
int iStack_2c;
undefined8 *puStack_28;
undefined8 **ppuStack_20;
undefined8 **ppuStack_18;
int iStack_c;
ppuStack_18 = &puStack_58;
ppuStack_20 = &puStack_58;
uStack_c8 = 0;
uStack_c0 = 0;
uStack_b8 = 0;
uStack_b0 = 0;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
puStack_58 = &uStack_c8;
iStack_2c = 0xffffffff;
iStack_c = -1;
puStack_28 = puStack_58;
lStack_38 = func_0x00400ca0(puStack_58);
iStack_2c = func_0x00400dd0(2,1,6);
if (iStack_2c != -1) {
func_0x00400ce0(&uStack_d8,0,0x10);
uStack_d8 = 2;
uStack_d4 = 0;
uStack_d6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_2c,&uStack_d8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_2c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_2c,0,0), iStack_c != -1)) &&
((iStack_3c = func_0x00400c70(iStack_c,(long)puStack_28 + lStack_38,99 - lStack_38,0),
iStack_3c != -1 && (iStack_3c != 0)))) {
*(undefined *)((long)puStack_28 + iStack_3c + lStack_38) = 0;
puStack_48 = (undefined *)func_0x00400cc0(puStack_28,0xd);
if (puStack_48 != (undefined *)0x0) {
*puStack_48 = 0;
}
puStack_48 = (undefined *)func_0x00400cc0(puStack_28,10);
if (puStack_48 != (undefined *)0x0) {
*puStack_48 = 0;
}
}
}
if (iStack_2c != -1) {
func_0x00400cf0(iStack_2c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
*ppuStack_18 = puStack_28;
puStack_50 = *ppuStack_20;
func_0x00400da0(&UNK_004016bb,&UNK_004016bb,&UNK_004016b8,&UNK_004016b4,puStack_50,0);
return;
}
| ['gcc'] |
13,878 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_32_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119932/CWE78_OS_Command_Injection__char_listen_socket_execlp_32.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_32_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_32_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,879 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_34_bad()
{
char * data;
CWE78_OS_Command_Injection__char_listen_socket_execlp_34_unionType myUnion;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
myUnion.unionFirst = data;
{
char * data = myUnion.unionSecond;
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
}
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119934/CWE78_OS_Command_Injection__char_listen_socket_execlp_34.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_34_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_34_bad(void)
{
int iVar1;
undefined2 uStack_c8;
undefined2 uStack_c6;
undefined4 uStack_c4;
undefined8 uStack_b8;
undefined8 uStack_b0;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined4 uStack_58;
undefined8 *puStack_48;
undefined8 *puStack_40;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_b8 = 0;
uStack_b0 = 0;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
puStack_18 = &uStack_b8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_c8,0,0x10);
uStack_c8 = 2;
uStack_c4 = 0;
uStack_c6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_c8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
puStack_48 = puStack_18;
puStack_40 = puStack_18;
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,puStack_18,0);
return;
}
| ['gcc'] |
13,880 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_34_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119934/CWE78_OS_Command_Injection__char_listen_socket_execlp_34.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_34_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_34_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,881 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_badSink(char * data)
{
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119935/CWE78_OS_Command_Injection__char_listen_socket_execlp_41.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_41_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,param_1,0);
return;
}
| ['gcc'] |
13,882 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_41_badSink(data);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119935/CWE78_OS_Command_Injection__char_listen_socket_execlp_41.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_41_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_41_badSink(puStack_18);
return;
}
| ['gcc'] |
13,883 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_goodG2BSink(char * data)
{
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119935/CWE78_OS_Command_Injection__char_listen_socket_execlp_41.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_41_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_goodG2BSink(undefined8 param_1)
{
func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,param_1,0);
return;
}
| ['gcc'] |
13,884 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119935/CWE78_OS_Command_Injection__char_listen_socket_execlp_41.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_41_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_41_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,885 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_42_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
data = badSource(data);
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119936/CWE78_OS_Command_Injection__char_listen_socket_execlp_42.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_42_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_42_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
puStack_10 = (undefined8 *)badSource(puStack_10);
func_0x00400da0(&UNK_0040168b,&UNK_0040168b,&UNK_00401688,&UNK_00401684,puStack_10,0);
return;
}
| ['gcc'] |
13,886 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_42_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119936/CWE78_OS_Command_Injection__char_listen_socket_execlp_42.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_42_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_42_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,887 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_44_bad()
{
char * data;
/* define a function pointer */
void (*funcPtr) (char *) = badSink;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */', '/* use the function pointer */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119938/CWE78_OS_Command_Injection__char_listen_socket_execlp_44.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_44_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_44_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_40;
int iStack_34;
long lStack_30;
int iStack_24;
undefined8 *puStack_20;
code *pcStack_18;
int iStack_c;
pcStack_18 = badSink;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_20 = &uStack_a8;
iStack_24 = 0xffffffff;
iStack_c = -1;
lStack_30 = func_0x00400ca0(puStack_20);
iStack_24 = func_0x00400dd0(2,1,6);
if (iStack_24 != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_24,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_24,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_24,0,0), iStack_c != -1)) &&
((iStack_34 = func_0x00400c70(iStack_c,(long)puStack_20 + lStack_30,99 - lStack_30,0),
iStack_34 != -1 && (iStack_34 != 0)))) {
*(undefined *)((long)puStack_20 + iStack_34 + lStack_30) = 0;
puStack_40 = (undefined *)func_0x00400cc0(puStack_20,0xd);
if (puStack_40 != (undefined *)0x0) {
*puStack_40 = 0;
}
puStack_40 = (undefined *)func_0x00400cc0(puStack_20,10);
if (puStack_40 != (undefined *)0x0) {
*puStack_40 = 0;
}
}
}
if (iStack_24 != -1) {
func_0x00400cf0(iStack_24);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
(*pcStack_18)(puStack_20);
return;
}
| ['gcc'] |
13,888 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_44_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119938/CWE78_OS_Command_Injection__char_listen_socket_execlp_44.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_44_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_44_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,889 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_45_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_45_badData = data;
badSink();
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119939/CWE78_OS_Command_Injection__char_listen_socket_execlp_45.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_45_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_45_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_45_badData = puStack_18;
badSink();
return;
}
| ['gcc'] |
13,890 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_45_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119939/CWE78_OS_Command_Injection__char_listen_socket_execlp_45.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_45_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_45_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,891 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_51_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_badSink(data);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119940/CWE78_OS_Command_Injection__char_listen_socket_execlp_51a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_51_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_51_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_badSink(puStack_18);
return;
}
| ['gcc'] |
13,892 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_51_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119940/CWE78_OS_Command_Injection__char_listen_socket_execlp_51a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_51_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_51_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,893 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_badSink(char * data)
{
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119940/CWE78_OS_Command_Injection__char_listen_socket_execlp_51b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_0040169b,&UNK_0040169b,&UNK_00401698,&UNK_00401694,param_1,0);
return;
}
| ['gcc'] |
13,894 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_goodG2BSink(char * data)
{
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119940/CWE78_OS_Command_Injection__char_listen_socket_execlp_51b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_51b_goodG2BSink(undefined8 param_1)
{
func_0x00400a80(&UNK_0040120b,&UNK_0040120b,&UNK_00401208,&UNK_00401204,param_1,0);
return;
}
| ['gcc'] |
13,895 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_52_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
char *replace;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
size_t dataLen = strlen(data);
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, (char *)(data + dataLen), sizeof(char) * (100 - dataLen - 1), 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* Append null terminator */
data[dataLen + recvResult / sizeof(char)] = '\0';
/* Eliminate CRLF */
replace = strchr(data, '\r');
if (replace)
{
*replace = '\0';
}
replace = strchr(data, '\n');
if (replace)
{
*replace = '\0';
}
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_badSink(data);
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* Append null terminator */', '/* Eliminate CRLF */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119941/CWE78_OS_Command_Injection__char_listen_socket_execlp_52a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_52_bad |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_52_bad(void)
{
int iVar1;
undefined2 uStack_b8;
undefined2 uStack_b6;
undefined4 uStack_b4;
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined *puStack_38;
int iStack_2c;
long lStack_28;
int iStack_1c;
undefined8 *puStack_18;
int iStack_c;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_18 = &uStack_a8;
iStack_1c = 0xffffffff;
iStack_c = -1;
lStack_28 = func_0x00400ca0(puStack_18);
iStack_1c = func_0x00400dd0(2,1,6);
if (iStack_1c != -1) {
func_0x00400ce0(&uStack_b8,0,0x10);
uStack_b8 = 2;
uStack_b4 = 0;
uStack_b6 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_1c,&uStack_b8,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_1c,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_1c,0,0), iStack_c != -1)) &&
((iStack_2c = func_0x00400c70(iStack_c,(long)puStack_18 + lStack_28,99 - lStack_28,0),
iStack_2c != -1 && (iStack_2c != 0)))) {
*(undefined *)((long)puStack_18 + iStack_2c + lStack_28) = 0;
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,0xd);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
puStack_38 = (undefined *)func_0x00400cc0(puStack_18,10);
if (puStack_38 != (undefined *)0x0) {
*puStack_38 = 0;
}
}
}
if (iStack_1c != -1) {
func_0x00400cf0(iStack_1c);
}
if (iStack_c != -1) {
func_0x00400cf0(iStack_c);
}
CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_badSink(puStack_18);
return;
}
| ['gcc'] |
13,896 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_52_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119941/CWE78_OS_Command_Injection__char_listen_socket_execlp_52a.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_52_good |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_52_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
13,897 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_badSink(char * data)
{
CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_badSink(data);
} | [] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119941/CWE78_OS_Command_Injection__char_listen_socket_execlp_52b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_badSink(undefined8 param_1)
{
CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_badSink(param_1);
return;
}
| ['gcc'] |
13,898 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_goodG2BSink(char * data)
{
CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119941/CWE78_OS_Command_Injection__char_listen_socket_execlp_52b.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_goodG2BSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_52b_goodG2BSink(undefined8 param_1)
{
CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
13,899 | void CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_badSink(char * data)
{
/* execlp - searches for the location of the command among
* the directories specified by the PATH environment variable */
/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */
EXECLP(COMMAND_INT, COMMAND_INT, COMMAND_ARG1, COMMAND_ARG2, COMMAND_ARG3, NULL);
} | ['/* execlp - searches for the location of the command among\r\n * the directories specified by the PATH environment variable */', '/* POTENTIAL FLAW: Execute command without validating input possibly leading to command injection */'] | ['CWE78'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/119941/CWE78_OS_Command_Injection__char_listen_socket_execlp_52c.c | CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_badSink |
void CWE78_OS_Command_Injection__char_listen_socket_execlp_52c_badSink(undefined8 param_1)
{
func_0x00400da0(&UNK_004016bb,&UNK_004016bb,&UNK_004016b8,&UNK_004016b4,param_1,0);
return;
}
| ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.