Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
1,500
void CWE416_Use_After_Free__malloc_free_struct_12_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102304/CWE416_Use_After_Free__malloc_free_struct_12.c
CWE416_Use_After_Free__malloc_free_struct_12_good
void CWE416_Use_After_Free__malloc_free_struct_12_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
1,501
void CWE416_Use_After_Free__malloc_free_struct_13_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; if(GLOBAL_CONST_FIVE==5) { data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } if(GLOBAL_CONST_FIVE==5) { /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102305/CWE416_Use_After_Free__malloc_free_struct_13.c
CWE416_Use_After_Free__malloc_free_struct_13_bad
void CWE416_Use_After_Free__malloc_free_struct_13_bad(void) { ulong uStack_18; long lStack_10; lStack_10 = 0; if (GLOBAL_CONST_FIVE == 5) { lStack_10 = func_0x00400ab0(800); for (uStack_18 = 0; uStack_18 < 100; uStack_18 = uStack_18 + 1) { *(undefined4 *)(lStack_10 + uStack_18 * 8) = 1; *(undefined4 *)(lStack_10 + uStack_18 * 8 + 4) = 2; } func_0x00400a20(lStack_10); } if (GLOBAL_CONST_FIVE == 5) { printStructLine(lStack_10); } return; }
['gcc']
1,502
void CWE416_Use_After_Free__malloc_free_struct_13_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102305/CWE416_Use_After_Free__malloc_free_struct_13.c
CWE416_Use_After_Free__malloc_free_struct_13_good
void CWE416_Use_After_Free__malloc_free_struct_13_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
1,503
void CWE416_Use_After_Free__malloc_free_struct_14_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; if(globalFive==5) { data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } if(globalFive==5) { /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102306/CWE416_Use_After_Free__malloc_free_struct_14.c
CWE416_Use_After_Free__malloc_free_struct_14_bad
void CWE416_Use_After_Free__malloc_free_struct_14_bad(void) { ulong uStack_18; long lStack_10; lStack_10 = 0; if (globalFive == 5) { lStack_10 = func_0x00400ab0(800); for (uStack_18 = 0; uStack_18 < 100; uStack_18 = uStack_18 + 1) { *(undefined4 *)(lStack_10 + uStack_18 * 8) = 1; *(undefined4 *)(lStack_10 + uStack_18 * 8 + 4) = 2; } func_0x00400a20(lStack_10); } if (globalFive == 5) { printStructLine(lStack_10); } return; }
['gcc']
1,504
void CWE416_Use_After_Free__malloc_free_struct_14_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102306/CWE416_Use_After_Free__malloc_free_struct_14.c
CWE416_Use_After_Free__malloc_free_struct_14_good
void CWE416_Use_After_Free__malloc_free_struct_14_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
1,505
void CWE416_Use_After_Free__malloc_free_struct_15_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; switch(6) { case 6: data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } switch(7) { case 7: /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102307/CWE416_Use_After_Free__malloc_free_struct_15.c
CWE416_Use_After_Free__malloc_free_struct_15_bad
void CWE416_Use_After_Free__malloc_free_struct_15_bad(void) { long lVar1; ulong uStack_10; lVar1 = func_0x00400ab0(800); for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) { *(undefined4 *)(lVar1 + uStack_10 * 8) = 1; *(undefined4 *)(lVar1 + uStack_10 * 8 + 4) = 2; } func_0x00400a20(lVar1); printStructLine(lVar1); return; }
['gcc']
1,506
void CWE416_Use_After_Free__malloc_free_struct_15_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102307/CWE416_Use_After_Free__malloc_free_struct_15.c
CWE416_Use_After_Free__malloc_free_struct_15_good
void CWE416_Use_After_Free__malloc_free_struct_15_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
1,507
void CWE416_Use_After_Free__malloc_free_struct_16_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; while(1) { data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); break; } while(1) { /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102308/CWE416_Use_After_Free__malloc_free_struct_16.c
CWE416_Use_After_Free__malloc_free_struct_16_bad
void CWE416_Use_After_Free__malloc_free_struct_16_bad(void) { long lVar1; ulong uStack_10; lVar1 = func_0x00400ab0(800); for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) { *(undefined4 *)(lVar1 + uStack_10 * 8) = 1; *(undefined4 *)(lVar1 + uStack_10 * 8 + 4) = 2; } func_0x00400a20(lVar1); printStructLine(lVar1); return; }
['gcc']
1,508
void CWE416_Use_After_Free__malloc_free_struct_16_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102308/CWE416_Use_After_Free__malloc_free_struct_16.c
CWE416_Use_After_Free__malloc_free_struct_16_good
void CWE416_Use_After_Free__malloc_free_struct_16_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
1,509
void CWE416_Use_After_Free__malloc_free_struct_17_bad() { int i,j; twoIntsStruct * data; /* Initialize data */ data = NULL; for(i = 0; i < 1; i++) { data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } for(j = 0; j < 1; j++) { /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102309/CWE416_Use_After_Free__malloc_free_struct_17.c
CWE416_Use_After_Free__malloc_free_struct_17_bad
void CWE416_Use_After_Free__malloc_free_struct_17_bad(void) { ulong uStack_20; long lStack_18; int iStack_10; int iStack_c; lStack_18 = 0; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { lStack_18 = func_0x00400ab0(800); for (uStack_20 = 0; uStack_20 < 100; uStack_20 = uStack_20 + 1) { *(undefined4 *)(lStack_18 + uStack_20 * 8) = 1; *(undefined4 *)(lStack_18 + uStack_20 * 8 + 4) = 2; } func_0x00400a20(lStack_18); } for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) { printStructLine(lStack_18); } return; }
['gcc']
1,510
void CWE416_Use_After_Free__malloc_free_struct_17_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102309/CWE416_Use_After_Free__malloc_free_struct_17.c
CWE416_Use_After_Free__malloc_free_struct_17_good
void CWE416_Use_After_Free__malloc_free_struct_17_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
1,511
void CWE416_Use_After_Free__malloc_free_struct_63_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); CWE416_Use_After_Free__malloc_free_struct_63b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63a.c
CWE416_Use_After_Free__malloc_free_struct_63_bad
void CWE416_Use_After_Free__malloc_free_struct_63_bad(void) { long lStack_18; ulong uStack_10; lStack_18 = 0; lStack_18 = func_0x00400ab0(800); for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) { *(undefined4 *)(lStack_18 + uStack_10 * 8) = 1; *(undefined4 *)(lStack_18 + uStack_10 * 8 + 4) = 2; } func_0x00400a20(lStack_18); CWE416_Use_After_Free__malloc_free_struct_63b_badSink(&lStack_18); return; }
['gcc']
1,512
void CWE416_Use_After_Free__malloc_free_struct_63_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63a.c
CWE416_Use_After_Free__malloc_free_struct_63_good
void CWE416_Use_After_Free__malloc_free_struct_63_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
1,513
void CWE416_Use_After_Free__malloc_free_struct_63b_badSink(twoIntsStruct * * dataPtr) { twoIntsStruct * data = *dataPtr; /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
CWE416_Use_After_Free__malloc_free_struct_63b_badSink
void CWE416_Use_After_Free__malloc_free_struct_63b_badSink(undefined8 *param_1) { printStructLine(*param_1); return; }
['gcc']
1,514
void CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink(twoIntsStruct * * dataPtr) { twoIntsStruct * data = *dataPtr; /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink
void CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink(undefined8 *param_1) { printStructLine(*param_1); return; }
['gcc']
1,515
void CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink(twoIntsStruct * * dataPtr) { twoIntsStruct * data = *dataPtr; /* FIX: Don't use data that may have been freed already */ /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ /* do nothing */ ; /* empty statement needed for some flow variants */ }
["/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink
void CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink(void) { return; }
['gcc']
1,516
void CWE416_Use_After_Free__malloc_free_struct_64_bad() { twoIntsStruct * data; /* Initialize data */ data = NULL; data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct)); { size_t i; for(i = 0; i < 100; i++) { data[i].intOne = 1; data[i].intTwo = 2; } } /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); CWE416_Use_After_Free__malloc_free_struct_64b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64a.c
CWE416_Use_After_Free__malloc_free_struct_64_bad
void CWE416_Use_After_Free__malloc_free_struct_64_bad(void) { long lStack_18; ulong uStack_10; lStack_18 = 0; lStack_18 = func_0x00400ab0(800); for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) { *(undefined4 *)(lStack_18 + uStack_10 * 8) = 1; *(undefined4 *)(lStack_18 + uStack_10 * 8 + 4) = 2; } func_0x00400a20(lStack_18); CWE416_Use_After_Free__malloc_free_struct_64b_badSink(&lStack_18); return; }
['gcc']
1,517
void CWE416_Use_After_Free__malloc_free_struct_64_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64a.c
CWE416_Use_After_Free__malloc_free_struct_64_good
void CWE416_Use_After_Free__malloc_free_struct_64_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
1,518
void CWE416_Use_After_Free__malloc_free_struct_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr; /* dereference dataPtr into data */ twoIntsStruct * data = (*dataPtr); /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
CWE416_Use_After_Free__malloc_free_struct_64b_badSink
void CWE416_Use_After_Free__malloc_free_struct_64b_badSink(undefined8 *param_1) { printStructLine(*param_1); return; }
['gcc']
1,519
void CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr; /* dereference dataPtr into data */ twoIntsStruct * data = (*dataPtr); /* POTENTIAL FLAW: Use of data that may have been freed */ printStructLine(&data[0]); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink
void CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink(undefined8 *param_1) { printStructLine(*param_1); return; }
['gcc']
1,520
void CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr; /* dereference dataPtr into data */ twoIntsStruct * data = (*dataPtr); /* FIX: Don't use data that may have been freed already */ /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ /* do nothing */ ; /* empty statement needed for some flow variants */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink
void CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink(void) { return; }
['gcc']
1,521
void CWE416_Use_After_Free__malloc_free_wchar_t_08_bad() { wchar_t * data; /* Initialize data */ data = NULL; if(staticReturnsTrue()) { data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } if(staticReturnsTrue()) { /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102322/CWE416_Use_After_Free__malloc_free_wchar_t_08.c
CWE416_Use_After_Free__malloc_free_wchar_t_08_bad
void CWE416_Use_After_Free__malloc_free_wchar_t_08_bad(void) { int iVar1; long lStack_10; lStack_10 = 0; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { lStack_10 = func_0x00400b00(400); func_0x00400aa0(lStack_10,0x41,99); *(undefined4 *)(lStack_10 + 0x18c) = 0; func_0x00400a60(lStack_10); } iVar1 = staticReturnsTrue(); if (iVar1 != 0) { printWLine(lStack_10); } return; }
['gcc']
1,522
void CWE416_Use_After_Free__malloc_free_wchar_t_08_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102322/CWE416_Use_After_Free__malloc_free_wchar_t_08.c
CWE416_Use_After_Free__malloc_free_wchar_t_08_good
void CWE416_Use_After_Free__malloc_free_wchar_t_08_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
1,523
void CWE416_Use_After_Free__malloc_free_wchar_t_11_bad() { wchar_t * data; /* Initialize data */ data = NULL; if(globalReturnsTrue()) { data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } if(globalReturnsTrue()) { /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102325/CWE416_Use_After_Free__malloc_free_wchar_t_11.c
CWE416_Use_After_Free__malloc_free_wchar_t_11_bad
void CWE416_Use_After_Free__malloc_free_wchar_t_11_bad(void) { int iVar1; long lStack_10; lStack_10 = 0; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { lStack_10 = func_0x00400b00(400); func_0x00400aa0(lStack_10,0x41,99); *(undefined4 *)(lStack_10 + 0x18c) = 0; func_0x00400a60(lStack_10); } iVar1 = globalReturnsTrue(); if (iVar1 != 0) { printWLine(lStack_10); } return; }
['gcc']
1,524
void CWE416_Use_After_Free__malloc_free_wchar_t_11_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102325/CWE416_Use_After_Free__malloc_free_wchar_t_11.c
CWE416_Use_After_Free__malloc_free_wchar_t_11_good
void CWE416_Use_After_Free__malloc_free_wchar_t_11_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
1,525
void CWE416_Use_After_Free__malloc_free_wchar_t_12_bad() { wchar_t * data; /* Initialize data */ data = NULL; if(globalReturnsTrueOrFalse()) { data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } else { data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* FIX: Do not free data in the source */ } if(globalReturnsTrueOrFalse()) { /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } else { /* FIX: Don't use data that may have been freed already */ /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ /* do nothing */ ; /* empty statement needed for some flow variants */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* FIX: Do not free data in the source */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102326/CWE416_Use_After_Free__malloc_free_wchar_t_12.c
CWE416_Use_After_Free__malloc_free_wchar_t_12_bad
void CWE416_Use_After_Free__malloc_free_wchar_t_12_bad(void) { int iVar1; long lStack_10; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { lStack_10 = func_0x00400b00(400); func_0x00400aa0(lStack_10,0x41,99); *(undefined4 *)(lStack_10 + 0x18c) = 0; } else { lStack_10 = func_0x00400b00(400); func_0x00400aa0(lStack_10,0x41,99); *(undefined4 *)(lStack_10 + 0x18c) = 0; func_0x00400a60(lStack_10); } iVar1 = globalReturnsTrueOrFalse(); if (iVar1 != 0) { printWLine(lStack_10); } return; }
['gcc']
1,526
void CWE416_Use_After_Free__malloc_free_wchar_t_12_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102326/CWE416_Use_After_Free__malloc_free_wchar_t_12.c
CWE416_Use_After_Free__malloc_free_wchar_t_12_good
void CWE416_Use_After_Free__malloc_free_wchar_t_12_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
1,527
void CWE416_Use_After_Free__malloc_free_wchar_t_17_bad() { int i,j; wchar_t * data; /* Initialize data */ data = NULL; for(i = 0; i < 1; i++) { data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); } for(j = 0; j < 1; j++) { /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ } }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102331/CWE416_Use_After_Free__malloc_free_wchar_t_17.c
CWE416_Use_After_Free__malloc_free_wchar_t_17_bad
void CWE416_Use_After_Free__malloc_free_wchar_t_17_bad(void) { long lStack_18; int iStack_10; int iStack_c; lStack_18 = 0; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { lStack_18 = func_0x00400b00(400); func_0x00400aa0(lStack_18,0x41,99); *(undefined4 *)(lStack_18 + 0x18c) = 0; func_0x00400a60(lStack_18); } for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) { printWLine(lStack_18); } return; }
['gcc']
1,528
void CWE416_Use_After_Free__malloc_free_wchar_t_17_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102331/CWE416_Use_After_Free__malloc_free_wchar_t_17.c
CWE416_Use_After_Free__malloc_free_wchar_t_17_good
void CWE416_Use_After_Free__malloc_free_wchar_t_17_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
1,529
void CWE416_Use_After_Free__malloc_free_wchar_t_64_bad() { wchar_t * data; /* Initialize data */ data = NULL; data = (wchar_t *)malloc(100*sizeof(wchar_t)); wmemset(data, L'A', 100-1); data[100-1] = L'\0'; /* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */ free(data); CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64a.c
CWE416_Use_After_Free__malloc_free_wchar_t_64_bad
void CWE416_Use_After_Free__malloc_free_wchar_t_64_bad(void) { long lStack_10; lStack_10 = 0; lStack_10 = func_0x00400b00(400); func_0x00400aa0(lStack_10,0x41,99); *(undefined4 *)(lStack_10 + 0x18c) = 0; func_0x00400a60(lStack_10); CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(&lStack_10); return; }
['gcc']
1,530
void CWE416_Use_After_Free__malloc_free_wchar_t_64_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64a.c
CWE416_Use_After_Free__malloc_free_wchar_t_64_good
void CWE416_Use_After_Free__malloc_free_wchar_t_64_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
1,531
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr; /* dereference dataPtr into data */ wchar_t * data = (*dataPtr); /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(undefined8 *param_1) { printWLine(*param_1); return; }
['gcc']
1,532
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr; /* dereference dataPtr into data */ wchar_t * data = (*dataPtr); /* POTENTIAL FLAW: Use of data that may have been freed */ printWLine(data); /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink(undefined8 *param_1) { printWLine(*param_1); return; }
['gcc']
1,533
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr; /* dereference dataPtr into data */ wchar_t * data = (*dataPtr); /* FIX: Don't use data that may have been freed already */ /* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */ /* do nothing */ ; /* empty statement needed for some flow variants */ }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink(void) { return; }
['gcc']
1,534
void CWE416_Use_After_Free__return_freed_ptr_01_bad() { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102646/CWE416_Use_After_Free__return_freed_ptr_01.c
CWE416_Use_After_Free__return_freed_ptr_01_bad
void CWE416_Use_After_Free__return_freed_ptr_01_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,535
void CWE416_Use_After_Free__return_freed_ptr_01_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102646/CWE416_Use_After_Free__return_freed_ptr_01.c
CWE416_Use_After_Free__return_freed_ptr_01_good
void CWE416_Use_After_Free__return_freed_ptr_01_good(void) { good1(); return; }
['gcc']
1,536
void CWE416_Use_After_Free__return_freed_ptr_02_bad() { if(1) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102647/CWE416_Use_After_Free__return_freed_ptr_02.c
CWE416_Use_After_Free__return_freed_ptr_02_bad
void CWE416_Use_After_Free__return_freed_ptr_02_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,537
void CWE416_Use_After_Free__return_freed_ptr_02_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102647/CWE416_Use_After_Free__return_freed_ptr_02.c
CWE416_Use_After_Free__return_freed_ptr_02_good
void CWE416_Use_After_Free__return_freed_ptr_02_good(void) { good1(); good2(); return; }
['gcc']
1,538
void CWE416_Use_After_Free__return_freed_ptr_03_bad() { if(5==5) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102648/CWE416_Use_After_Free__return_freed_ptr_03.c
CWE416_Use_After_Free__return_freed_ptr_03_bad
void CWE416_Use_After_Free__return_freed_ptr_03_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,539
void CWE416_Use_After_Free__return_freed_ptr_03_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102648/CWE416_Use_After_Free__return_freed_ptr_03.c
CWE416_Use_After_Free__return_freed_ptr_03_good
void CWE416_Use_After_Free__return_freed_ptr_03_good(void) { good1(); good2(); return; }
['gcc']
1,540
void CWE416_Use_After_Free__return_freed_ptr_04_bad() { if(STATIC_CONST_TRUE) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102649/CWE416_Use_After_Free__return_freed_ptr_04.c
CWE416_Use_After_Free__return_freed_ptr_04_bad
void CWE416_Use_After_Free__return_freed_ptr_04_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_0040131c); printLine(uVar1); return; }
['gcc']
1,541
void CWE416_Use_After_Free__return_freed_ptr_04_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102649/CWE416_Use_After_Free__return_freed_ptr_04.c
CWE416_Use_After_Free__return_freed_ptr_04_good
void CWE416_Use_After_Free__return_freed_ptr_04_good(void) { good1(); good2(); return; }
['gcc']
1,542
void CWE416_Use_After_Free__return_freed_ptr_05_bad() { if(staticTrue) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102650/CWE416_Use_After_Free__return_freed_ptr_05.c
CWE416_Use_After_Free__return_freed_ptr_05_bad
void CWE416_Use_After_Free__return_freed_ptr_05_bad(void) { undefined8 uVar1; if (staticTrue != 0) { uVar1 = helperBad(&UNK_00401314); printLine(uVar1); } return; }
['gcc']
1,543
void CWE416_Use_After_Free__return_freed_ptr_05_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102650/CWE416_Use_After_Free__return_freed_ptr_05.c
CWE416_Use_After_Free__return_freed_ptr_05_good
void CWE416_Use_After_Free__return_freed_ptr_05_good(void) { good1(); good2(); return; }
['gcc']
1,544
void CWE416_Use_After_Free__return_freed_ptr_06_bad() { if(STATIC_CONST_FIVE==5) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102651/CWE416_Use_After_Free__return_freed_ptr_06.c
CWE416_Use_After_Free__return_freed_ptr_06_bad
void CWE416_Use_After_Free__return_freed_ptr_06_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401318); printLine(uVar1); return; }
['gcc']
1,545
void CWE416_Use_After_Free__return_freed_ptr_06_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102651/CWE416_Use_After_Free__return_freed_ptr_06.c
CWE416_Use_After_Free__return_freed_ptr_06_good
void CWE416_Use_After_Free__return_freed_ptr_06_good(void) { good1(); good2(); return; }
['gcc']
1,546
void CWE416_Use_After_Free__return_freed_ptr_07_bad() { if(staticFive==5) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102652/CWE416_Use_After_Free__return_freed_ptr_07.c
CWE416_Use_After_Free__return_freed_ptr_07_bad
void CWE416_Use_After_Free__return_freed_ptr_07_bad(void) { undefined8 uVar1; if (staticFive == 5) { uVar1 = helperBad(&UNK_00401324); printLine(uVar1); } return; }
['gcc']
1,547
void CWE416_Use_After_Free__return_freed_ptr_07_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102652/CWE416_Use_After_Free__return_freed_ptr_07.c
CWE416_Use_After_Free__return_freed_ptr_07_good
void CWE416_Use_After_Free__return_freed_ptr_07_good(void) { good1(); good2(); return; }
['gcc']
1,548
void CWE416_Use_After_Free__return_freed_ptr_08_bad() { if(staticReturnsTrue()) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102653/CWE416_Use_After_Free__return_freed_ptr_08.c
CWE416_Use_After_Free__return_freed_ptr_08_bad
void CWE416_Use_After_Free__return_freed_ptr_08_bad(void) { int iVar1; undefined8 uVar2; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { uVar2 = helperBad(&UNK_00401334); printLine(uVar2); } return; }
['gcc']
1,549
void CWE416_Use_After_Free__return_freed_ptr_08_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102653/CWE416_Use_After_Free__return_freed_ptr_08.c
CWE416_Use_After_Free__return_freed_ptr_08_good
void CWE416_Use_After_Free__return_freed_ptr_08_good(void) { good1(); good2(); return; }
['gcc']
1,550
void CWE416_Use_After_Free__return_freed_ptr_09_bad() { if(GLOBAL_CONST_TRUE) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102654/CWE416_Use_After_Free__return_freed_ptr_09.c
CWE416_Use_After_Free__return_freed_ptr_09_bad
void CWE416_Use_After_Free__return_freed_ptr_09_bad(void) { undefined8 uVar1; if (GLOBAL_CONST_TRUE != 0) { uVar1 = helperBad(&UNK_00401314); printLine(uVar1); } return; }
['gcc']
1,551
void CWE416_Use_After_Free__return_freed_ptr_09_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102654/CWE416_Use_After_Free__return_freed_ptr_09.c
CWE416_Use_After_Free__return_freed_ptr_09_good
void CWE416_Use_After_Free__return_freed_ptr_09_good(void) { good1(); good2(); return; }
['gcc']
1,552
void CWE416_Use_After_Free__return_freed_ptr_10_bad() { if(globalTrue) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102655/CWE416_Use_After_Free__return_freed_ptr_10.c
CWE416_Use_After_Free__return_freed_ptr_10_bad
void CWE416_Use_After_Free__return_freed_ptr_10_bad(void) { undefined8 uVar1; if (globalTrue != 0) { uVar1 = helperBad(&UNK_00401314); printLine(uVar1); } return; }
['gcc']
1,553
void CWE416_Use_After_Free__return_freed_ptr_10_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102655/CWE416_Use_After_Free__return_freed_ptr_10.c
CWE416_Use_After_Free__return_freed_ptr_10_good
void CWE416_Use_After_Free__return_freed_ptr_10_good(void) { good1(); good2(); return; }
['gcc']
1,554
void CWE416_Use_After_Free__return_freed_ptr_11_bad() { if(globalReturnsTrue()) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102656/CWE416_Use_After_Free__return_freed_ptr_11.c
CWE416_Use_After_Free__return_freed_ptr_11_bad
void CWE416_Use_After_Free__return_freed_ptr_11_bad(void) { int iVar1; undefined8 uVar2; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { uVar2 = helperBad(&UNK_00401324); printLine(uVar2); } return; }
['gcc']
1,555
void CWE416_Use_After_Free__return_freed_ptr_11_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102656/CWE416_Use_After_Free__return_freed_ptr_11.c
CWE416_Use_After_Free__return_freed_ptr_11_good
void CWE416_Use_After_Free__return_freed_ptr_11_good(void) { good1(); good2(); return; }
['gcc']
1,556
void CWE416_Use_After_Free__return_freed_ptr_12_bad() { if(globalReturnsTrueOrFalse()) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } else { { /* Call the good helper function */ char * reversedString = helperGood("GoodSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */", '/* Call the good helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102657/CWE416_Use_After_Free__return_freed_ptr_12.c
CWE416_Use_After_Free__return_freed_ptr_12_bad
void CWE416_Use_After_Free__return_freed_ptr_12_bad(void) { int iVar1; undefined8 uVar2; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { uVar2 = helperGood(&UNK_0040133c); printLine(uVar2); } else { uVar2 = helperBad(&UNK_00401334); printLine(uVar2); } return; }
['gcc']
1,557
void CWE416_Use_After_Free__return_freed_ptr_12_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102657/CWE416_Use_After_Free__return_freed_ptr_12.c
CWE416_Use_After_Free__return_freed_ptr_12_good
void CWE416_Use_After_Free__return_freed_ptr_12_good(void) { good1(); return; }
['gcc']
1,558
void CWE416_Use_After_Free__return_freed_ptr_13_bad() { if(GLOBAL_CONST_FIVE==5) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102658/CWE416_Use_After_Free__return_freed_ptr_13.c
CWE416_Use_After_Free__return_freed_ptr_13_bad
void CWE416_Use_After_Free__return_freed_ptr_13_bad(void) { undefined8 uVar1; if (GLOBAL_CONST_FIVE == 5) { uVar1 = helperBad(&UNK_00401324); printLine(uVar1); } return; }
['gcc']
1,559
void CWE416_Use_After_Free__return_freed_ptr_13_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102658/CWE416_Use_After_Free__return_freed_ptr_13.c
CWE416_Use_After_Free__return_freed_ptr_13_good
void CWE416_Use_After_Free__return_freed_ptr_13_good(void) { good1(); good2(); return; }
['gcc']
1,560
void CWE416_Use_After_Free__return_freed_ptr_14_bad() { if(globalFive==5) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102659/CWE416_Use_After_Free__return_freed_ptr_14.c
CWE416_Use_After_Free__return_freed_ptr_14_bad
void CWE416_Use_After_Free__return_freed_ptr_14_bad(void) { undefined8 uVar1; if (globalFive == 5) { uVar1 = helperBad(&UNK_00401324); printLine(uVar1); } return; }
['gcc']
1,561
void CWE416_Use_After_Free__return_freed_ptr_14_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102659/CWE416_Use_After_Free__return_freed_ptr_14.c
CWE416_Use_After_Free__return_freed_ptr_14_good
void CWE416_Use_After_Free__return_freed_ptr_14_good(void) { good1(); good2(); return; }
['gcc']
1,562
void CWE416_Use_After_Free__return_freed_ptr_15_bad() { switch(6) { case 6: { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */", '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102660/CWE416_Use_After_Free__return_freed_ptr_15.c
CWE416_Use_After_Free__return_freed_ptr_15_bad
void CWE416_Use_After_Free__return_freed_ptr_15_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,563
void CWE416_Use_After_Free__return_freed_ptr_15_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102660/CWE416_Use_After_Free__return_freed_ptr_15.c
CWE416_Use_After_Free__return_freed_ptr_15_good
void CWE416_Use_After_Free__return_freed_ptr_15_good(void) { good1(); good2(); return; }
['gcc']
1,564
void CWE416_Use_After_Free__return_freed_ptr_16_bad() { while(1) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } break; } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102661/CWE416_Use_After_Free__return_freed_ptr_16.c
CWE416_Use_After_Free__return_freed_ptr_16_bad
void CWE416_Use_After_Free__return_freed_ptr_16_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,565
void CWE416_Use_After_Free__return_freed_ptr_16_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102661/CWE416_Use_After_Free__return_freed_ptr_16.c
CWE416_Use_After_Free__return_freed_ptr_16_good
void CWE416_Use_After_Free__return_freed_ptr_16_good(void) { good1(); return; }
['gcc']
1,566
void CWE416_Use_After_Free__return_freed_ptr_17_bad() { int j; for(j = 0; j < 1; j++) { { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102662/CWE416_Use_After_Free__return_freed_ptr_17.c
CWE416_Use_After_Free__return_freed_ptr_17_bad
void CWE416_Use_After_Free__return_freed_ptr_17_bad(void) { undefined8 uVar1; int iStack_c; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { uVar1 = helperBad(&UNK_00401324); printLine(uVar1); } return; }
['gcc']
1,567
void CWE416_Use_After_Free__return_freed_ptr_17_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102662/CWE416_Use_After_Free__return_freed_ptr_17.c
CWE416_Use_After_Free__return_freed_ptr_17_good
void CWE416_Use_After_Free__return_freed_ptr_17_good(void) { good1(); return; }
['gcc']
1,568
void CWE416_Use_After_Free__return_freed_ptr_18_bad() { goto sink; sink: { /* Call the bad helper function */ char * reversedString = helperBad("BadSink"); printLine(reversedString); /* free(reversedString); * This call to free() was removed because we want the tool to detect the use after free, * but we don't want that function to be free(). Essentially we want to avoid a double free */ } }
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
['CWE416']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102663/CWE416_Use_After_Free__return_freed_ptr_18.c
CWE416_Use_After_Free__return_freed_ptr_18_bad
void CWE416_Use_After_Free__return_freed_ptr_18_bad(void) { undefined8 uVar1; uVar1 = helperBad(&UNK_00401314); printLine(uVar1); return; }
['gcc']
1,569
void CWE416_Use_After_Free__return_freed_ptr_18_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102663/CWE416_Use_After_Free__return_freed_ptr_18.c
CWE416_Use_After_Free__return_freed_ptr_18_good
void CWE416_Use_After_Free__return_freed_ptr_18_good(void) { good1(); return; }
['gcc']
1,570
void CWE426_Untrusted_Search_Path__char_popen_08_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(staticReturnsTrue()) { /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); } { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102671/CWE426_Untrusted_Search_Path__char_popen_08.c
CWE426_Untrusted_Search_Path__char_popen_08_bad
void CWE426_Untrusted_Search_Path__char_popen_08_bad(void) { undefined8 *puVar1; int iVar2; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined4 uStack_28; long lStack_18; undefined8 *puStack_10; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; puStack_10 = &uStack_88; iVar2 = staticReturnsTrue(); puVar1 = puStack_10; if (iVar2 != 0) { *(undefined4 *)puStack_10 = 0x2d20736c; *(undefined2 *)((long)puVar1 + 4) = 0x616c; *(undefined *)((long)puVar1 + 6) = 0; } lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401224); if (lStack_18 != 0) { func_0x00400a50(lStack_18); } return; }
['gcc']
1,571
void CWE426_Untrusted_Search_Path__char_popen_08_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102671/CWE426_Untrusted_Search_Path__char_popen_08.c
CWE426_Untrusted_Search_Path__char_popen_08_good
void CWE426_Untrusted_Search_Path__char_popen_08_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
1,572
void CWE426_Untrusted_Search_Path__char_popen_11_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalReturnsTrue()) { /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); } { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102674/CWE426_Untrusted_Search_Path__char_popen_11.c
CWE426_Untrusted_Search_Path__char_popen_11_bad
void CWE426_Untrusted_Search_Path__char_popen_11_bad(void) { undefined8 *puVar1; int iVar2; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined4 uStack_28; long lStack_18; undefined8 *puStack_10; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; puStack_10 = &uStack_88; iVar2 = globalReturnsTrue(); puVar1 = puStack_10; if (iVar2 != 0) { *(undefined4 *)puStack_10 = 0x2d20736c; *(undefined2 *)((long)puVar1 + 4) = 0x616c; *(undefined *)((long)puVar1 + 6) = 0; } lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401214); if (lStack_18 != 0) { func_0x00400a50(lStack_18); } return; }
['gcc']
1,573
void CWE426_Untrusted_Search_Path__char_popen_11_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102674/CWE426_Untrusted_Search_Path__char_popen_11.c
CWE426_Untrusted_Search_Path__char_popen_11_good
void CWE426_Untrusted_Search_Path__char_popen_11_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
1,574
void CWE426_Untrusted_Search_Path__char_popen_12_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; if(globalReturnsTrueOrFalse()) { /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); } else { /* FIX: full path is specified */ strcpy(data, GOOD_OS_COMMAND); } { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* FLAW: the full path is not specified */', '/* FIX: full path is specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102675/CWE426_Untrusted_Search_Path__char_popen_12.c
CWE426_Untrusted_Search_Path__char_popen_12_bad
void CWE426_Untrusted_Search_Path__char_popen_12_bad(void) { undefined8 *puVar1; int iVar2; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined4 uStack_28; long lStack_18; undefined8 *puStack_10; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; puStack_10 = &uStack_88; iVar2 = globalReturnsTrueOrFalse(); puVar1 = puStack_10; if (iVar2 == 0) { *puStack_10 = 0x6e69622f7273752f; puVar1[1] = 0x616c2d20736c2f; } else { *(undefined4 *)puStack_10 = 0x2d20736c; *(undefined2 *)((long)puVar1 + 4) = 0x616c; *(undefined *)((long)puVar1 + 6) = 0; } lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401234); if (lStack_18 != 0) { func_0x00400a50(lStack_18); } return; }
['gcc']
1,575
void CWE426_Untrusted_Search_Path__char_popen_12_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102675/CWE426_Untrusted_Search_Path__char_popen_12.c
CWE426_Untrusted_Search_Path__char_popen_12_good
void CWE426_Untrusted_Search_Path__char_popen_12_good(void) { goodG2B(); return; }
['gcc']
1,576
void CWE426_Untrusted_Search_Path__char_popen_17_bad() { int i; char * data; char dataBuffer[100] = ""; data = dataBuffer; for(i = 0; i < 1; i++) { /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); } { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102680/CWE426_Untrusted_Search_Path__char_popen_17.c
CWE426_Untrusted_Search_Path__char_popen_17_bad
void CWE426_Untrusted_Search_Path__char_popen_17_bad(void) { undefined8 *puVar1; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined4 uStack_28; long lStack_20; undefined8 *puStack_18; int iStack_c; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; puStack_18 = &uStack_88; for (iStack_c = 0; puVar1 = puStack_18, iStack_c < 1; iStack_c = iStack_c + 1) { *(undefined4 *)puStack_18 = 0x2d20736c; *(undefined2 *)((long)puVar1 + 4) = 0x616c; *(undefined *)((long)puVar1 + 6) = 0; } lStack_20 = func_0x00400ad0(puStack_18,&UNK_00401214); if (lStack_20 != 0) { func_0x00400a50(lStack_20); } return; }
['gcc']
1,577
void CWE426_Untrusted_Search_Path__char_popen_17_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102680/CWE426_Untrusted_Search_Path__char_popen_17.c
CWE426_Untrusted_Search_Path__char_popen_17_good
void CWE426_Untrusted_Search_Path__char_popen_17_good(void) { goodG2B(); return; }
['gcc']
1,578
void CWE426_Untrusted_Search_Path__char_popen_31_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); { char * dataCopy = data; char * data = dataCopy; { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102684/CWE426_Untrusted_Search_Path__char_popen_31.c
CWE426_Untrusted_Search_Path__char_popen_31_bad
void CWE426_Untrusted_Search_Path__char_popen_31_bad(void) { undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; long lStack_28; undefined8 *puStack_20; undefined8 *puStack_18; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_20 = &uStack_98; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._6_1_ = 0; puStack_18 = puStack_20; puStack_10 = puStack_20; lStack_28 = func_0x00400ad0(puStack_20,&UNK_00401224); if (lStack_28 != 0) { func_0x00400a50(lStack_28); } return; }
['gcc']
1,579
void CWE426_Untrusted_Search_Path__char_popen_31_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102684/CWE426_Untrusted_Search_Path__char_popen_31.c
CWE426_Untrusted_Search_Path__char_popen_31_good
void CWE426_Untrusted_Search_Path__char_popen_31_good(void) { goodG2B(); return; }
['gcc']
1,580
void CWE426_Untrusted_Search_Path__char_popen_32_bad() { char * data; char * *dataPtr1 = &data; char * *dataPtr2 = &data; char dataBuffer[100] = ""; data = dataBuffer; { char * data = *dataPtr1; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); *dataPtr1 = data; } { char * data = *dataPtr2; { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102685/CWE426_Untrusted_Search_Path__char_popen_32.c
CWE426_Untrusted_Search_Path__char_popen_32_bad
/* WARNING: Heritage AFTER dead removal. Example location: s0xffffffffffffffc8 : 0x00400c99 */ /* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE426_Untrusted_Search_Path__char_popen_32_bad(void) { undefined8 uStack_a8; undefined8 uStack_a0; undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined4 uStack_48; undefined8 *puStack_38; long lStack_30; undefined8 *puStack_28; undefined8 *puStack_20; undefined8 **ppuStack_18; undefined8 **ppuStack_10; ppuStack_10 = &puStack_38; ppuStack_18 = &puStack_38; uStack_a8 = 0; uStack_a0 = 0; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; puStack_38 = &uStack_a8; puStack_28 = puStack_38; puStack_20 = puStack_38; lStack_30 = func_0x00400ad0(puStack_38,&UNK_00401244); if (lStack_30 != 0) { func_0x00400a50(lStack_30); } return; }
['gcc']
1,581
void CWE426_Untrusted_Search_Path__char_popen_32_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102685/CWE426_Untrusted_Search_Path__char_popen_32.c
CWE426_Untrusted_Search_Path__char_popen_32_good
void CWE426_Untrusted_Search_Path__char_popen_32_good(void) { goodG2B(); return; }
['gcc']
1,582
void CWE426_Untrusted_Search_Path__char_popen_34_bad() { char * data; CWE426_Untrusted_Search_Path__char_popen_34_unionType myUnion; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); myUnion.unionFirst = data; { char * data = myUnion.unionSecond; { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } } }
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102687/CWE426_Untrusted_Search_Path__char_popen_34.c
CWE426_Untrusted_Search_Path__char_popen_34_bad
void CWE426_Untrusted_Search_Path__char_popen_34_bad(void) { undefined8 uStack_98; undefined8 uStack_90; undefined8 uStack_88; undefined8 uStack_80; undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined4 uStack_38; undefined8 *puStack_28; long lStack_20; undefined8 *puStack_18; undefined8 *puStack_10; uStack_98 = 0; uStack_90 = 0; uStack_88 = 0; uStack_80 = 0; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; puStack_28 = &uStack_98; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_98._6_1_ = 0; puStack_18 = puStack_28; puStack_10 = puStack_28; lStack_20 = func_0x00400ad0(puStack_28,&UNK_00401224); if (lStack_20 != 0) { func_0x00400a50(lStack_20); } return; }
['gcc']
1,583
void CWE426_Untrusted_Search_Path__char_popen_34_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102687/CWE426_Untrusted_Search_Path__char_popen_34.c
CWE426_Untrusted_Search_Path__char_popen_34_good
void CWE426_Untrusted_Search_Path__char_popen_34_good(void) { goodG2B(); return; }
['gcc']
1,584
void CWE426_Untrusted_Search_Path__char_popen_41_badSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
CWE426_Untrusted_Search_Path__char_popen_41_badSink
void CWE426_Untrusted_Search_Path__char_popen_41_badSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401224); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,585
void CWE426_Untrusted_Search_Path__char_popen_41_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); CWE426_Untrusted_Search_Path__char_popen_41_badSink(data); }
['/* FLAW: the full path is not specified */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
CWE426_Untrusted_Search_Path__char_popen_41_bad
void CWE426_Untrusted_Search_Path__char_popen_41_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._6_1_ = 0; CWE426_Untrusted_Search_Path__char_popen_41_badSink(puStack_10); return; }
['gcc']
1,586
void CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink
void CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401244); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,587
void CWE426_Untrusted_Search_Path__char_popen_41_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
CWE426_Untrusted_Search_Path__char_popen_41_good
void CWE426_Untrusted_Search_Path__char_popen_41_good(void) { goodG2B(); return; }
['gcc']
1,588
void CWE426_Untrusted_Search_Path__char_popen_51_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); CWE426_Untrusted_Search_Path__char_popen_51b_badSink(data); }
['/* FLAW: the full path is not specified */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51a.c
CWE426_Untrusted_Search_Path__char_popen_51_bad
void CWE426_Untrusted_Search_Path__char_popen_51_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._6_1_ = 0; CWE426_Untrusted_Search_Path__char_popen_51b_badSink(puStack_10); return; }
['gcc']
1,589
void CWE426_Untrusted_Search_Path__char_popen_51_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51a.c
CWE426_Untrusted_Search_Path__char_popen_51_good
void CWE426_Untrusted_Search_Path__char_popen_51_good(void) { goodG2B(); return; }
['gcc']
1,590
void CWE426_Untrusted_Search_Path__char_popen_51b_badSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51b.c
CWE426_Untrusted_Search_Path__char_popen_51b_badSink
void CWE426_Untrusted_Search_Path__char_popen_51b_badSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401224); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,591
void CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51b.c
CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink
void CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401244); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,592
void CWE426_Untrusted_Search_Path__char_popen_52_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); CWE426_Untrusted_Search_Path__char_popen_52b_badSink(data); }
['/* FLAW: the full path is not specified */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52a.c
CWE426_Untrusted_Search_Path__char_popen_52_bad
void CWE426_Untrusted_Search_Path__char_popen_52_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._6_1_ = 0; CWE426_Untrusted_Search_Path__char_popen_52b_badSink(puStack_10); return; }
['gcc']
1,593
void CWE426_Untrusted_Search_Path__char_popen_52_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52a.c
CWE426_Untrusted_Search_Path__char_popen_52_good
void CWE426_Untrusted_Search_Path__char_popen_52_good(void) { goodG2B(); return; }
['gcc']
1,594
void CWE426_Untrusted_Search_Path__char_popen_52b_badSink(char * data) { CWE426_Untrusted_Search_Path__char_popen_52c_badSink(data); }
[]
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52b.c
CWE426_Untrusted_Search_Path__char_popen_52b_badSink
void CWE426_Untrusted_Search_Path__char_popen_52b_badSink(undefined8 param_1) { CWE426_Untrusted_Search_Path__char_popen_52c_badSink(param_1); return; }
['gcc']
1,595
void CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink(char * data) { CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52b.c
CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink
void CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink(undefined8 param_1) { CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(param_1); return; }
['gcc']
1,596
void CWE426_Untrusted_Search_Path__char_popen_52c_badSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52c.c
CWE426_Untrusted_Search_Path__char_popen_52c_badSink
void CWE426_Untrusted_Search_Path__char_popen_52c_badSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401244); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,597
void CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(char * data) { { FILE *pipe; /* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable * can allow an attacker to run their own program */ pipe = POPEN(data, "wb"); if (pipe != NULL) { PCLOSE(pipe); } } }
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52c.c
CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink
void CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(undefined8 param_1) { long lVar1; lVar1 = func_0x00400ad0(param_1,&UNK_00401254); if (lVar1 != 0) { func_0x00400a50(lVar1); } return; }
['gcc']
1,598
void CWE426_Untrusted_Search_Path__char_popen_53_bad() { char * data; char dataBuffer[100] = ""; data = dataBuffer; /* FLAW: the full path is not specified */ strcpy(data, BAD_OS_COMMAND); CWE426_Untrusted_Search_Path__char_popen_53b_badSink(data); }
['/* FLAW: the full path is not specified */']
['CWE426']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102695/CWE426_Untrusted_Search_Path__char_popen_53a.c
CWE426_Untrusted_Search_Path__char_popen_53_bad
void CWE426_Untrusted_Search_Path__char_popen_53_bad(void) { undefined8 uStack_78; undefined8 uStack_70; undefined8 uStack_68; undefined8 uStack_60; undefined8 uStack_58; undefined8 uStack_50; undefined8 uStack_48; undefined8 uStack_40; undefined8 uStack_38; undefined8 uStack_30; undefined8 uStack_28; undefined8 uStack_20; undefined4 uStack_18; undefined8 *puStack_10; uStack_78 = 0; uStack_70 = 0; uStack_68 = 0; uStack_60 = 0; uStack_58 = 0; uStack_50 = 0; uStack_48 = 0; uStack_40 = 0; uStack_38 = 0; uStack_30 = 0; uStack_28 = 0; uStack_20 = 0; uStack_18 = 0; puStack_10 = &uStack_78; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._0_4_ = 0x2d20736c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._4_2_ = 0x616c; /* WARNING: Ignoring partial resolution of indirect */ uStack_78._6_1_ = 0; CWE426_Untrusted_Search_Path__char_popen_53b_badSink(puStack_10); return; }
['gcc']
1,599
void CWE426_Untrusted_Search_Path__char_popen_53_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102695/CWE426_Untrusted_Search_Path__char_popen_53a.c
CWE426_Untrusted_Search_Path__char_popen_53_good
void CWE426_Untrusted_Search_Path__char_popen_53_good(void) { goodG2B(); return; }
['gcc']