Unnamed: 0
int64 0
56k
| source_code
stringlengths 55
5.98k
| comments
stringlengths 2
1.76k
| label
stringclasses 68
values | dataset_name
stringclasses 1
value | file_name
stringlengths 208
265
| function
stringlengths 27
87
| decompiled_code
stringlengths 68
3.97k
| compiler_options
stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|
1,500
|
void CWE416_Use_After_Free__malloc_free_struct_12_good()
{
goodB2G();
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102304/CWE416_Use_After_Free__malloc_free_struct_12.c
|
CWE416_Use_After_Free__malloc_free_struct_12_good
|
void CWE416_Use_After_Free__malloc_free_struct_12_good(void)
{
goodB2G();
goodG2B();
return;
}
|
['gcc']
|
1,501
|
void CWE416_Use_After_Free__malloc_free_struct_13_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
if(GLOBAL_CONST_FIVE==5)
{
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
if(GLOBAL_CONST_FIVE==5)
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102305/CWE416_Use_After_Free__malloc_free_struct_13.c
|
CWE416_Use_After_Free__malloc_free_struct_13_bad
|
void CWE416_Use_After_Free__malloc_free_struct_13_bad(void)
{
ulong uStack_18;
long lStack_10;
lStack_10 = 0;
if (GLOBAL_CONST_FIVE == 5) {
lStack_10 = func_0x00400ab0(800);
for (uStack_18 = 0; uStack_18 < 100; uStack_18 = uStack_18 + 1) {
*(undefined4 *)(lStack_10 + uStack_18 * 8) = 1;
*(undefined4 *)(lStack_10 + uStack_18 * 8 + 4) = 2;
}
func_0x00400a20(lStack_10);
}
if (GLOBAL_CONST_FIVE == 5) {
printStructLine(lStack_10);
}
return;
}
|
['gcc']
|
1,502
|
void CWE416_Use_After_Free__malloc_free_struct_13_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102305/CWE416_Use_After_Free__malloc_free_struct_13.c
|
CWE416_Use_After_Free__malloc_free_struct_13_good
|
void CWE416_Use_After_Free__malloc_free_struct_13_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,503
|
void CWE416_Use_After_Free__malloc_free_struct_14_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
if(globalFive==5)
{
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
if(globalFive==5)
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102306/CWE416_Use_After_Free__malloc_free_struct_14.c
|
CWE416_Use_After_Free__malloc_free_struct_14_bad
|
void CWE416_Use_After_Free__malloc_free_struct_14_bad(void)
{
ulong uStack_18;
long lStack_10;
lStack_10 = 0;
if (globalFive == 5) {
lStack_10 = func_0x00400ab0(800);
for (uStack_18 = 0; uStack_18 < 100; uStack_18 = uStack_18 + 1) {
*(undefined4 *)(lStack_10 + uStack_18 * 8) = 1;
*(undefined4 *)(lStack_10 + uStack_18 * 8 + 4) = 2;
}
func_0x00400a20(lStack_10);
}
if (globalFive == 5) {
printStructLine(lStack_10);
}
return;
}
|
['gcc']
|
1,504
|
void CWE416_Use_After_Free__malloc_free_struct_14_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102306/CWE416_Use_After_Free__malloc_free_struct_14.c
|
CWE416_Use_After_Free__malloc_free_struct_14_good
|
void CWE416_Use_After_Free__malloc_free_struct_14_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,505
|
void CWE416_Use_After_Free__malloc_free_struct_15_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
switch(6)
{
case 6:
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
switch(7)
{
case 7:
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102307/CWE416_Use_After_Free__malloc_free_struct_15.c
|
CWE416_Use_After_Free__malloc_free_struct_15_bad
|
void CWE416_Use_After_Free__malloc_free_struct_15_bad(void)
{
long lVar1;
ulong uStack_10;
lVar1 = func_0x00400ab0(800);
for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) {
*(undefined4 *)(lVar1 + uStack_10 * 8) = 1;
*(undefined4 *)(lVar1 + uStack_10 * 8 + 4) = 2;
}
func_0x00400a20(lVar1);
printStructLine(lVar1);
return;
}
|
['gcc']
|
1,506
|
void CWE416_Use_After_Free__malloc_free_struct_15_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102307/CWE416_Use_After_Free__malloc_free_struct_15.c
|
CWE416_Use_After_Free__malloc_free_struct_15_good
|
void CWE416_Use_After_Free__malloc_free_struct_15_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,507
|
void CWE416_Use_After_Free__malloc_free_struct_16_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
while(1)
{
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
break;
}
while(1)
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
break;
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102308/CWE416_Use_After_Free__malloc_free_struct_16.c
|
CWE416_Use_After_Free__malloc_free_struct_16_bad
|
void CWE416_Use_After_Free__malloc_free_struct_16_bad(void)
{
long lVar1;
ulong uStack_10;
lVar1 = func_0x00400ab0(800);
for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) {
*(undefined4 *)(lVar1 + uStack_10 * 8) = 1;
*(undefined4 *)(lVar1 + uStack_10 * 8 + 4) = 2;
}
func_0x00400a20(lVar1);
printStructLine(lVar1);
return;
}
|
['gcc']
|
1,508
|
void CWE416_Use_After_Free__malloc_free_struct_16_good()
{
goodB2G();
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102308/CWE416_Use_After_Free__malloc_free_struct_16.c
|
CWE416_Use_After_Free__malloc_free_struct_16_good
|
void CWE416_Use_After_Free__malloc_free_struct_16_good(void)
{
goodB2G();
goodG2B();
return;
}
|
['gcc']
|
1,509
|
void CWE416_Use_After_Free__malloc_free_struct_17_bad()
{
int i,j;
twoIntsStruct * data;
/* Initialize data */
data = NULL;
for(i = 0; i < 1; i++)
{
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
for(j = 0; j < 1; j++)
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102309/CWE416_Use_After_Free__malloc_free_struct_17.c
|
CWE416_Use_After_Free__malloc_free_struct_17_bad
|
void CWE416_Use_After_Free__malloc_free_struct_17_bad(void)
{
ulong uStack_20;
long lStack_18;
int iStack_10;
int iStack_c;
lStack_18 = 0;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
lStack_18 = func_0x00400ab0(800);
for (uStack_20 = 0; uStack_20 < 100; uStack_20 = uStack_20 + 1) {
*(undefined4 *)(lStack_18 + uStack_20 * 8) = 1;
*(undefined4 *)(lStack_18 + uStack_20 * 8 + 4) = 2;
}
func_0x00400a20(lStack_18);
}
for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) {
printStructLine(lStack_18);
}
return;
}
|
['gcc']
|
1,510
|
void CWE416_Use_After_Free__malloc_free_struct_17_good()
{
goodB2G();
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102309/CWE416_Use_After_Free__malloc_free_struct_17.c
|
CWE416_Use_After_Free__malloc_free_struct_17_good
|
void CWE416_Use_After_Free__malloc_free_struct_17_good(void)
{
goodB2G();
goodG2B();
return;
}
|
['gcc']
|
1,511
|
void CWE416_Use_After_Free__malloc_free_struct_63_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
CWE416_Use_After_Free__malloc_free_struct_63b_badSink(&data);
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63a.c
|
CWE416_Use_After_Free__malloc_free_struct_63_bad
|
void CWE416_Use_After_Free__malloc_free_struct_63_bad(void)
{
long lStack_18;
ulong uStack_10;
lStack_18 = 0;
lStack_18 = func_0x00400ab0(800);
for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) {
*(undefined4 *)(lStack_18 + uStack_10 * 8) = 1;
*(undefined4 *)(lStack_18 + uStack_10 * 8 + 4) = 2;
}
func_0x00400a20(lStack_18);
CWE416_Use_After_Free__malloc_free_struct_63b_badSink(&lStack_18);
return;
}
|
['gcc']
|
1,512
|
void CWE416_Use_After_Free__malloc_free_struct_63_good()
{
goodG2B();
goodB2G();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63a.c
|
CWE416_Use_After_Free__malloc_free_struct_63_good
|
void CWE416_Use_After_Free__malloc_free_struct_63_good(void)
{
goodG2B();
goodB2G();
return;
}
|
['gcc']
|
1,513
|
void CWE416_Use_After_Free__malloc_free_struct_63b_badSink(twoIntsStruct * * dataPtr)
{
twoIntsStruct * data = *dataPtr;
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
|
CWE416_Use_After_Free__malloc_free_struct_63b_badSink
|
void CWE416_Use_After_Free__malloc_free_struct_63b_badSink(undefined8 *param_1)
{
printStructLine(*param_1);
return;
}
|
['gcc']
|
1,514
|
void CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink(twoIntsStruct * * dataPtr)
{
twoIntsStruct * data = *dataPtr;
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
|
CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink
|
void CWE416_Use_After_Free__malloc_free_struct_63b_goodG2BSink(undefined8 *param_1)
{
printStructLine(*param_1);
return;
}
|
['gcc']
|
1,515
|
void CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink(twoIntsStruct * * dataPtr)
{
twoIntsStruct * data = *dataPtr;
/* FIX: Don't use data that may have been freed already */
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
/* do nothing */
; /* empty statement needed for some flow variants */
}
|
["/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102313/CWE416_Use_After_Free__malloc_free_struct_63b.c
|
CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink
|
void CWE416_Use_After_Free__malloc_free_struct_63b_goodB2GSink(void)
{
return;
}
|
['gcc']
|
1,516
|
void CWE416_Use_After_Free__malloc_free_struct_64_bad()
{
twoIntsStruct * data;
/* Initialize data */
data = NULL;
data = (twoIntsStruct *)malloc(100*sizeof(twoIntsStruct));
{
size_t i;
for(i = 0; i < 100; i++)
{
data[i].intOne = 1;
data[i].intTwo = 2;
}
}
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
CWE416_Use_After_Free__malloc_free_struct_64b_badSink(&data);
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64a.c
|
CWE416_Use_After_Free__malloc_free_struct_64_bad
|
void CWE416_Use_After_Free__malloc_free_struct_64_bad(void)
{
long lStack_18;
ulong uStack_10;
lStack_18 = 0;
lStack_18 = func_0x00400ab0(800);
for (uStack_10 = 0; uStack_10 < 100; uStack_10 = uStack_10 + 1) {
*(undefined4 *)(lStack_18 + uStack_10 * 8) = 1;
*(undefined4 *)(lStack_18 + uStack_10 * 8 + 4) = 2;
}
func_0x00400a20(lStack_18);
CWE416_Use_After_Free__malloc_free_struct_64b_badSink(&lStack_18);
return;
}
|
['gcc']
|
1,517
|
void CWE416_Use_After_Free__malloc_free_struct_64_good()
{
goodG2B();
goodB2G();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64a.c
|
CWE416_Use_After_Free__malloc_free_struct_64_good
|
void CWE416_Use_After_Free__malloc_free_struct_64_good(void)
{
goodG2B();
goodB2G();
return;
}
|
['gcc']
|
1,518
|
void CWE416_Use_After_Free__malloc_free_struct_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr;
/* dereference dataPtr into data */
twoIntsStruct * data = (*dataPtr);
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
|
CWE416_Use_After_Free__malloc_free_struct_64b_badSink
|
void CWE416_Use_After_Free__malloc_free_struct_64b_badSink(undefined8 *param_1)
{
printStructLine(*param_1);
return;
}
|
['gcc']
|
1,519
|
void CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr;
/* dereference dataPtr into data */
twoIntsStruct * data = (*dataPtr);
/* POTENTIAL FLAW: Use of data that may have been freed */
printStructLine(&data[0]);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
|
CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink
|
void CWE416_Use_After_Free__malloc_free_struct_64b_goodG2BSink(undefined8 *param_1)
{
printStructLine(*param_1);
return;
}
|
['gcc']
|
1,520
|
void CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
twoIntsStruct * * dataPtr = (twoIntsStruct * *)dataVoidPtr;
/* dereference dataPtr into data */
twoIntsStruct * data = (*dataPtr);
/* FIX: Don't use data that may have been freed already */
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
/* do nothing */
; /* empty statement needed for some flow variants */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102314/CWE416_Use_After_Free__malloc_free_struct_64b.c
|
CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink
|
void CWE416_Use_After_Free__malloc_free_struct_64b_goodB2GSink(void)
{
return;
}
|
['gcc']
|
1,521
|
void CWE416_Use_After_Free__malloc_free_wchar_t_08_bad()
{
wchar_t * data;
/* Initialize data */
data = NULL;
if(staticReturnsTrue())
{
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
if(staticReturnsTrue())
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102322/CWE416_Use_After_Free__malloc_free_wchar_t_08.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_08_bad
|
void CWE416_Use_After_Free__malloc_free_wchar_t_08_bad(void)
{
int iVar1;
long lStack_10;
lStack_10 = 0;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
lStack_10 = func_0x00400b00(400);
func_0x00400aa0(lStack_10,0x41,99);
*(undefined4 *)(lStack_10 + 0x18c) = 0;
func_0x00400a60(lStack_10);
}
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
printWLine(lStack_10);
}
return;
}
|
['gcc']
|
1,522
|
void CWE416_Use_After_Free__malloc_free_wchar_t_08_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102322/CWE416_Use_After_Free__malloc_free_wchar_t_08.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_08_good
|
void CWE416_Use_After_Free__malloc_free_wchar_t_08_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,523
|
void CWE416_Use_After_Free__malloc_free_wchar_t_11_bad()
{
wchar_t * data;
/* Initialize data */
data = NULL;
if(globalReturnsTrue())
{
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
if(globalReturnsTrue())
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102325/CWE416_Use_After_Free__malloc_free_wchar_t_11.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_11_bad
|
void CWE416_Use_After_Free__malloc_free_wchar_t_11_bad(void)
{
int iVar1;
long lStack_10;
lStack_10 = 0;
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
lStack_10 = func_0x00400b00(400);
func_0x00400aa0(lStack_10,0x41,99);
*(undefined4 *)(lStack_10 + 0x18c) = 0;
func_0x00400a60(lStack_10);
}
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
printWLine(lStack_10);
}
return;
}
|
['gcc']
|
1,524
|
void CWE416_Use_After_Free__malloc_free_wchar_t_11_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102325/CWE416_Use_After_Free__malloc_free_wchar_t_11.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_11_good
|
void CWE416_Use_After_Free__malloc_free_wchar_t_11_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,525
|
void CWE416_Use_After_Free__malloc_free_wchar_t_12_bad()
{
wchar_t * data;
/* Initialize data */
data = NULL;
if(globalReturnsTrueOrFalse())
{
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
else
{
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* FIX: Do not free data in the source */
}
if(globalReturnsTrueOrFalse())
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
else
{
/* FIX: Don't use data that may have been freed already */
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
/* do nothing */
; /* empty statement needed for some flow variants */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* FIX: Do not free data in the source */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102326/CWE416_Use_After_Free__malloc_free_wchar_t_12.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_12_bad
|
void CWE416_Use_After_Free__malloc_free_wchar_t_12_bad(void)
{
int iVar1;
long lStack_10;
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 == 0) {
lStack_10 = func_0x00400b00(400);
func_0x00400aa0(lStack_10,0x41,99);
*(undefined4 *)(lStack_10 + 0x18c) = 0;
}
else {
lStack_10 = func_0x00400b00(400);
func_0x00400aa0(lStack_10,0x41,99);
*(undefined4 *)(lStack_10 + 0x18c) = 0;
func_0x00400a60(lStack_10);
}
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 != 0) {
printWLine(lStack_10);
}
return;
}
|
['gcc']
|
1,526
|
void CWE416_Use_After_Free__malloc_free_wchar_t_12_good()
{
goodB2G();
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102326/CWE416_Use_After_Free__malloc_free_wchar_t_12.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_12_good
|
void CWE416_Use_After_Free__malloc_free_wchar_t_12_good(void)
{
goodB2G();
goodG2B();
return;
}
|
['gcc']
|
1,527
|
void CWE416_Use_After_Free__malloc_free_wchar_t_17_bad()
{
int i,j;
wchar_t * data;
/* Initialize data */
data = NULL;
for(i = 0; i < 1; i++)
{
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
}
for(j = 0; j < 1; j++)
{
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102331/CWE416_Use_After_Free__malloc_free_wchar_t_17.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_17_bad
|
void CWE416_Use_After_Free__malloc_free_wchar_t_17_bad(void)
{
long lStack_18;
int iStack_10;
int iStack_c;
lStack_18 = 0;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
lStack_18 = func_0x00400b00(400);
func_0x00400aa0(lStack_18,0x41,99);
*(undefined4 *)(lStack_18 + 0x18c) = 0;
func_0x00400a60(lStack_18);
}
for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) {
printWLine(lStack_18);
}
return;
}
|
['gcc']
|
1,528
|
void CWE416_Use_After_Free__malloc_free_wchar_t_17_good()
{
goodB2G();
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102331/CWE416_Use_After_Free__malloc_free_wchar_t_17.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_17_good
|
void CWE416_Use_After_Free__malloc_free_wchar_t_17_good(void)
{
goodB2G();
goodG2B();
return;
}
|
['gcc']
|
1,529
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64_bad()
{
wchar_t * data;
/* Initialize data */
data = NULL;
data = (wchar_t *)malloc(100*sizeof(wchar_t));
wmemset(data, L'A', 100-1);
data[100-1] = L'\0';
/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */
free(data);
CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(&data);
}
|
['/* Initialize data */', '/* POTENTIAL FLAW: Free data in the source - the bad sink attempts to use data */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64a.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_64_bad
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64_bad(void)
{
long lStack_10;
lStack_10 = 0;
lStack_10 = func_0x00400b00(400);
func_0x00400aa0(lStack_10,0x41,99);
*(undefined4 *)(lStack_10 + 0x18c) = 0;
func_0x00400a60(lStack_10);
CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(&lStack_10);
return;
}
|
['gcc']
|
1,530
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64_good()
{
goodG2B();
goodB2G();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64a.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_64_good
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64_good(void)
{
goodG2B();
goodB2G();
return;
}
|
['gcc']
|
1,531
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr;
/* dereference dataPtr into data */
wchar_t * data = (*dataPtr);
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_badSink(undefined8 *param_1)
{
printWLine(*param_1);
return;
}
|
['gcc']
|
1,532
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr;
/* dereference dataPtr into data */
wchar_t * data = (*dataPtr);
/* POTENTIAL FLAW: Use of data that may have been freed */
printWLine(data);
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Use of data that may have been freed */', '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodG2BSink(undefined8 *param_1)
{
printWLine(*param_1);
return;
}
|
['gcc']
|
1,533
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
wchar_t * * dataPtr = (wchar_t * *)dataVoidPtr;
/* dereference dataPtr into data */
wchar_t * data = (*dataPtr);
/* FIX: Don't use data that may have been freed already */
/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */
/* do nothing */
; /* empty statement needed for some flow variants */
}
|
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', "/* FIX: Don't use data that may have been freed already */", '/* POTENTIAL INCIDENTAL - Possible memory leak here if data was not freed */', '/* do nothing */', '/* empty statement needed for some flow variants */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102336/CWE416_Use_After_Free__malloc_free_wchar_t_64b.c
|
CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink
|
void CWE416_Use_After_Free__malloc_free_wchar_t_64b_goodB2GSink(void)
{
return;
}
|
['gcc']
|
1,534
|
void CWE416_Use_After_Free__return_freed_ptr_01_bad()
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102646/CWE416_Use_After_Free__return_freed_ptr_01.c
|
CWE416_Use_After_Free__return_freed_ptr_01_bad
|
void CWE416_Use_After_Free__return_freed_ptr_01_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,535
|
void CWE416_Use_After_Free__return_freed_ptr_01_good()
{
good1();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102646/CWE416_Use_After_Free__return_freed_ptr_01.c
|
CWE416_Use_After_Free__return_freed_ptr_01_good
|
void CWE416_Use_After_Free__return_freed_ptr_01_good(void)
{
good1();
return;
}
|
['gcc']
|
1,536
|
void CWE416_Use_After_Free__return_freed_ptr_02_bad()
{
if(1)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102647/CWE416_Use_After_Free__return_freed_ptr_02.c
|
CWE416_Use_After_Free__return_freed_ptr_02_bad
|
void CWE416_Use_After_Free__return_freed_ptr_02_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,537
|
void CWE416_Use_After_Free__return_freed_ptr_02_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102647/CWE416_Use_After_Free__return_freed_ptr_02.c
|
CWE416_Use_After_Free__return_freed_ptr_02_good
|
void CWE416_Use_After_Free__return_freed_ptr_02_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,538
|
void CWE416_Use_After_Free__return_freed_ptr_03_bad()
{
if(5==5)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102648/CWE416_Use_After_Free__return_freed_ptr_03.c
|
CWE416_Use_After_Free__return_freed_ptr_03_bad
|
void CWE416_Use_After_Free__return_freed_ptr_03_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,539
|
void CWE416_Use_After_Free__return_freed_ptr_03_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102648/CWE416_Use_After_Free__return_freed_ptr_03.c
|
CWE416_Use_After_Free__return_freed_ptr_03_good
|
void CWE416_Use_After_Free__return_freed_ptr_03_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,540
|
void CWE416_Use_After_Free__return_freed_ptr_04_bad()
{
if(STATIC_CONST_TRUE)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102649/CWE416_Use_After_Free__return_freed_ptr_04.c
|
CWE416_Use_After_Free__return_freed_ptr_04_bad
|
void CWE416_Use_After_Free__return_freed_ptr_04_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_0040131c);
printLine(uVar1);
return;
}
|
['gcc']
|
1,541
|
void CWE416_Use_After_Free__return_freed_ptr_04_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102649/CWE416_Use_After_Free__return_freed_ptr_04.c
|
CWE416_Use_After_Free__return_freed_ptr_04_good
|
void CWE416_Use_After_Free__return_freed_ptr_04_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,542
|
void CWE416_Use_After_Free__return_freed_ptr_05_bad()
{
if(staticTrue)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102650/CWE416_Use_After_Free__return_freed_ptr_05.c
|
CWE416_Use_After_Free__return_freed_ptr_05_bad
|
void CWE416_Use_After_Free__return_freed_ptr_05_bad(void)
{
undefined8 uVar1;
if (staticTrue != 0) {
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,543
|
void CWE416_Use_After_Free__return_freed_ptr_05_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102650/CWE416_Use_After_Free__return_freed_ptr_05.c
|
CWE416_Use_After_Free__return_freed_ptr_05_good
|
void CWE416_Use_After_Free__return_freed_ptr_05_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,544
|
void CWE416_Use_After_Free__return_freed_ptr_06_bad()
{
if(STATIC_CONST_FIVE==5)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102651/CWE416_Use_After_Free__return_freed_ptr_06.c
|
CWE416_Use_After_Free__return_freed_ptr_06_bad
|
void CWE416_Use_After_Free__return_freed_ptr_06_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401318);
printLine(uVar1);
return;
}
|
['gcc']
|
1,545
|
void CWE416_Use_After_Free__return_freed_ptr_06_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102651/CWE416_Use_After_Free__return_freed_ptr_06.c
|
CWE416_Use_After_Free__return_freed_ptr_06_good
|
void CWE416_Use_After_Free__return_freed_ptr_06_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,546
|
void CWE416_Use_After_Free__return_freed_ptr_07_bad()
{
if(staticFive==5)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102652/CWE416_Use_After_Free__return_freed_ptr_07.c
|
CWE416_Use_After_Free__return_freed_ptr_07_bad
|
void CWE416_Use_After_Free__return_freed_ptr_07_bad(void)
{
undefined8 uVar1;
if (staticFive == 5) {
uVar1 = helperBad(&UNK_00401324);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,547
|
void CWE416_Use_After_Free__return_freed_ptr_07_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102652/CWE416_Use_After_Free__return_freed_ptr_07.c
|
CWE416_Use_After_Free__return_freed_ptr_07_good
|
void CWE416_Use_After_Free__return_freed_ptr_07_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,548
|
void CWE416_Use_After_Free__return_freed_ptr_08_bad()
{
if(staticReturnsTrue())
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102653/CWE416_Use_After_Free__return_freed_ptr_08.c
|
CWE416_Use_After_Free__return_freed_ptr_08_bad
|
void CWE416_Use_After_Free__return_freed_ptr_08_bad(void)
{
int iVar1;
undefined8 uVar2;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
uVar2 = helperBad(&UNK_00401334);
printLine(uVar2);
}
return;
}
|
['gcc']
|
1,549
|
void CWE416_Use_After_Free__return_freed_ptr_08_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102653/CWE416_Use_After_Free__return_freed_ptr_08.c
|
CWE416_Use_After_Free__return_freed_ptr_08_good
|
void CWE416_Use_After_Free__return_freed_ptr_08_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,550
|
void CWE416_Use_After_Free__return_freed_ptr_09_bad()
{
if(GLOBAL_CONST_TRUE)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102654/CWE416_Use_After_Free__return_freed_ptr_09.c
|
CWE416_Use_After_Free__return_freed_ptr_09_bad
|
void CWE416_Use_After_Free__return_freed_ptr_09_bad(void)
{
undefined8 uVar1;
if (GLOBAL_CONST_TRUE != 0) {
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,551
|
void CWE416_Use_After_Free__return_freed_ptr_09_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102654/CWE416_Use_After_Free__return_freed_ptr_09.c
|
CWE416_Use_After_Free__return_freed_ptr_09_good
|
void CWE416_Use_After_Free__return_freed_ptr_09_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,552
|
void CWE416_Use_After_Free__return_freed_ptr_10_bad()
{
if(globalTrue)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102655/CWE416_Use_After_Free__return_freed_ptr_10.c
|
CWE416_Use_After_Free__return_freed_ptr_10_bad
|
void CWE416_Use_After_Free__return_freed_ptr_10_bad(void)
{
undefined8 uVar1;
if (globalTrue != 0) {
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,553
|
void CWE416_Use_After_Free__return_freed_ptr_10_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102655/CWE416_Use_After_Free__return_freed_ptr_10.c
|
CWE416_Use_After_Free__return_freed_ptr_10_good
|
void CWE416_Use_After_Free__return_freed_ptr_10_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,554
|
void CWE416_Use_After_Free__return_freed_ptr_11_bad()
{
if(globalReturnsTrue())
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102656/CWE416_Use_After_Free__return_freed_ptr_11.c
|
CWE416_Use_After_Free__return_freed_ptr_11_bad
|
void CWE416_Use_After_Free__return_freed_ptr_11_bad(void)
{
int iVar1;
undefined8 uVar2;
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
uVar2 = helperBad(&UNK_00401324);
printLine(uVar2);
}
return;
}
|
['gcc']
|
1,555
|
void CWE416_Use_After_Free__return_freed_ptr_11_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102656/CWE416_Use_After_Free__return_freed_ptr_11.c
|
CWE416_Use_After_Free__return_freed_ptr_11_good
|
void CWE416_Use_After_Free__return_freed_ptr_11_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,556
|
void CWE416_Use_After_Free__return_freed_ptr_12_bad()
{
if(globalReturnsTrueOrFalse())
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
else
{
{
/* Call the good helper function */
char * reversedString = helperGood("GoodSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */", '/* Call the good helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102657/CWE416_Use_After_Free__return_freed_ptr_12.c
|
CWE416_Use_After_Free__return_freed_ptr_12_bad
|
void CWE416_Use_After_Free__return_freed_ptr_12_bad(void)
{
int iVar1;
undefined8 uVar2;
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 == 0) {
uVar2 = helperGood(&UNK_0040133c);
printLine(uVar2);
}
else {
uVar2 = helperBad(&UNK_00401334);
printLine(uVar2);
}
return;
}
|
['gcc']
|
1,557
|
void CWE416_Use_After_Free__return_freed_ptr_12_good()
{
good1();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102657/CWE416_Use_After_Free__return_freed_ptr_12.c
|
CWE416_Use_After_Free__return_freed_ptr_12_good
|
void CWE416_Use_After_Free__return_freed_ptr_12_good(void)
{
good1();
return;
}
|
['gcc']
|
1,558
|
void CWE416_Use_After_Free__return_freed_ptr_13_bad()
{
if(GLOBAL_CONST_FIVE==5)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102658/CWE416_Use_After_Free__return_freed_ptr_13.c
|
CWE416_Use_After_Free__return_freed_ptr_13_bad
|
void CWE416_Use_After_Free__return_freed_ptr_13_bad(void)
{
undefined8 uVar1;
if (GLOBAL_CONST_FIVE == 5) {
uVar1 = helperBad(&UNK_00401324);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,559
|
void CWE416_Use_After_Free__return_freed_ptr_13_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102658/CWE416_Use_After_Free__return_freed_ptr_13.c
|
CWE416_Use_After_Free__return_freed_ptr_13_good
|
void CWE416_Use_After_Free__return_freed_ptr_13_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,560
|
void CWE416_Use_After_Free__return_freed_ptr_14_bad()
{
if(globalFive==5)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102659/CWE416_Use_After_Free__return_freed_ptr_14.c
|
CWE416_Use_After_Free__return_freed_ptr_14_bad
|
void CWE416_Use_After_Free__return_freed_ptr_14_bad(void)
{
undefined8 uVar1;
if (globalFive == 5) {
uVar1 = helperBad(&UNK_00401324);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,561
|
void CWE416_Use_After_Free__return_freed_ptr_14_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102659/CWE416_Use_After_Free__return_freed_ptr_14.c
|
CWE416_Use_After_Free__return_freed_ptr_14_good
|
void CWE416_Use_After_Free__return_freed_ptr_14_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,562
|
void CWE416_Use_After_Free__return_freed_ptr_15_bad()
{
switch(6)
{
case 6:
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */", '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102660/CWE416_Use_After_Free__return_freed_ptr_15.c
|
CWE416_Use_After_Free__return_freed_ptr_15_bad
|
void CWE416_Use_After_Free__return_freed_ptr_15_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,563
|
void CWE416_Use_After_Free__return_freed_ptr_15_good()
{
good1();
good2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102660/CWE416_Use_After_Free__return_freed_ptr_15.c
|
CWE416_Use_After_Free__return_freed_ptr_15_good
|
void CWE416_Use_After_Free__return_freed_ptr_15_good(void)
{
good1();
good2();
return;
}
|
['gcc']
|
1,564
|
void CWE416_Use_After_Free__return_freed_ptr_16_bad()
{
while(1)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
break;
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102661/CWE416_Use_After_Free__return_freed_ptr_16.c
|
CWE416_Use_After_Free__return_freed_ptr_16_bad
|
void CWE416_Use_After_Free__return_freed_ptr_16_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,565
|
void CWE416_Use_After_Free__return_freed_ptr_16_good()
{
good1();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102661/CWE416_Use_After_Free__return_freed_ptr_16.c
|
CWE416_Use_After_Free__return_freed_ptr_16_good
|
void CWE416_Use_After_Free__return_freed_ptr_16_good(void)
{
good1();
return;
}
|
['gcc']
|
1,566
|
void CWE416_Use_After_Free__return_freed_ptr_17_bad()
{
int j;
for(j = 0; j < 1; j++)
{
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102662/CWE416_Use_After_Free__return_freed_ptr_17.c
|
CWE416_Use_After_Free__return_freed_ptr_17_bad
|
void CWE416_Use_After_Free__return_freed_ptr_17_bad(void)
{
undefined8 uVar1;
int iStack_c;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
uVar1 = helperBad(&UNK_00401324);
printLine(uVar1);
}
return;
}
|
['gcc']
|
1,567
|
void CWE416_Use_After_Free__return_freed_ptr_17_good()
{
good1();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102662/CWE416_Use_After_Free__return_freed_ptr_17.c
|
CWE416_Use_After_Free__return_freed_ptr_17_good
|
void CWE416_Use_After_Free__return_freed_ptr_17_good(void)
{
good1();
return;
}
|
['gcc']
|
1,568
|
void CWE416_Use_After_Free__return_freed_ptr_18_bad()
{
goto sink;
sink:
{
/* Call the bad helper function */
char * reversedString = helperBad("BadSink");
printLine(reversedString);
/* free(reversedString);
* This call to free() was removed because we want the tool to detect the use after free,
* but we don't want that function to be free(). Essentially we want to avoid a double free
*/
}
}
|
['/* Call the bad helper function */', "/* free(reversedString);\r\n * This call to free() was removed because we want the tool to detect the use after free,\r\n * but we don't want that function to be free(). Essentially we want to avoid a double free\r\n */"]
|
['CWE416']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102663/CWE416_Use_After_Free__return_freed_ptr_18.c
|
CWE416_Use_After_Free__return_freed_ptr_18_bad
|
void CWE416_Use_After_Free__return_freed_ptr_18_bad(void)
{
undefined8 uVar1;
uVar1 = helperBad(&UNK_00401314);
printLine(uVar1);
return;
}
|
['gcc']
|
1,569
|
void CWE416_Use_After_Free__return_freed_ptr_18_good()
{
good1();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102663/CWE416_Use_After_Free__return_freed_ptr_18.c
|
CWE416_Use_After_Free__return_freed_ptr_18_good
|
void CWE416_Use_After_Free__return_freed_ptr_18_good(void)
{
good1();
return;
}
|
['gcc']
|
1,570
|
void CWE426_Untrusted_Search_Path__char_popen_08_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(staticReturnsTrue())
{
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
}
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102671/CWE426_Untrusted_Search_Path__char_popen_08.c
|
CWE426_Untrusted_Search_Path__char_popen_08_bad
|
void CWE426_Untrusted_Search_Path__char_popen_08_bad(void)
{
undefined8 *puVar1;
int iVar2;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined4 uStack_28;
long lStack_18;
undefined8 *puStack_10;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
puStack_10 = &uStack_88;
iVar2 = staticReturnsTrue();
puVar1 = puStack_10;
if (iVar2 != 0) {
*(undefined4 *)puStack_10 = 0x2d20736c;
*(undefined2 *)((long)puVar1 + 4) = 0x616c;
*(undefined *)((long)puVar1 + 6) = 0;
}
lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401224);
if (lStack_18 != 0) {
func_0x00400a50(lStack_18);
}
return;
}
|
['gcc']
|
1,571
|
void CWE426_Untrusted_Search_Path__char_popen_08_good()
{
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102671/CWE426_Untrusted_Search_Path__char_popen_08.c
|
CWE426_Untrusted_Search_Path__char_popen_08_good
|
void CWE426_Untrusted_Search_Path__char_popen_08_good(void)
{
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,572
|
void CWE426_Untrusted_Search_Path__char_popen_11_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalReturnsTrue())
{
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
}
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102674/CWE426_Untrusted_Search_Path__char_popen_11.c
|
CWE426_Untrusted_Search_Path__char_popen_11_bad
|
void CWE426_Untrusted_Search_Path__char_popen_11_bad(void)
{
undefined8 *puVar1;
int iVar2;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined4 uStack_28;
long lStack_18;
undefined8 *puStack_10;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
puStack_10 = &uStack_88;
iVar2 = globalReturnsTrue();
puVar1 = puStack_10;
if (iVar2 != 0) {
*(undefined4 *)puStack_10 = 0x2d20736c;
*(undefined2 *)((long)puVar1 + 4) = 0x616c;
*(undefined *)((long)puVar1 + 6) = 0;
}
lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401214);
if (lStack_18 != 0) {
func_0x00400a50(lStack_18);
}
return;
}
|
['gcc']
|
1,573
|
void CWE426_Untrusted_Search_Path__char_popen_11_good()
{
goodG2B1();
goodG2B2();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102674/CWE426_Untrusted_Search_Path__char_popen_11.c
|
CWE426_Untrusted_Search_Path__char_popen_11_good
|
void CWE426_Untrusted_Search_Path__char_popen_11_good(void)
{
goodG2B1();
goodG2B2();
return;
}
|
['gcc']
|
1,574
|
void CWE426_Untrusted_Search_Path__char_popen_12_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
if(globalReturnsTrueOrFalse())
{
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
}
else
{
/* FIX: full path is specified */
strcpy(data, GOOD_OS_COMMAND);
}
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* FLAW: the full path is not specified */', '/* FIX: full path is specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102675/CWE426_Untrusted_Search_Path__char_popen_12.c
|
CWE426_Untrusted_Search_Path__char_popen_12_bad
|
void CWE426_Untrusted_Search_Path__char_popen_12_bad(void)
{
undefined8 *puVar1;
int iVar2;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined4 uStack_28;
long lStack_18;
undefined8 *puStack_10;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
puStack_10 = &uStack_88;
iVar2 = globalReturnsTrueOrFalse();
puVar1 = puStack_10;
if (iVar2 == 0) {
*puStack_10 = 0x6e69622f7273752f;
puVar1[1] = 0x616c2d20736c2f;
}
else {
*(undefined4 *)puStack_10 = 0x2d20736c;
*(undefined2 *)((long)puVar1 + 4) = 0x616c;
*(undefined *)((long)puVar1 + 6) = 0;
}
lStack_18 = func_0x00400ad0(puStack_10,&UNK_00401234);
if (lStack_18 != 0) {
func_0x00400a50(lStack_18);
}
return;
}
|
['gcc']
|
1,575
|
void CWE426_Untrusted_Search_Path__char_popen_12_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102675/CWE426_Untrusted_Search_Path__char_popen_12.c
|
CWE426_Untrusted_Search_Path__char_popen_12_good
|
void CWE426_Untrusted_Search_Path__char_popen_12_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,576
|
void CWE426_Untrusted_Search_Path__char_popen_17_bad()
{
int i;
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
for(i = 0; i < 1; i++)
{
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
}
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102680/CWE426_Untrusted_Search_Path__char_popen_17.c
|
CWE426_Untrusted_Search_Path__char_popen_17_bad
|
void CWE426_Untrusted_Search_Path__char_popen_17_bad(void)
{
undefined8 *puVar1;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined4 uStack_28;
long lStack_20;
undefined8 *puStack_18;
int iStack_c;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
puStack_18 = &uStack_88;
for (iStack_c = 0; puVar1 = puStack_18, iStack_c < 1; iStack_c = iStack_c + 1) {
*(undefined4 *)puStack_18 = 0x2d20736c;
*(undefined2 *)((long)puVar1 + 4) = 0x616c;
*(undefined *)((long)puVar1 + 6) = 0;
}
lStack_20 = func_0x00400ad0(puStack_18,&UNK_00401214);
if (lStack_20 != 0) {
func_0x00400a50(lStack_20);
}
return;
}
|
['gcc']
|
1,577
|
void CWE426_Untrusted_Search_Path__char_popen_17_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102680/CWE426_Untrusted_Search_Path__char_popen_17.c
|
CWE426_Untrusted_Search_Path__char_popen_17_good
|
void CWE426_Untrusted_Search_Path__char_popen_17_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,578
|
void CWE426_Untrusted_Search_Path__char_popen_31_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
{
char * dataCopy = data;
char * data = dataCopy;
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102684/CWE426_Untrusted_Search_Path__char_popen_31.c
|
CWE426_Untrusted_Search_Path__char_popen_31_bad
|
void CWE426_Untrusted_Search_Path__char_popen_31_bad(void)
{
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined4 uStack_38;
long lStack_28;
undefined8 *puStack_20;
undefined8 *puStack_18;
undefined8 *puStack_10;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
puStack_20 = &uStack_98;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._6_1_ = 0;
puStack_18 = puStack_20;
puStack_10 = puStack_20;
lStack_28 = func_0x00400ad0(puStack_20,&UNK_00401224);
if (lStack_28 != 0) {
func_0x00400a50(lStack_28);
}
return;
}
|
['gcc']
|
1,579
|
void CWE426_Untrusted_Search_Path__char_popen_31_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102684/CWE426_Untrusted_Search_Path__char_popen_31.c
|
CWE426_Untrusted_Search_Path__char_popen_31_good
|
void CWE426_Untrusted_Search_Path__char_popen_31_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,580
|
void CWE426_Untrusted_Search_Path__char_popen_32_bad()
{
char * data;
char * *dataPtr1 = &data;
char * *dataPtr2 = &data;
char dataBuffer[100] = "";
data = dataBuffer;
{
char * data = *dataPtr1;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
*dataPtr1 = data;
}
{
char * data = *dataPtr2;
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102685/CWE426_Untrusted_Search_Path__char_popen_32.c
|
CWE426_Untrusted_Search_Path__char_popen_32_bad
|
/* WARNING: Heritage AFTER dead removal. Example location: s0xffffffffffffffc8 : 0x00400c99 */
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE426_Untrusted_Search_Path__char_popen_32_bad(void)
{
undefined8 uStack_a8;
undefined8 uStack_a0;
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined4 uStack_48;
undefined8 *puStack_38;
long lStack_30;
undefined8 *puStack_28;
undefined8 *puStack_20;
undefined8 **ppuStack_18;
undefined8 **ppuStack_10;
ppuStack_10 = &puStack_38;
ppuStack_18 = &puStack_38;
uStack_a8 = 0;
uStack_a0 = 0;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
puStack_38 = &uStack_a8;
puStack_28 = puStack_38;
puStack_20 = puStack_38;
lStack_30 = func_0x00400ad0(puStack_38,&UNK_00401244);
if (lStack_30 != 0) {
func_0x00400a50(lStack_30);
}
return;
}
|
['gcc']
|
1,581
|
void CWE426_Untrusted_Search_Path__char_popen_32_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102685/CWE426_Untrusted_Search_Path__char_popen_32.c
|
CWE426_Untrusted_Search_Path__char_popen_32_good
|
void CWE426_Untrusted_Search_Path__char_popen_32_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,582
|
void CWE426_Untrusted_Search_Path__char_popen_34_bad()
{
char * data;
CWE426_Untrusted_Search_Path__char_popen_34_unionType myUnion;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
myUnion.unionFirst = data;
{
char * data = myUnion.unionSecond;
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
}
|
['/* FLAW: the full path is not specified */', '/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102687/CWE426_Untrusted_Search_Path__char_popen_34.c
|
CWE426_Untrusted_Search_Path__char_popen_34_bad
|
void CWE426_Untrusted_Search_Path__char_popen_34_bad(void)
{
undefined8 uStack_98;
undefined8 uStack_90;
undefined8 uStack_88;
undefined8 uStack_80;
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined4 uStack_38;
undefined8 *puStack_28;
long lStack_20;
undefined8 *puStack_18;
undefined8 *puStack_10;
uStack_98 = 0;
uStack_90 = 0;
uStack_88 = 0;
uStack_80 = 0;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
puStack_28 = &uStack_98;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_98._6_1_ = 0;
puStack_18 = puStack_28;
puStack_10 = puStack_28;
lStack_20 = func_0x00400ad0(puStack_28,&UNK_00401224);
if (lStack_20 != 0) {
func_0x00400a50(lStack_20);
}
return;
}
|
['gcc']
|
1,583
|
void CWE426_Untrusted_Search_Path__char_popen_34_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102687/CWE426_Untrusted_Search_Path__char_popen_34.c
|
CWE426_Untrusted_Search_Path__char_popen_34_good
|
void CWE426_Untrusted_Search_Path__char_popen_34_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,584
|
void CWE426_Untrusted_Search_Path__char_popen_41_badSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
|
CWE426_Untrusted_Search_Path__char_popen_41_badSink
|
void CWE426_Untrusted_Search_Path__char_popen_41_badSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401224);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,585
|
void CWE426_Untrusted_Search_Path__char_popen_41_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
CWE426_Untrusted_Search_Path__char_popen_41_badSink(data);
}
|
['/* FLAW: the full path is not specified */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
|
CWE426_Untrusted_Search_Path__char_popen_41_bad
|
void CWE426_Untrusted_Search_Path__char_popen_41_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._6_1_ = 0;
CWE426_Untrusted_Search_Path__char_popen_41_badSink(puStack_10);
return;
}
|
['gcc']
|
1,586
|
void CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
|
CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink
|
void CWE426_Untrusted_Search_Path__char_popen_41_goodG2BSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401244);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,587
|
void CWE426_Untrusted_Search_Path__char_popen_41_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102688/CWE426_Untrusted_Search_Path__char_popen_41.c
|
CWE426_Untrusted_Search_Path__char_popen_41_good
|
void CWE426_Untrusted_Search_Path__char_popen_41_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,588
|
void CWE426_Untrusted_Search_Path__char_popen_51_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
CWE426_Untrusted_Search_Path__char_popen_51b_badSink(data);
}
|
['/* FLAW: the full path is not specified */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51a.c
|
CWE426_Untrusted_Search_Path__char_popen_51_bad
|
void CWE426_Untrusted_Search_Path__char_popen_51_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._6_1_ = 0;
CWE426_Untrusted_Search_Path__char_popen_51b_badSink(puStack_10);
return;
}
|
['gcc']
|
1,589
|
void CWE426_Untrusted_Search_Path__char_popen_51_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51a.c
|
CWE426_Untrusted_Search_Path__char_popen_51_good
|
void CWE426_Untrusted_Search_Path__char_popen_51_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,590
|
void CWE426_Untrusted_Search_Path__char_popen_51b_badSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51b.c
|
CWE426_Untrusted_Search_Path__char_popen_51b_badSink
|
void CWE426_Untrusted_Search_Path__char_popen_51b_badSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401224);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,591
|
void CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102693/CWE426_Untrusted_Search_Path__char_popen_51b.c
|
CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink
|
void CWE426_Untrusted_Search_Path__char_popen_51b_goodG2BSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401244);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,592
|
void CWE426_Untrusted_Search_Path__char_popen_52_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
CWE426_Untrusted_Search_Path__char_popen_52b_badSink(data);
}
|
['/* FLAW: the full path is not specified */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52a.c
|
CWE426_Untrusted_Search_Path__char_popen_52_bad
|
void CWE426_Untrusted_Search_Path__char_popen_52_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._6_1_ = 0;
CWE426_Untrusted_Search_Path__char_popen_52b_badSink(puStack_10);
return;
}
|
['gcc']
|
1,593
|
void CWE426_Untrusted_Search_Path__char_popen_52_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52a.c
|
CWE426_Untrusted_Search_Path__char_popen_52_good
|
void CWE426_Untrusted_Search_Path__char_popen_52_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
1,594
|
void CWE426_Untrusted_Search_Path__char_popen_52b_badSink(char * data)
{
CWE426_Untrusted_Search_Path__char_popen_52c_badSink(data);
}
|
[]
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52b.c
|
CWE426_Untrusted_Search_Path__char_popen_52b_badSink
|
void CWE426_Untrusted_Search_Path__char_popen_52b_badSink(undefined8 param_1)
{
CWE426_Untrusted_Search_Path__char_popen_52c_badSink(param_1);
return;
}
|
['gcc']
|
1,595
|
void CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink(char * data)
{
CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(data);
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52b.c
|
CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink
|
void CWE426_Untrusted_Search_Path__char_popen_52b_goodG2BSink(undefined8 param_1)
{
CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(param_1);
return;
}
|
['gcc']
|
1,596
|
void CWE426_Untrusted_Search_Path__char_popen_52c_badSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52c.c
|
CWE426_Untrusted_Search_Path__char_popen_52c_badSink
|
void CWE426_Untrusted_Search_Path__char_popen_52c_badSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401244);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,597
|
void CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(char * data)
{
{
FILE *pipe;
/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable
* can allow an attacker to run their own program */
pipe = POPEN(data, "wb");
if (pipe != NULL)
{
PCLOSE(pipe);
}
}
}
|
['/* POTENTIAL FLAW: Executing the popen() function without specifying the full path to the executable\r\n * can allow an attacker to run their own program */']
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102694/CWE426_Untrusted_Search_Path__char_popen_52c.c
|
CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink
|
void CWE426_Untrusted_Search_Path__char_popen_52c_goodG2BSink(undefined8 param_1)
{
long lVar1;
lVar1 = func_0x00400ad0(param_1,&UNK_00401254);
if (lVar1 != 0) {
func_0x00400a50(lVar1);
}
return;
}
|
['gcc']
|
1,598
|
void CWE426_Untrusted_Search_Path__char_popen_53_bad()
{
char * data;
char dataBuffer[100] = "";
data = dataBuffer;
/* FLAW: the full path is not specified */
strcpy(data, BAD_OS_COMMAND);
CWE426_Untrusted_Search_Path__char_popen_53b_badSink(data);
}
|
['/* FLAW: the full path is not specified */']
|
['CWE426']
|
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102695/CWE426_Untrusted_Search_Path__char_popen_53a.c
|
CWE426_Untrusted_Search_Path__char_popen_53_bad
|
void CWE426_Untrusted_Search_Path__char_popen_53_bad(void)
{
undefined8 uStack_78;
undefined8 uStack_70;
undefined8 uStack_68;
undefined8 uStack_60;
undefined8 uStack_58;
undefined8 uStack_50;
undefined8 uStack_48;
undefined8 uStack_40;
undefined8 uStack_38;
undefined8 uStack_30;
undefined8 uStack_28;
undefined8 uStack_20;
undefined4 uStack_18;
undefined8 *puStack_10;
uStack_78 = 0;
uStack_70 = 0;
uStack_68 = 0;
uStack_60 = 0;
uStack_58 = 0;
uStack_50 = 0;
uStack_48 = 0;
uStack_40 = 0;
uStack_38 = 0;
uStack_30 = 0;
uStack_28 = 0;
uStack_20 = 0;
uStack_18 = 0;
puStack_10 = &uStack_78;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._0_4_ = 0x2d20736c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._4_2_ = 0x616c;
/* WARNING: Ignoring partial resolution of indirect */
uStack_78._6_1_ = 0;
CWE426_Untrusted_Search_Path__char_popen_53b_badSink(puStack_10);
return;
}
|
['gcc']
|
1,599
|
void CWE426_Untrusted_Search_Path__char_popen_53_good()
{
goodG2B();
}
|
[]
| null |
mvd
|
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/102695/CWE426_Untrusted_Search_Path__char_popen_53a.c
|
CWE426_Untrusted_Search_Path__char_popen_53_good
|
void CWE426_Untrusted_Search_Path__char_popen_53_good(void)
{
goodG2B();
return;
}
|
['gcc']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.