Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
3,300
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_16_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104529/CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_16.c
CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_16_good
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_16_good(void) { good1(); return; }
['gcc']
3,301
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_bad() { int j; for(j = 0; j < 1; j++) { { wchar_t dataBuffer[100] = L""; wchar_t * data = dataBuffer; wcscpy(data, L"abcdefghijklmnopqrstuvwxyz"); /* FLAW: Copy overlapping memory regions using memcpy() for which the result is undefined */ memcpy(data + 6, data + 4, 10*sizeof(wchar_t)); printWLine(data); } } }
['/* FLAW: Copy overlapping memory regions using memcpy() for which the result is undefined */']
['CWE475']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104530/CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17.c
CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_bad
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_bad(void) { long lVar1; undefined8 *puVar2; byte bVar3; undefined8 uStack_1a8; undefined8 uStack_1a0; undefined8 auStack_198 [48]; undefined8 *puStack_18; int iStack_c; bVar3 = 0; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { uStack_1a8 = 0; uStack_1a0 = 0; puVar2 = auStack_198; for (lVar1 = 0x30; lVar1 != 0; lVar1 = lVar1 + -1) { *puVar2 = 0; puVar2 = puVar2 + (ulong)bVar3 * -2 + 1; } puStack_18 = &uStack_1a8; func_0x00400a90(puStack_18,&UNK_004011f8); func_0x00400ab0(puStack_18 + 3,puStack_18 + 2,0x28); printWLine(puStack_18); } return; }
['gcc']
3,302
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104530/CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17.c
CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_good
void CWE475_Undefined_Behavior_for_Input_to_API__wchar_t_17_good(void) { good1(); return; }
['gcc']
3,303
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_bad() { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104778/CWE476_NULL_Pointer_Dereference__null_check_after_deref_01.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,304
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104778/CWE476_NULL_Pointer_Dereference__null_check_after_deref_01.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_01_good(void) { good1(); return; }
['gcc']
3,305
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_bad() { if(1) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104779/CWE476_NULL_Pointer_Dereference__null_check_after_deref_02.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,306
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104779/CWE476_NULL_Pointer_Dereference__null_check_after_deref_02.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_02_good(void) { good1(); good2(); return; }
['gcc']
3,307
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_bad() { if(5==5) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104780/CWE476_NULL_Pointer_Dereference__null_check_after_deref_03.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,308
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104780/CWE476_NULL_Pointer_Dereference__null_check_after_deref_03.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_03_good(void) { good1(); good2(); return; }
['gcc']
3,309
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_bad() { if(STATIC_CONST_TRUE) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104781/CWE476_NULL_Pointer_Dereference__null_check_after_deref_04.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,310
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104781/CWE476_NULL_Pointer_Dereference__null_check_after_deref_04.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_04_good(void) { good1(); good2(); return; }
['gcc']
3,311
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_bad() { if(staticTrue) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104782/CWE476_NULL_Pointer_Dereference__null_check_after_deref_05.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_bad(void) { undefined4 *puVar1; if (staticTrue != 0) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,312
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104782/CWE476_NULL_Pointer_Dereference__null_check_after_deref_05.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_05_good(void) { good1(); good2(); return; }
['gcc']
3,313
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_bad() { if(STATIC_CONST_FIVE==5) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104783/CWE476_NULL_Pointer_Dereference__null_check_after_deref_06.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,314
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104783/CWE476_NULL_Pointer_Dereference__null_check_after_deref_06.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_06_good(void) { good1(); good2(); return; }
['gcc']
3,315
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_bad() { if(staticFive==5) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104784/CWE476_NULL_Pointer_Dereference__null_check_after_deref_07.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_bad(void) { undefined4 *puVar1; if (staticFive == 5) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,316
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104784/CWE476_NULL_Pointer_Dereference__null_check_after_deref_07.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_07_good(void) { good1(); good2(); return; }
['gcc']
3,317
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_bad() { if(staticReturnsTrue()) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104785/CWE476_NULL_Pointer_Dereference__null_check_after_deref_08.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_bad(void) { int iVar1; undefined4 *puVar2; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { puVar2 = (undefined4 *)func_0x00400a60(4); *puVar2 = 5; printIntLine(*puVar2); if (puVar2 != (undefined4 *)0x0) { *puVar2 = 10; } printIntLine(*puVar2); } return; }
['gcc']
3,318
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104785/CWE476_NULL_Pointer_Dereference__null_check_after_deref_08.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_08_good(void) { good1(); good2(); return; }
['gcc']
3,319
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_bad() { if(GLOBAL_CONST_TRUE) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104786/CWE476_NULL_Pointer_Dereference__null_check_after_deref_09.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_bad(void) { undefined4 *puVar1; if (GLOBAL_CONST_TRUE != 0) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,320
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104786/CWE476_NULL_Pointer_Dereference__null_check_after_deref_09.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_09_good(void) { good1(); good2(); return; }
['gcc']
3,321
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_bad() { if(globalTrue) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104787/CWE476_NULL_Pointer_Dereference__null_check_after_deref_10.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_bad(void) { undefined4 *puVar1; if (globalTrue != 0) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,322
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104787/CWE476_NULL_Pointer_Dereference__null_check_after_deref_10.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_10_good(void) { good1(); good2(); return; }
['gcc']
3,323
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_bad() { if(globalReturnsTrue()) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104788/CWE476_NULL_Pointer_Dereference__null_check_after_deref_11.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_bad(void) { int iVar1; undefined4 *puVar2; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { puVar2 = (undefined4 *)func_0x00400a60(4); *puVar2 = 5; printIntLine(*puVar2); if (puVar2 != (undefined4 *)0x0) { *puVar2 = 10; } printIntLine(*puVar2); } return; }
['gcc']
3,324
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104788/CWE476_NULL_Pointer_Dereference__null_check_after_deref_11.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_11_good(void) { good1(); good2(); return; }
['gcc']
3,325
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_bad() { if(globalReturnsTrueOrFalse()) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } else { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FIX: Don't check for NULL since we wouldn't reach this line if the pointer was NULL */ *intPointer = 10; printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */', "/* FIX: Don't check for NULL since we wouldn't reach this line if the pointer was NULL */"]
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104789/CWE476_NULL_Pointer_Dereference__null_check_after_deref_12.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_bad(void) { int iVar1; undefined4 *puVar2; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { puVar2 = (undefined4 *)func_0x00400a60(4); *puVar2 = 5; printIntLine(*puVar2); *puVar2 = 10; printIntLine(*puVar2); } else { puVar2 = (undefined4 *)func_0x00400a60(4); *puVar2 = 5; printIntLine(*puVar2); if (puVar2 != (undefined4 *)0x0) { *puVar2 = 10; } printIntLine(*puVar2); } return; }
['gcc']
3,326
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104789/CWE476_NULL_Pointer_Dereference__null_check_after_deref_12.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_12_good(void) { good1(); return; }
['gcc']
3,327
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_bad() { if(GLOBAL_CONST_FIVE==5) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104790/CWE476_NULL_Pointer_Dereference__null_check_after_deref_13.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_bad(void) { undefined4 *puVar1; if (GLOBAL_CONST_FIVE == 5) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,328
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104790/CWE476_NULL_Pointer_Dereference__null_check_after_deref_13.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_13_good(void) { good1(); good2(); return; }
['gcc']
3,329
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_bad() { if(globalFive==5) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104791/CWE476_NULL_Pointer_Dereference__null_check_after_deref_14.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_bad(void) { undefined4 *puVar1; if (globalFive == 5) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,330
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104791/CWE476_NULL_Pointer_Dereference__null_check_after_deref_14.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_14_good(void) { good1(); good2(); return; }
['gcc']
3,331
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_bad() { switch(6) { case 6: { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104792/CWE476_NULL_Pointer_Dereference__null_check_after_deref_15.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,332
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104792/CWE476_NULL_Pointer_Dereference__null_check_after_deref_15.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_15_good(void) { good1(); good2(); return; }
['gcc']
3,333
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_bad() { while(1) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } break; } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104793/CWE476_NULL_Pointer_Dereference__null_check_after_deref_16.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,334
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104793/CWE476_NULL_Pointer_Dereference__null_check_after_deref_16.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_16_good(void) { good1(); return; }
['gcc']
3,335
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_bad() { int j; for(j = 0; j < 1; j++) { { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104794/CWE476_NULL_Pointer_Dereference__null_check_after_deref_17.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_bad(void) { undefined4 *puVar1; int iStack_c; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); } return; }
['gcc']
3,336
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104794/CWE476_NULL_Pointer_Dereference__null_check_after_deref_17.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_17_good(void) { good1(); return; }
['gcc']
3,337
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_bad() { goto sink; sink: { int *intPointer = NULL; intPointer = (int *)malloc(sizeof(int)); *intPointer = 5; printIntLine(*intPointer); /* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */ if (intPointer != NULL) { *intPointer = 10; } printIntLine(*intPointer); } }
['/* FLAW: Check for NULL after dereferencing the pointer. This NULL check is unnecessary. */']
['CWE476']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104795/CWE476_NULL_Pointer_Dereference__null_check_after_deref_18.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_bad
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_bad(void) { undefined4 *puVar1; puVar1 = (undefined4 *)func_0x00400a60(4); *puVar1 = 5; printIntLine(*puVar1); if (puVar1 != (undefined4 *)0x0) { *puVar1 = 10; } printIntLine(*puVar1); return; }
['gcc']
3,338
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/104795/CWE476_NULL_Pointer_Dereference__null_check_after_deref_18.c
CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_good
void CWE476_NULL_Pointer_Dereference__null_check_after_deref_18_good(void) { good1(); return; }
['gcc']
3,339
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_01_bad() { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105009/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_01.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_01_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_01_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,340
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_02_bad() { if(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105010/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_02.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_02_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_02_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,341
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_03_bad() { if(5==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105011/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_03.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_03_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_03_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,342
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_04_bad() { if(STATIC_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105012/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_04.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_04_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_04_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_0040152a,&UNK_00401528); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_00401533); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,343
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_05_bad() { if(staticTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105013/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_05.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_05_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_05_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (staticTrue != 0) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,344
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_06_bad() { if(STATIC_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105014/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_06.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_06_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_06_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_0040152a,&UNK_00401528); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_00401533); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,345
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_07_bad() { if(staticFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105015/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_07.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_07_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_07_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (staticFive == 5) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,346
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_08_bad() { if(staticReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105016/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_08.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_08_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_08_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401536,&UNK_00401534); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040153f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,347
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_09_bad() { if(GLOBAL_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105017/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_09.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_09_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_09_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (GLOBAL_CONST_TRUE != 0) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,348
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_10_bad() { if(globalTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105018/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_10.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_10_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_10_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (globalTrue != 0) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,349
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_11_bad() { if(globalReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105019/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_11.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_11_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_11_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,350
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_13_bad() { if(GLOBAL_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105020/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_13.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_13_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_13_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (GLOBAL_CONST_FIVE == 5) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,351
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_14_bad() { if(globalFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105021/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_14.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_14_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_14_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; if (globalFive == 5) { iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401526,&UNK_00401524); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040152f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } } return; }
['gcc']
3,352
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_15_bad() { switch(6) { case 6: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105022/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_15.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_15_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_15_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,353
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_16_bad() { while(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105023/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_16.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_16_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_16_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,354
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_17_bad() { int j; for(j = 0; j < 1; j++) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105024/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_17.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_17_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_17_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; for (iStack_1c = 0; iStack_1c < 1; iStack_1c = iStack_1c + 1) { iStack_20 = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401536,&UNK_00401534); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040153f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_20 = func_0x00400d80(2,1,6); if (iStack_20 != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_20,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_20,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_20 != -1) { func_0x00400cb0(iStack_20); } } return; }
['gcc']
3,355
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_18_bad() { goto sink; sink: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET connectSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif connectSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (connectSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (connect(connectSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(connectSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (connectSocket != INVALID_SOCKET) { CLOSE_SOCKET(connectSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105025/CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_18.c
CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_18_bad
void CWE506_Embedded_Malicious_Code__file_transfer_connect_socket_18_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_1c; iStack_1c = 0xffffffff; lStack_28 = func_0x00400d40(&UNK_00401516,&UNK_00401514); if (lStack_28 != 0) { lVar2 = func_0x00400ce0(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040151f); auStack_10038[0] = 0; } func_0x00400c50(lStack_28); } iStack_1c = func_0x00400d80(2,1,6); if (iStack_1c != -1) { func_0x00400ca0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400c70(0x6987); iVar1 = func_0x00400d50(iStack_1c,&uStack_38,0x10); if (iVar1 != -1) { uVar3 = func_0x00400c60(auStack_10038); func_0x00400c80(iStack_1c,auStack_10038,uVar3,0); func_0x00400c60(auStack_10038); } } if (iStack_1c != -1) { func_0x00400cb0(iStack_1c); } return; }
['gcc']
3,356
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_01_bad() { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105026/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_01.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_01_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_01_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,357
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_02_bad() { if(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105027/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_02.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_02_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_02_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,358
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_03_bad() { if(5==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105028/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_03.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_03_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_03_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,359
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_04_bad() { if(STATIC_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105029/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_04.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_04_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_04_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_0040161a,&UNK_00401618); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_00401623); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,360
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_05_bad() { if(staticTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105030/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_05.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_05_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_05_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (staticTrue != 0) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,361
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_06_bad() { if(STATIC_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105031/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_06.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_06_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_06_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_0040161a,&UNK_00401618); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_00401623); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,362
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_07_bad() { if(staticFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105032/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_07.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_07_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_07_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (staticFive == 5) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,363
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_08_bad() { if(staticReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105033/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_08.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_08_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_08_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401626,&UNK_00401624); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040162f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,364
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_09_bad() { if(GLOBAL_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105034/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_09.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_09_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_09_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (GLOBAL_CONST_TRUE != 0) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,365
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_10_bad() { if(globalTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105035/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_10.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_10_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_10_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (globalTrue != 0) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,366
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_11_bad() { if(globalReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105036/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_11.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_11_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_11_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,367
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_13_bad() { if(GLOBAL_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105037/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_13.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_13_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_13_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (GLOBAL_CONST_FIVE == 5) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,368
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_14_bad() { if(globalFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105038/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_14.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_14_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_14_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; if (globalFive == 5) { iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } } return; }
['gcc']
3,369
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_15_bad() { switch(6) { case 6: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105039/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_15.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_15_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_15_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,370
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_16_bad() { while(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105040/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_16.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_16_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_16_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,371
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_17_bad() { int j; for(j = 0; j < 1; j++) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105041/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_17.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_17_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_17_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10048 [65536]; undefined2 uStack_48; undefined2 uStack_46; undefined4 uStack_44; long lStack_30; int iStack_24; int iStack_20; int iStack_1c; for (iStack_1c = 0; iStack_1c < 1; iStack_1c = iStack_1c + 1) { iStack_24 = 0xffffffff; iStack_20 = -1; lStack_30 = func_0x00400de0(&UNK_00401616,&UNK_00401614); if (lStack_30 != 0) { lVar2 = func_0x00400d60(auStack_10048,0xffff,lStack_30); if (lVar2 == 0) { printLine(&UNK_0040161f); auStack_10048[0] = 0; } func_0x00400cd0(lStack_30); } iStack_24 = func_0x00400e20(2,1,6); if (iStack_24 != -1) { func_0x00400d20(&uStack_48,0,0x10); uStack_48 = 2; uStack_44 = 0; uStack_46 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_24,&uStack_48,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_24,5), iVar1 != -1)) && (iStack_20 = func_0x00400df0(iStack_24,0,0), iStack_20 != -1)) { uVar3 = func_0x00400ce0(auStack_10048); func_0x00400d00(iStack_20,auStack_10048,uVar3,0); func_0x00400ce0(auStack_10048); } } if (iStack_24 != -1) { func_0x00400d30(iStack_24); } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } } return; }
['gcc']
3,372
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_18_bad() { goto sink; sink: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char contents[65536]; /* Assume file contents is less than 65k to make this test case easier to implement */ FILE * pFile; pFile = fopen(FILENAME, "r"); if (pFile != NULL) { if (fgets(contents, (int)(65535), pFile) == NULL) { printLine("fgets() failed"); /* Restore NUL terminator if fgets fails */ contents[0] = '\0'; } fclose(pFile); } do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FLAW: Send the contents of a file over the network */ if (send(acceptSocket, contents, strlen(contents), 0) != strlen(contents)) { break; } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } }
['/* Assume file contents is less than 65k to make this test case easier to implement */', '/* Restore NUL terminator if fgets fails */', '/* FLAW: Send the contents of a file over the network */']
['CWE506']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105042/CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_18.c
CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_18_bad
void CWE506_Embedded_Malicious_Code__file_transfer_listen_socket_18_bad(void) { int iVar1; long lVar2; undefined8 uVar3; undefined auStack_10038 [65536]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; long lStack_28; int iStack_20; int iStack_1c; iStack_20 = 0xffffffff; iStack_1c = -1; lStack_28 = func_0x00400de0(&UNK_00401606,&UNK_00401604); if (lStack_28 != 0) { lVar2 = func_0x00400d60(auStack_10038,0xffff,lStack_28); if (lVar2 == 0) { printLine(&UNK_0040160f); auStack_10038[0] = 0; } func_0x00400cd0(lStack_28); } iStack_20 = func_0x00400e20(2,1,6); if (iStack_20 != -1) { func_0x00400d20(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cf0(0x6987); iVar1 = func_0x00400dd0(iStack_20,&uStack_38,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400dc0(iStack_20,5), iVar1 != -1)) && (iStack_1c = func_0x00400df0(iStack_20,0,0), iStack_1c != -1)) { uVar3 = func_0x00400ce0(auStack_10038); func_0x00400d00(iStack_1c,auStack_10038,uVar3,0); func_0x00400ce0(auStack_10038); } } if (iStack_20 != -1) { func_0x00400d30(iStack_20); } if (iStack_1c != -1) { func_0x00400d30(iStack_1c); } return; }
['gcc']
3,373
void CWE510_Trapdoor__hostname_based_logic_01_bad() { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105167/CWE510_Trapdoor__hostname_based_logic_01.c
CWE510_Trapdoor__hostname_based_logic_01_bad
void CWE510_Trapdoor__hostname_based_logic_01_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0)) )) { iVar1 = func_0x00400d30(&UNK_004015f4,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401605,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401615,8,0); if (lVar2 == -1) { printLine(&UNK_0040161e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return; }
['gcc']
3,374
void CWE510_Trapdoor__hostname_based_logic_01_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105167/CWE510_Trapdoor__hostname_based_logic_01.c
CWE510_Trapdoor__hostname_based_logic_01_good
void CWE510_Trapdoor__hostname_based_logic_01_good(void) { good1(); return; }
['gcc']
3,375
void CWE510_Trapdoor__hostname_based_logic_02_bad() { if(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105168/CWE510_Trapdoor__hostname_based_logic_02.c
CWE510_Trapdoor__hostname_based_logic_02_bad
void CWE510_Trapdoor__hostname_based_logic_02_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0)) )) { iVar1 = func_0x00400d30(&UNK_004015f4,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401605,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401615,8,0); if (lVar2 == -1) { printLine(&UNK_0040161e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return; }
['gcc']
3,376
void CWE510_Trapdoor__hostname_based_logic_02_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105168/CWE510_Trapdoor__hostname_based_logic_02.c
CWE510_Trapdoor__hostname_based_logic_02_good
void CWE510_Trapdoor__hostname_based_logic_02_good(void) { good1(); good2(); return; }
['gcc']
3,377
void CWE510_Trapdoor__hostname_based_logic_03_bad() { if(5==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105169/CWE510_Trapdoor__hostname_based_logic_03.c
CWE510_Trapdoor__hostname_based_logic_03_bad
void CWE510_Trapdoor__hostname_based_logic_03_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0)) )) { iVar1 = func_0x00400d30(&UNK_004015f4,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401605,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401615,8,0); if (lVar2 == -1) { printLine(&UNK_0040161e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return; }
['gcc']
3,378
void CWE510_Trapdoor__hostname_based_logic_03_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105169/CWE510_Trapdoor__hostname_based_logic_03.c
CWE510_Trapdoor__hostname_based_logic_03_good
void CWE510_Trapdoor__hostname_based_logic_03_good(void) { good1(); good2(); return; }
['gcc']
3,379
void CWE510_Trapdoor__hostname_based_logic_04_bad() { if(STATIC_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105170/CWE510_Trapdoor__hostname_based_logic_04.c
CWE510_Trapdoor__hostname_based_logic_04_bad
void CWE510_Trapdoor__hostname_based_logic_04_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0)) )) { iVar1 = func_0x00400d30(&UNK_0040160c,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_0040161d,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_0040162d,8,0); if (lVar2 == -1) { printLine(&UNK_00401636); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return; }
['gcc']
3,380
void CWE510_Trapdoor__hostname_based_logic_04_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105170/CWE510_Trapdoor__hostname_based_logic_04.c
CWE510_Trapdoor__hostname_based_logic_04_good
void CWE510_Trapdoor__hostname_based_logic_04_good(void) { good1(); good2(); return; }
['gcc']
3,381
void CWE510_Trapdoor__hostname_based_logic_05_bad() { if(staticTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105171/CWE510_Trapdoor__hostname_based_logic_05.c
CWE510_Trapdoor__hostname_based_logic_05_bad
void CWE510_Trapdoor__hostname_based_logic_05_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (staticTrue != 0) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,382
void CWE510_Trapdoor__hostname_based_logic_05_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105171/CWE510_Trapdoor__hostname_based_logic_05.c
CWE510_Trapdoor__hostname_based_logic_05_good
void CWE510_Trapdoor__hostname_based_logic_05_good(void) { good1(); good2(); return; }
['gcc']
3,383
void CWE510_Trapdoor__hostname_based_logic_06_bad() { if(STATIC_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105172/CWE510_Trapdoor__hostname_based_logic_06.c
CWE510_Trapdoor__hostname_based_logic_06_bad
void CWE510_Trapdoor__hostname_based_logic_06_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0)) )) { iVar1 = func_0x00400d30(&UNK_00401608,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401619,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401629,8,0); if (lVar2 == -1) { printLine(&UNK_00401632); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return; }
['gcc']
3,384
void CWE510_Trapdoor__hostname_based_logic_06_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105172/CWE510_Trapdoor__hostname_based_logic_06.c
CWE510_Trapdoor__hostname_based_logic_06_good
void CWE510_Trapdoor__hostname_based_logic_06_good(void) { good1(); good2(); return; }
['gcc']
3,385
void CWE510_Trapdoor__hostname_based_logic_07_bad() { if(staticFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105173/CWE510_Trapdoor__hostname_based_logic_07.c
CWE510_Trapdoor__hostname_based_logic_07_bad
void CWE510_Trapdoor__hostname_based_logic_07_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (staticFive == 5) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,386
void CWE510_Trapdoor__hostname_based_logic_07_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105173/CWE510_Trapdoor__hostname_based_logic_07.c
CWE510_Trapdoor__hostname_based_logic_07_good
void CWE510_Trapdoor__hostname_based_logic_07_good(void) { good1(); good2(); return; }
['gcc']
3,387
void CWE510_Trapdoor__hostname_based_logic_08_bad() { if(staticReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105174/CWE510_Trapdoor__hostname_based_logic_08.c
CWE510_Trapdoor__hostname_based_logic_08_bad
void CWE510_Trapdoor__hostname_based_logic_08_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401624,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401635,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401645,8,0); if (lVar2 == -1) { printLine(&UNK_0040164e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,388
void CWE510_Trapdoor__hostname_based_logic_08_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105174/CWE510_Trapdoor__hostname_based_logic_08.c
CWE510_Trapdoor__hostname_based_logic_08_good
void CWE510_Trapdoor__hostname_based_logic_08_good(void) { good1(); good2(); return; }
['gcc']
3,389
void CWE510_Trapdoor__hostname_based_logic_09_bad() { if(GLOBAL_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105175/CWE510_Trapdoor__hostname_based_logic_09.c
CWE510_Trapdoor__hostname_based_logic_09_bad
void CWE510_Trapdoor__hostname_based_logic_09_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (GLOBAL_CONST_TRUE != 0) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,390
void CWE510_Trapdoor__hostname_based_logic_09_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105175/CWE510_Trapdoor__hostname_based_logic_09.c
CWE510_Trapdoor__hostname_based_logic_09_good
void CWE510_Trapdoor__hostname_based_logic_09_good(void) { good1(); good2(); return; }
['gcc']
3,391
void CWE510_Trapdoor__hostname_based_logic_10_bad() { if(globalTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105176/CWE510_Trapdoor__hostname_based_logic_10.c
CWE510_Trapdoor__hostname_based_logic_10_bad
void CWE510_Trapdoor__hostname_based_logic_10_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (globalTrue != 0) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,392
void CWE510_Trapdoor__hostname_based_logic_10_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105176/CWE510_Trapdoor__hostname_based_logic_10.c
CWE510_Trapdoor__hostname_based_logic_10_good
void CWE510_Trapdoor__hostname_based_logic_10_good(void) { good1(); good2(); return; }
['gcc']
3,393
void CWE510_Trapdoor__hostname_based_logic_11_bad() { if(globalReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105177/CWE510_Trapdoor__hostname_based_logic_11.c
CWE510_Trapdoor__hostname_based_logic_11_bad
void CWE510_Trapdoor__hostname_based_logic_11_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,394
void CWE510_Trapdoor__hostname_based_logic_11_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105177/CWE510_Trapdoor__hostname_based_logic_11.c
CWE510_Trapdoor__hostname_based_logic_11_good
void CWE510_Trapdoor__hostname_based_logic_11_good(void) { good1(); good2(); return; }
['gcc']
3,395
void CWE510_Trapdoor__hostname_based_logic_12_bad() { if(globalReturnsTrueOrFalse()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } else { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* FIX: No host-based logic */ if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */', '/* FIX: No host-based logic */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105178/CWE510_Trapdoor__hostname_based_logic_12.c
CWE510_Trapdoor__hostname_based_logic_12_bad
void CWE510_Trapdoor__hostname_based_logic_12_bad(void) { int iVar1; long lVar2; undefined auStack_488 [32]; undefined auStack_468 [1040]; undefined2 uStack_58; undefined2 uStack_56; undefined4 uStack_54; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_18; int iStack_14; int iStack_10; int iStack_c; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { iStack_14 = 0xffffffff; iStack_10 = -1; iStack_14 = func_0x00400de0(2,1,6); if (iStack_14 != -1) { func_0x00400cd0(&uStack_58,0,0x10); uStack_58 = 2; uStack_54 = 0; uStack_56 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_14,&uStack_58,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_14,5), iVar1 != -1)) && (iStack_10 = func_0x00400da0(iStack_14,0,0), iStack_10 != -1)) && (lVar2 = func_0x00400cb0(iStack_10,&UNK_00401735,8,0), lVar2 == -1)) { printLine(&UNK_0040173e); } } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } } else { uStack_3c = 0x10; iStack_18 = 0xffffffff; iStack_c = -1; iStack_18 = func_0x00400de0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_18,&uStack_28,0x10); if (((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_18,5), iVar1 != -1)) && ((iStack_c = func_0x00400da0(iStack_18,0,0), iStack_c != -1 && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_468,0x401,auStack_488,0x20,2), iVar1 == 0)))))) { iVar1 = func_0x00400d30(&UNK_00401714,auStack_468); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401725,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401735,8,0); if (lVar2 == -1) { printLine(&UNK_0040173e); } } } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,396
void CWE510_Trapdoor__hostname_based_logic_12_good() { good1(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105178/CWE510_Trapdoor__hostname_based_logic_12.c
CWE510_Trapdoor__hostname_based_logic_12_good
void CWE510_Trapdoor__hostname_based_logic_12_good(void) { good1(); return; }
['gcc']
3,397
void CWE510_Trapdoor__hostname_based_logic_13_bad() { if(GLOBAL_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105179/CWE510_Trapdoor__hostname_based_logic_13.c
CWE510_Trapdoor__hostname_based_logic_13_bad
void CWE510_Trapdoor__hostname_based_logic_13_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (GLOBAL_CONST_FIVE == 5) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']
3,398
void CWE510_Trapdoor__hostname_based_logic_13_good() { good1(); good2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105179/CWE510_Trapdoor__hostname_based_logic_13.c
CWE510_Trapdoor__hostname_based_logic_13_good
void CWE510_Trapdoor__hostname_based_logic_13_good(void) { good1(); good2(); return; }
['gcc']
3,399
void CWE510_Trapdoor__hostname_based_logic_14_bad() { if(globalFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif struct sockaddr_in service, acceptService; int acceptServiceLen = sizeof(acceptService); SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char hostname[NI_MAXHOST]; char servInfo[NI_MAXSERV]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(20000); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, 5) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } if (getsockname(acceptSocket, (struct sockaddr *)&acceptService, &acceptServiceLen) == -1) { break; } if (getnameinfo((struct sockaddr *)&acceptService, sizeof(struct sockaddr), hostname, NI_MAXHOST, servInfo, NI_MAXSERV, NI_NUMERICSERV) != 0) { break; } /* FLAW: host-based logic */ if (strcmp("admin.google.com", hostname) == 0) { if (send(acceptSocket, ADMIN_MESSAGE, strlen(ADMIN_MESSAGE), 0) == SOCKET_ERROR) { /* Do not alert user to trapdoor, no action */ break; } } else { if (send(acceptSocket, DEFAULT_MESSAGE, strlen(DEFAULT_MESSAGE), 0) == SOCKET_ERROR) { printLine("Send failed!"); } } } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } }
['/* FLAW: host-based logic */', '/* Do not alert user to trapdoor, no action */']
['CWE510']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/105180/CWE510_Trapdoor__hostname_based_logic_14.c
CWE510_Trapdoor__hostname_based_logic_14_bad
void CWE510_Trapdoor__hostname_based_logic_14_bad(void) { int iVar1; long lVar2; undefined auStack_468 [32]; undefined auStack_448 [1036]; undefined4 uStack_3c; undefined auStack_38 [16]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_10; int iStack_c; if (globalFive == 5) { uStack_3c = 0x10; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400de0(2,1,6); if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400ca0(20000); iVar1 = func_0x00400d90(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d80(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400da0(iStack_10,0,0), iStack_c != -1)) && ((iVar1 = func_0x00400db0(iStack_c,auStack_38,&uStack_3c), iVar1 != -1 && (iVar1 = func_0x00400cf0(auStack_38,0x10,auStack_448,0x401,auStack_468,0x20,2), iVar1 == 0 )))) { iVar1 = func_0x00400d30(&UNK_00401604,auStack_448); if (iVar1 == 0) { func_0x00400cb0(iStack_c,&UNK_00401615,0xf,0); } else { lVar2 = func_0x00400cb0(iStack_c,&UNK_00401625,8,0); if (lVar2 == -1) { printLine(&UNK_0040162e); } } } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } } return; }
['gcc']