Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68
values | dataset_name stringclasses 1
value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|
45,100 | void CWE190_Integer_Overflow__int_connect_socket_add_54b_badSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_badSink(data);
} | [] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54b.c | CWE190_Integer_Overflow__int_connect_socket_add_54b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54b_badSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_badSink(param_1);
return;
}
| ['gcc'] |
45,101 | void CWE190_Integer_Overflow__int_connect_socket_add_54b_goodG2BSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54b.c | CWE190_Integer_Overflow__int_connect_socket_add_54b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54b_goodG2BSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
45,102 | void CWE190_Integer_Overflow__int_connect_socket_add_54b_goodB2GSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54b.c | CWE190_Integer_Overflow__int_connect_socket_add_54b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54b_goodB2GSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
45,103 | void CWE190_Integer_Overflow__int_connect_socket_add_54c_badSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_badSink(data);
} | [] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54c.c | CWE190_Integer_Overflow__int_connect_socket_add_54c_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54c_badSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_badSink(param_1);
return;
}
| ['gcc'] |
45,104 | void CWE190_Integer_Overflow__int_connect_socket_add_54c_goodG2BSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54c.c | CWE190_Integer_Overflow__int_connect_socket_add_54c_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54c_goodG2BSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
45,105 | void CWE190_Integer_Overflow__int_connect_socket_add_54c_goodB2GSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54c.c | CWE190_Integer_Overflow__int_connect_socket_add_54c_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54c_goodB2GSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
45,106 | void CWE190_Integer_Overflow__int_connect_socket_add_54d_badSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_badSink(data);
} | [] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54d.c | CWE190_Integer_Overflow__int_connect_socket_add_54d_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54d_badSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_badSink(param_1);
return;
}
| ['gcc'] |
45,107 | void CWE190_Integer_Overflow__int_connect_socket_add_54d_goodG2BSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54d.c | CWE190_Integer_Overflow__int_connect_socket_add_54d_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54d_goodG2BSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
45,108 | void CWE190_Integer_Overflow__int_connect_socket_add_54d_goodB2GSink(int data)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54d.c | CWE190_Integer_Overflow__int_connect_socket_add_54d_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54d_goodB2GSink(undefined4 param_1)
{
CWE190_Integer_Overflow__int_connect_socket_add_54e_goodB2GSink(param_1);
return;
}
| ['gcc'] |
45,109 | void CWE190_Integer_Overflow__int_connect_socket_add_54e_badSink(int data)
{
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54e.c | CWE190_Integer_Overflow__int_connect_socket_add_54e_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54e_badSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,110 | void CWE190_Integer_Overflow__int_connect_socket_add_54e_goodG2BSink(int data)
{
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54e.c | CWE190_Integer_Overflow__int_connect_socket_add_54e_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54e_goodG2BSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,111 | void CWE190_Integer_Overflow__int_connect_socket_add_54e_goodB2GSink(int data)
{
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
printIntLine(result);
}
else
{
printLine("data value is too large to perfor... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83006/CWE190_Integer_Overflow__int_connect_socket_add_54e.c | CWE190_Integer_Overflow__int_connect_socket_add_54e_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_54e_goodB2GSink(int param_1)
{
if (param_1 == 0x7fffffff) {
printLine(&UNK_00401568);
}
else {
printIntLine(param_1 + 1);
}
return;
}
| ['gcc'] |
45,112 | void CWE190_Integer_Overflow__int_connect_socket_add_61_bad()
{
int data;
/* Initialize data */
data = 0;
data = CWE190_Integer_Overflow__int_connect_socket_add_61b_badSource(data);
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83007/CWE190_Integer_Overflow__int_connect_socket_add_61a.c | CWE190_Integer_Overflow__int_connect_socket_add_61_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_61_bad(void)
{
int iVar1;
iVar1 = CWE190_Integer_Overflow__int_connect_socket_add_61b_badSource(0);
printIntLine(iVar1 + 1);
return;
}
| ['gcc'] |
45,113 | void CWE190_Integer_Overflow__int_connect_socket_add_61_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83007/CWE190_Integer_Overflow__int_connect_socket_add_61a.c | CWE190_Integer_Overflow__int_connect_socket_add_61_good |
void CWE190_Integer_Overflow__int_connect_socket_add_61_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,114 | int CWE190_Integer_Overflow__int_connect_socket_add_61b_badSource(int data)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
... | ['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83007/CWE190_Integer_Overflow__int_connect_socket_add_61b.c | CWE190_Integer_Overflow__int_connect_socket_add_61b_badSource |
undefined4 CWE190_Integer_Overflow__int_connect_socket_add_61b_badSource(undefined4 param_1)
{
int iVar1;
undefined4 uStack_3c;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_10;
int iStack_c;
iStack_c = 0xffffffff;
iStack_c = func_0x0040... | ['gcc'] |
45,115 | int CWE190_Integer_Overflow__int_connect_socket_add_61b_goodG2BSource(int data)
{
/* FIX: Use a small, non-zero value that will not cause an integer overflow in the sinks */
data = 2;
return data;
} | ['/* FIX: Use a small, non-zero value that will not cause an integer overflow in the sinks */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83007/CWE190_Integer_Overflow__int_connect_socket_add_61b.c | CWE190_Integer_Overflow__int_connect_socket_add_61b_goodG2BSource |
undefined4 CWE190_Integer_Overflow__int_connect_socket_add_61b_goodG2BSource(void)
{
return 2;
}
| ['gcc'] |
45,116 | int CWE190_Integer_Overflow__int_connect_socket_add_61b_goodB2GSource(int data)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE... | ['/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83007/CWE190_Integer_Overflow__int_connect_socket_add_61b.c | CWE190_Integer_Overflow__int_connect_socket_add_61b_goodB2GSource |
undefined4 CWE190_Integer_Overflow__int_connect_socket_add_61b_goodB2GSource(undefined4 param_1)
{
int iVar1;
undefined4 uStack_3c;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_10;
int iStack_c;
iStack_c = 0xffffffff;
iStack_c = func_0x... | ['gcc'] |
45,117 | void CWE190_Integer_Overflow__int_connect_socket_add_63_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKET;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83009/CWE190_Integer_Overflow__int_connect_socket_add_63a.c | CWE190_Integer_Overflow__int_connect_socket_add_63_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_63_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
undefined4 uStack_14;
int iStack_10;
int iStack_c;
uStack_14 = 0;
iStack_c = 0xffffffff;
iStack_c = func_0x00400cf0(2,1,6... | ['gcc'] |
45,118 | void CWE190_Integer_Overflow__int_connect_socket_add_63_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83009/CWE190_Integer_Overflow__int_connect_socket_add_63a.c | CWE190_Integer_Overflow__int_connect_socket_add_63_good |
void CWE190_Integer_Overflow__int_connect_socket_add_63_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,119 | void CWE190_Integer_Overflow__int_connect_socket_add_63b_badSink(int * dataPtr)
{
int data = *dataPtr;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83009/CWE190_Integer_Overflow__int_connect_socket_add_63b.c | CWE190_Integer_Overflow__int_connect_socket_add_63b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_63b_badSink(int *param_1)
{
printIntLine(*param_1 + 1);
return;
}
| ['gcc'] |
45,120 | void CWE190_Integer_Overflow__int_connect_socket_add_63b_goodG2BSink(int * dataPtr)
{
int data = *dataPtr;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83009/CWE190_Integer_Overflow__int_connect_socket_add_63b.c | CWE190_Integer_Overflow__int_connect_socket_add_63b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_63b_goodG2BSink(int *param_1)
{
printIntLine(*param_1 + 1);
return;
}
| ['gcc'] |
45,121 | void CWE190_Integer_Overflow__int_connect_socket_add_63b_goodB2GSink(int * dataPtr)
{
int data = *dataPtr;
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
printIntLine(result);
}
else
{
printLine("da... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83009/CWE190_Integer_Overflow__int_connect_socket_add_63b.c | CWE190_Integer_Overflow__int_connect_socket_add_63b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_63b_goodB2GSink(int *param_1)
{
if (*param_1 == 0x7fffffff) {
printLine(&UNK_004014e8);
}
else {
printIntLine(*param_1 + 1);
}
return;
}
| ['gcc'] |
45,122 | void CWE190_Integer_Overflow__int_connect_socket_add_64_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKET;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83010/CWE190_Integer_Overflow__int_connect_socket_add_64a.c | CWE190_Integer_Overflow__int_connect_socket_add_64_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_64_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
undefined4 uStack_14;
int iStack_10;
int iStack_c;
uStack_14 = 0;
iStack_c = 0xffffffff;
iStack_c = func_0x00400cf0(2,1,6... | ['gcc'] |
45,123 | void CWE190_Integer_Overflow__int_connect_socket_add_64_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83010/CWE190_Integer_Overflow__int_connect_socket_add_64a.c | CWE190_Integer_Overflow__int_connect_socket_add_64_good |
void CWE190_Integer_Overflow__int_connect_socket_add_64_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,124 | void CWE190_Integer_Overflow__int_connect_socket_add_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
int * dataPtr = (int *)dataVoidPtr;
/* dereference dataPtr into data */
int data = (*dataPtr);
{
/* POTENTIAL FLAW: Adding 1 to data coul... | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83010/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | CWE190_Integer_Overflow__int_connect_socket_add_64b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_64b_badSink(int *param_1)
{
printIntLine(*param_1 + 1);
return;
}
| ['gcc'] |
45,125 | void CWE190_Integer_Overflow__int_connect_socket_add_64b_goodG2BSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
int * dataPtr = (int *)dataVoidPtr;
/* dereference dataPtr into data */
int data = (*dataPtr);
{
/* POTENTIAL FLAW: Adding 1 to data ... | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83010/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | CWE190_Integer_Overflow__int_connect_socket_add_64b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_64b_goodG2BSink(int *param_1)
{
printIntLine(*param_1 + 1);
return;
}
| ['gcc'] |
45,126 | void CWE190_Integer_Overflow__int_connect_socket_add_64b_goodB2GSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
int * dataPtr = (int *)dataVoidPtr;
/* dereference dataPtr into data */
int data = (*dataPtr);
/* FIX: Add a check to prevent an overflow from... | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83010/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | CWE190_Integer_Overflow__int_connect_socket_add_64b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_64b_goodB2GSink(int *param_1)
{
if (*param_1 == 0x7fffffff) {
printLine(&UNK_004014f8);
}
else {
printIntLine(*param_1 + 1);
}
return;
}
| ['gcc'] |
45,127 | void CWE190_Integer_Overflow__int_connect_socket_add_65_bad()
{
int data;
/* define a function pointer */
void (*funcPtr) (int) = CWE190_Integer_Overflow__int_connect_socket_add_65b_badSink;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataIni... | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Con... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83011/CWE190_Integer_Overflow__int_connect_socket_add_65a.c | CWE190_Integer_Overflow__int_connect_socket_add_65_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_65_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_20;
int iStack_1c;
code *pcStack_18;
undefined4 uStack_c;
pcStack_18 = CWE190_Integer_Overflow__int_connect_sock... | ['gcc'] |
45,128 | void CWE190_Integer_Overflow__int_connect_socket_add_65_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83011/CWE190_Integer_Overflow__int_connect_socket_add_65a.c | CWE190_Integer_Overflow__int_connect_socket_add_65_good |
void CWE190_Integer_Overflow__int_connect_socket_add_65_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,129 | void CWE190_Integer_Overflow__int_connect_socket_add_65b_badSink(int data)
{
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83011/CWE190_Integer_Overflow__int_connect_socket_add_65b.c | CWE190_Integer_Overflow__int_connect_socket_add_65b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_65b_badSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,130 | void CWE190_Integer_Overflow__int_connect_socket_add_65b_goodG2BSink(int data)
{
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83011/CWE190_Integer_Overflow__int_connect_socket_add_65b.c | CWE190_Integer_Overflow__int_connect_socket_add_65b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_65b_goodG2BSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,131 | void CWE190_Integer_Overflow__int_connect_socket_add_65b_goodB2GSink(int data)
{
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
printIntLine(result);
}
else
{
printLine("data value is too large to perfor... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83011/CWE190_Integer_Overflow__int_connect_socket_add_65b.c | CWE190_Integer_Overflow__int_connect_socket_add_65b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_65b_goodB2GSink(int param_1)
{
if (param_1 == 0x7fffffff) {
printLine(&UNK_004014e8);
}
else {
printIntLine(param_1 + 1);
}
return;
}
| ['gcc'] |
45,132 | void CWE190_Integer_Overflow__int_connect_socket_add_66_bad()
{
int data;
int dataArray[5];
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSock... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', '/* put data in ar... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83012/CWE190_Integer_Overflow__int_connect_socket_add_66a.c | CWE190_Integer_Overflow__int_connect_socket_add_66_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_66_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined auStack_28 [8];
undefined4 uStack_20;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack... | ['gcc'] |
45,133 | void CWE190_Integer_Overflow__int_connect_socket_add_66_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83012/CWE190_Integer_Overflow__int_connect_socket_add_66a.c | CWE190_Integer_Overflow__int_connect_socket_add_66_good |
void CWE190_Integer_Overflow__int_connect_socket_add_66_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,134 | void CWE190_Integer_Overflow__int_connect_socket_add_66b_badSink(int dataArray[])
{
/* copy data out of dataArray */
int data = dataArray[2];
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* copy data out of dataArray */', '/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83012/CWE190_Integer_Overflow__int_connect_socket_add_66b.c | CWE190_Integer_Overflow__int_connect_socket_add_66b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_66b_badSink(long param_1)
{
printIntLine(*(int *)(param_1 + 8) + 1);
return;
}
| ['gcc'] |
45,135 | void CWE190_Integer_Overflow__int_connect_socket_add_66b_goodG2BSink(int dataArray[])
{
int data = dataArray[2];
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83012/CWE190_Integer_Overflow__int_connect_socket_add_66b.c | CWE190_Integer_Overflow__int_connect_socket_add_66b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_66b_goodG2BSink(long param_1)
{
printIntLine(*(int *)(param_1 + 8) + 1);
return;
}
| ['gcc'] |
45,136 | void CWE190_Integer_Overflow__int_connect_socket_add_66b_goodB2GSink(int dataArray[])
{
int data = dataArray[2];
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
printIntLine(result);
}
else
{
printLi... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83012/CWE190_Integer_Overflow__int_connect_socket_add_66b.c | CWE190_Integer_Overflow__int_connect_socket_add_66b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_66b_goodB2GSink(long param_1)
{
if (*(int *)(param_1 + 8) == 0x7fffffff) {
printLine(&UNK_004014f8);
}
else {
printIntLine(*(int *)(param_1 + 8) + 1);
}
return;
}
| ['gcc'] |
45,137 | void CWE190_Integer_Overflow__int_connect_socket_add_67_bad()
{
int data;
CWE190_Integer_Overflow__int_connect_socket_add_67_structType myStruct;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
s... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83013/CWE190_Integer_Overflow__int_connect_socket_add_67a.c | CWE190_Integer_Overflow__int_connect_socket_add_67_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_67_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
undefined4 uStack_18;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_1... | ['gcc'] |
45,138 | void CWE190_Integer_Overflow__int_connect_socket_add_67_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83013/CWE190_Integer_Overflow__int_connect_socket_add_67a.c | CWE190_Integer_Overflow__int_connect_socket_add_67_good |
void CWE190_Integer_Overflow__int_connect_socket_add_67_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,139 | void CWE190_Integer_Overflow__int_connect_socket_add_67b_badSink(CWE190_Integer_Overflow__int_connect_socket_add_67_structType myStruct)
{
int data = myStruct.structFirst;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
... | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83013/CWE190_Integer_Overflow__int_connect_socket_add_67b.c | CWE190_Integer_Overflow__int_connect_socket_add_67b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_67b_badSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,140 | void CWE190_Integer_Overflow__int_connect_socket_add_67b_goodG2BSink(CWE190_Integer_Overflow__int_connect_socket_add_67_structType myStruct)
{
int data = myStruct.structFirst;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(resul... | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83013/CWE190_Integer_Overflow__int_connect_socket_add_67b.c | CWE190_Integer_Overflow__int_connect_socket_add_67b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_67b_goodG2BSink(int param_1)
{
printIntLine(param_1 + 1);
return;
}
| ['gcc'] |
45,141 | void CWE190_Integer_Overflow__int_connect_socket_add_67b_goodB2GSink(CWE190_Integer_Overflow__int_connect_socket_add_67_structType myStruct)
{
int data = myStruct.structFirst;
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83013/CWE190_Integer_Overflow__int_connect_socket_add_67b.c | CWE190_Integer_Overflow__int_connect_socket_add_67b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_67b_goodB2GSink(int param_1)
{
if (param_1 == 0x7fffffff) {
printLine(&UNK_004014e8);
}
else {
printIntLine(param_1 + 1);
}
return;
}
| ['gcc'] |
45,142 | void CWE190_Integer_Overflow__int_connect_socket_add_68_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKET;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83014/CWE190_Integer_Overflow__int_connect_socket_add_68a.c | CWE190_Integer_Overflow__int_connect_socket_add_68_bad |
void CWE190_Integer_Overflow__int_connect_socket_add_68_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_0x00400cf0(2,1,... | ['gcc'] |
45,143 | void CWE190_Integer_Overflow__int_connect_socket_add_68_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83014/CWE190_Integer_Overflow__int_connect_socket_add_68a.c | CWE190_Integer_Overflow__int_connect_socket_add_68_good |
void CWE190_Integer_Overflow__int_connect_socket_add_68_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,144 | void CWE190_Integer_Overflow__int_connect_socket_add_68b_badSink()
{
int data = CWE190_Integer_Overflow__int_connect_socket_add_68_badData;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83014/CWE190_Integer_Overflow__int_connect_socket_add_68b.c | CWE190_Integer_Overflow__int_connect_socket_add_68b_badSink |
void CWE190_Integer_Overflow__int_connect_socket_add_68b_badSink(void)
{
printIntLine(CWE190_Integer_Overflow__int_connect_socket_add_68_badData + 1);
return;
}
| ['gcc'] |
45,145 | void CWE190_Integer_Overflow__int_connect_socket_add_68b_goodG2BSink()
{
int data = CWE190_Integer_Overflow__int_connect_socket_add_68_goodG2BData;
{
/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */
int result = data + 1;
printIntLine(result);
}
} | ['/* POTENTIAL FLAW: Adding 1 to data could cause an overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83014/CWE190_Integer_Overflow__int_connect_socket_add_68b.c | CWE190_Integer_Overflow__int_connect_socket_add_68b_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_add_68b_goodG2BSink(void)
{
printIntLine(CWE190_Integer_Overflow__int_connect_socket_add_68_goodG2BData + 1);
return;
}
| ['gcc'] |
45,146 | void CWE190_Integer_Overflow__int_connect_socket_add_68b_goodB2GSink()
{
int data = CWE190_Integer_Overflow__int_connect_socket_add_68_goodB2GData;
/* FIX: Add a check to prevent an overflow from occurring */
if (data < INT_MAX)
{
int result = data + 1;
printIntLine(result);
... | ['/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83014/CWE190_Integer_Overflow__int_connect_socket_add_68b.c | CWE190_Integer_Overflow__int_connect_socket_add_68b_goodB2GSink |
void CWE190_Integer_Overflow__int_connect_socket_add_68b_goodB2GSink(void)
{
if (CWE190_Integer_Overflow__int_connect_socket_add_68_goodB2GData == 0x7fffffff) {
printLine(&UNK_004014f8);
}
else {
printIntLine(CWE190_Integer_Overflow__int_connect_socket_add_68_goodB2GData + 1);
}
return;
}
| ['gcc'] |
45,147 | void CWE190_Integer_Overflow__int_connect_socket_multiply_01_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we won'... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83022/CWE190_Integer_Overflow__int_connect_socket_multiply_01.c | CWE190_Integer_Overflow__int_connect_socket_multiply_01_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_01_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,148 | void CWE190_Integer_Overflow__int_connect_socket_multiply_01_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83022/CWE190_Integer_Overflow__int_connect_socket_multiply_01.c | CWE190_Integer_Overflow__int_connect_socket_multiply_01_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_01_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,149 | void CWE190_Integer_Overflow__int_connect_socket_multiply_02_bad()
{
int data;
/* Initialize data */
data = 0;
if(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83023/CWE190_Integer_Overflow__int_connect_socket_multiply_02.c | CWE190_Integer_Overflow__int_connect_socket_multiply_02_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_02_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,150 | void CWE190_Integer_Overflow__int_connect_socket_multiply_02_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83023/CWE190_Integer_Overflow__int_connect_socket_multiply_02.c | CWE190_Integer_Overflow__int_connect_socket_multiply_02_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_02_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,151 | void CWE190_Integer_Overflow__int_connect_socket_multiply_03_bad()
{
int data;
/* Initialize data */
data = 0;
if(5==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83024/CWE190_Integer_Overflow__int_connect_socket_multiply_03.c | CWE190_Integer_Overflow__int_connect_socket_multiply_03_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_03_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,152 | void CWE190_Integer_Overflow__int_connect_socket_multiply_03_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83024/CWE190_Integer_Overflow__int_connect_socket_multiply_03.c | CWE190_Integer_Overflow__int_connect_socket_multiply_03_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_03_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,153 | void CWE190_Integer_Overflow__int_connect_socket_multiply_04_bad()
{
int data;
/* Initialize data */
data = 0;
if(STATIC_CONST_TRUE)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in ... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83025/CWE190_Integer_Overflow__int_connect_socket_multiply_04.c | CWE190_Integer_Overflow__int_connect_socket_multiply_04_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_04_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,154 | void CWE190_Integer_Overflow__int_connect_socket_multiply_04_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83025/CWE190_Integer_Overflow__int_connect_socket_multiply_04.c | CWE190_Integer_Overflow__int_connect_socket_multiply_04_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_04_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,155 | void CWE190_Integer_Overflow__int_connect_socket_multiply_05_bad()
{
int data;
/* Initialize data */
data = 0;
if(staticTrue)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83026/CWE190_Integer_Overflow__int_connect_socket_multiply_05.c | CWE190_Integer_Overflow__int_connect_socket_multiply_05_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_05_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (staticTrue != 0) {
iStack_10 = 0xff... | ['gcc'] |
45,156 | void CWE190_Integer_Overflow__int_connect_socket_multiply_05_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83026/CWE190_Integer_Overflow__int_connect_socket_multiply_05.c | CWE190_Integer_Overflow__int_connect_socket_multiply_05_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_05_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,157 | void CWE190_Integer_Overflow__int_connect_socket_multiply_06_bad()
{
int data;
/* Initialize data */
data = 0;
if(STATIC_CONST_FIVE==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83027/CWE190_Integer_Overflow__int_connect_socket_multiply_06.c | CWE190_Integer_Overflow__int_connect_socket_multiply_06_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_06_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,158 | void CWE190_Integer_Overflow__int_connect_socket_multiply_06_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83027/CWE190_Integer_Overflow__int_connect_socket_multiply_06.c | CWE190_Integer_Overflow__int_connect_socket_multiply_06_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_06_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,159 | void CWE190_Integer_Overflow__int_connect_socket_multiply_07_bad()
{
int data;
/* Initialize data */
data = 0;
if(staticFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in serv... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83028/CWE190_Integer_Overflow__int_connect_socket_multiply_07.c | CWE190_Integer_Overflow__int_connect_socket_multiply_07_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_07_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (staticFive == 5) {
iStack_10 = 0xff... | ['gcc'] |
45,160 | void CWE190_Integer_Overflow__int_connect_socket_multiply_07_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83028/CWE190_Integer_Overflow__int_connect_socket_multiply_07.c | CWE190_Integer_Overflow__int_connect_socket_multiply_07_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_07_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,161 | void CWE190_Integer_Overflow__int_connect_socket_multiply_08_bad()
{
int data;
/* Initialize data */
data = 0;
if(staticReturnsTrue())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_i... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83029/CWE190_Integer_Overflow__int_connect_socket_multiply_08.c | CWE190_Integer_Overflow__int_connect_socket_multiply_08_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_08_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iVar1 = staticReturnsTrue();
if (iVar1 !=... | ['gcc'] |
45,162 | void CWE190_Integer_Overflow__int_connect_socket_multiply_08_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83029/CWE190_Integer_Overflow__int_connect_socket_multiply_08.c | CWE190_Integer_Overflow__int_connect_socket_multiply_08_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_08_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,163 | void CWE190_Integer_Overflow__int_connect_socket_multiply_09_bad()
{
int data;
/* Initialize data */
data = 0;
if(GLOBAL_CONST_TRUE)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in ... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83030/CWE190_Integer_Overflow__int_connect_socket_multiply_09.c | CWE190_Integer_Overflow__int_connect_socket_multiply_09_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_09_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (GLOBAL_CONST_TRUE != 0) {
iStack_10... | ['gcc'] |
45,164 | void CWE190_Integer_Overflow__int_connect_socket_multiply_09_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83030/CWE190_Integer_Overflow__int_connect_socket_multiply_09.c | CWE190_Integer_Overflow__int_connect_socket_multiply_09_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_09_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,165 | void CWE190_Integer_Overflow__int_connect_socket_multiply_10_bad()
{
int data;
/* Initialize data */
data = 0;
if(globalTrue)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83031/CWE190_Integer_Overflow__int_connect_socket_multiply_10.c | CWE190_Integer_Overflow__int_connect_socket_multiply_10_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_10_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (globalTrue != 0) {
iStack_10 = 0xff... | ['gcc'] |
45,166 | void CWE190_Integer_Overflow__int_connect_socket_multiply_10_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83031/CWE190_Integer_Overflow__int_connect_socket_multiply_10.c | CWE190_Integer_Overflow__int_connect_socket_multiply_10_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_10_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,167 | void CWE190_Integer_Overflow__int_connect_socket_multiply_12_bad()
{
int data;
/* Initialize data */
data = 0;
if(globalReturnsTrueOrFalse())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct soc... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', '/* FIX: Use a... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83033/CWE190_Integer_Overflow__int_connect_socket_multiply_12.c | CWE190_Integer_Overflow__int_connect_socket_multiply_12_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_12_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iVar1 = globalReturnsTrueO... | ['gcc'] |
45,168 | void CWE190_Integer_Overflow__int_connect_socket_multiply_12_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83033/CWE190_Integer_Overflow__int_connect_socket_multiply_12.c | CWE190_Integer_Overflow__int_connect_socket_multiply_12_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_12_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
45,169 | void CWE190_Integer_Overflow__int_connect_socket_multiply_13_bad()
{
int data;
/* Initialize data */
data = 0;
if(GLOBAL_CONST_FIVE==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83034/CWE190_Integer_Overflow__int_connect_socket_multiply_13.c | CWE190_Integer_Overflow__int_connect_socket_multiply_13_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_13_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (GLOBAL_CONST_FIVE == 5) {
iStack_10... | ['gcc'] |
45,170 | void CWE190_Integer_Overflow__int_connect_socket_multiply_13_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83034/CWE190_Integer_Overflow__int_connect_socket_multiply_13.c | CWE190_Integer_Overflow__int_connect_socket_multiply_13_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_13_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,171 | void CWE190_Integer_Overflow__int_connect_socket_multiply_14_bad()
{
int data;
/* Initialize data */
data = 0;
if(globalFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in serv... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83035/CWE190_Integer_Overflow__int_connect_socket_multiply_14.c | CWE190_Integer_Overflow__int_connect_socket_multiply_14_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_14_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
if (globalFive == 5) {
iStack_10 = 0xff... | ['gcc'] |
45,172 | void CWE190_Integer_Overflow__int_connect_socket_multiply_14_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83035/CWE190_Integer_Overflow__int_connect_socket_multiply_14.c | CWE190_Integer_Overflow__int_connect_socket_multiply_14_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_14_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,173 | void CWE190_Integer_Overflow__int_connect_socket_multiply_15_bad()
{
int data;
/* Initialize data */
data = 0;
switch(6)
{
case 6:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
S... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', '/* INCIDENTAL: CW... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83036/CWE190_Integer_Overflow__int_connect_socket_multiply_15.c | CWE190_Integer_Overflow__int_connect_socket_multiply_15_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_15_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,174 | void CWE190_Integer_Overflow__int_connect_socket_multiply_15_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83036/CWE190_Integer_Overflow__int_connect_socket_multiply_15.c | CWE190_Integer_Overflow__int_connect_socket_multiply_15_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_15_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
45,175 | void CWE190_Integer_Overflow__int_connect_socket_multiply_16_bad()
{
int data;
/* Initialize data */
data = 0;
while(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83037/CWE190_Integer_Overflow__int_connect_socket_multiply_16.c | CWE190_Integer_Overflow__int_connect_socket_multiply_16_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_16_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,176 | void CWE190_Integer_Overflow__int_connect_socket_multiply_16_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83037/CWE190_Integer_Overflow__int_connect_socket_multiply_16.c | CWE190_Integer_Overflow__int_connect_socket_multiply_16_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_16_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
45,177 | void CWE190_Integer_Overflow__int_connect_socket_multiply_17_bad()
{
int i,j;
int data;
/* Initialize data */
data = 0;
for(i = 0; i < 1; i++)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
stru... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83038/CWE190_Integer_Overflow__int_connect_socket_multiply_17.c | CWE190_Integer_Overflow__int_connect_socket_multiply_17_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_17_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_20;
int iStack_1c;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_14 = 0;
for (iSt... | ['gcc'] |
45,178 | void CWE190_Integer_Overflow__int_connect_socket_multiply_17_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83038/CWE190_Integer_Overflow__int_connect_socket_multiply_17.c | CWE190_Integer_Overflow__int_connect_socket_multiply_17_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_17_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
45,179 | void CWE190_Integer_Overflow__int_connect_socket_multiply_18_bad()
{
int data;
/* Initialize data */
data = 0;
goto source;
source:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET co... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we won'... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83039/CWE190_Integer_Overflow__int_connect_socket_multiply_18.c | CWE190_Integer_Overflow__int_connect_socket_multiply_18_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_18_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_... | ['gcc'] |
45,180 | void CWE190_Integer_Overflow__int_connect_socket_multiply_18_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83039/CWE190_Integer_Overflow__int_connect_socket_multiply_18.c | CWE190_Integer_Overflow__int_connect_socket_multiply_18_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_18_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
45,181 | void CWE190_Integer_Overflow__int_connect_socket_multiply_21_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', '/* true */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83040/CWE190_Integer_Overflow__int_connect_socket_multiply_21.c | CWE190_Integer_Overflow__int_connect_socket_multiply_21_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_21_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_0x00400cf0... | ['gcc'] |
45,182 | void CWE190_Integer_Overflow__int_connect_socket_multiply_21_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83040/CWE190_Integer_Overflow__int_connect_socket_multiply_21.c | CWE190_Integer_Overflow__int_connect_socket_multiply_21_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_21_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
45,183 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', '/* true */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22a.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_0x00400cf0... | ['gcc'] |
45,184 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22a.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
45,185 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_badSink(int data)
{
if(CWE190_Integer_Overflow__int_connect_socket_multiply_22_badGlobal)
{
if(data > 0) /* ensure we won't have an underflow */
{
/* POTENTIAL FLAW: if (data*2) > INT_MAX, this will overflow */
... | ["/* ensure we won't have an underflow */", '/* POTENTIAL FLAW: if (data*2) > INT_MAX, this will overflow */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22b.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_badSink |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_badSink(int param_1)
{
if ((CWE190_Integer_Overflow__int_connect_socket_multiply_22_badGlobal != 0) && (0 < param_1)) {
printIntLine(param_1 * 2);
}
return;
}
| ['gcc'] |
45,186 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G1Sink(int data)
{
if(CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G1Global)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
... | ['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', "/* ensure we won't have an underflow */", '/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22b.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G1Sink |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G1Sink(int param_1)
{
if (CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G1Global == 0) {
if (0 < param_1) {
if (param_1 < 0x3fffffff) {
printIntLine(param_1 * 2);
}
else {
printLine(&UNK_00401670... | ['gcc'] |
45,187 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G2Sink(int data)
{
if(CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G2Global)
{
if(data > 0) /* ensure we won't have an underflow */
{
/* FIX: Add a check to prevent an overflow from occurring */... | ["/* ensure we won't have an underflow */", '/* FIX: Add a check to prevent an overflow from occurring */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22b.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G2Sink |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G2Sink(int param_1)
{
if ((CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodB2G2Global != 0) && (0 < param_1)
) {
if (param_1 < 0x3fffffff) {
printIntLine(param_1 * 2);
}
else {
printLine(&UNK_00401670);
}... | ['gcc'] |
45,188 | void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodG2BSink(int data)
{
if(CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodG2BGlobal)
{
if(data > 0) /* ensure we won't have an underflow */
{
/* POTENTIAL FLAW: if (data*2) > INT_MAX, this will overflow *... | ["/* ensure we won't have an underflow */", '/* POTENTIAL FLAW: if (data*2) > INT_MAX, this will overflow */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83041/CWE190_Integer_Overflow__int_connect_socket_multiply_22b.c | CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodG2BSink |
void CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodG2BSink(int param_1)
{
if ((CWE190_Integer_Overflow__int_connect_socket_multiply_22_goodG2BGlobal != 0) && (0 < param_1))
{
printIntLine(param_1 * 2);
}
return;
}
| ['gcc'] |
45,189 | void CWE190_Integer_Overflow__int_connect_socket_multiply_31_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we won'... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83042/CWE190_Integer_Overflow__int_connect_socket_multiply_31.c | CWE190_Integer_Overflow__int_connect_socket_multiply_31_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_31_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_20;
int iStack_1c;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10... | ['gcc'] |
45,190 | void CWE190_Integer_Overflow__int_connect_socket_multiply_31_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83042/CWE190_Integer_Overflow__int_connect_socket_multiply_31.c | CWE190_Integer_Overflow__int_connect_socket_multiply_31_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_31_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,191 | void CWE190_Integer_Overflow__int_connect_socket_multiply_32_bad()
{
int data;
int *dataPtr1 = &data;
int *dataPtr2 = &data;
/* Initialize data */
data = 0;
{
int data = *dataPtr1;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we ... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83043/CWE190_Integer_Overflow__int_connect_socket_multiply_32.c | CWE190_Integer_Overflow__int_connect_socket_multiply_32_bad |
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE190_Integer_Overflow__int_connect_socket_multiply_32_bad(void)
{
int iVar1;
undefined auStack_56 [14];
undefined2 uStack_48;
undefined2 uStack_46;
undefined4 uStack_44;
int iStack_34;
int iStack_30;
int iStack_2c;
int i... | ['gcc'] |
45,192 | void CWE190_Integer_Overflow__int_connect_socket_multiply_32_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83043/CWE190_Integer_Overflow__int_connect_socket_multiply_32.c | CWE190_Integer_Overflow__int_connect_socket_multiply_32_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_32_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,193 | void CWE190_Integer_Overflow__int_connect_socket_multiply_34_bad()
{
int data;
CWE190_Integer_Overflow__int_connect_socket_multiply_34_unionType myUnion;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */', "/* ensure we won'... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83045/CWE190_Integer_Overflow__int_connect_socket_multiply_34.c | CWE190_Integer_Overflow__int_connect_socket_multiply_34_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_34_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_20;
int iStack_1c;
int iStack_18;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_c = 0;
iStack_10... | ['gcc'] |
45,194 | void CWE190_Integer_Overflow__int_connect_socket_multiply_34_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83045/CWE190_Integer_Overflow__int_connect_socket_multiply_34.c | CWE190_Integer_Overflow__int_connect_socket_multiply_34_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_34_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,195 | void CWE190_Integer_Overflow__int_connect_socket_multiply_41_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83046/CWE190_Integer_Overflow__int_connect_socket_multiply_41.c | CWE190_Integer_Overflow__int_connect_socket_multiply_41_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_41_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_0x00400cf0... | ['gcc'] |
45,196 | void CWE190_Integer_Overflow__int_connect_socket_multiply_41_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83046/CWE190_Integer_Overflow__int_connect_socket_multiply_41.c | CWE190_Integer_Overflow__int_connect_socket_multiply_41_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_41_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
45,197 | void CWE190_Integer_Overflow__int_connect_socket_multiply_44_bad()
{
int data;
/* define a function pointer */
void (*funcPtr) (int) = badSink;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
... | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Con... | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83049/CWE190_Integer_Overflow__int_connect_socket_multiply_44.c | CWE190_Integer_Overflow__int_connect_socket_multiply_44_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_44_bad(void)
{
int iVar1;
undefined auStack_46 [14];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_20;
int iStack_1c;
code *pcStack_18;
undefined4 uStack_c;
pcStack_18 = badSink;
uStack_c = 0;
iStack_1c... | ['gcc'] |
45,198 | void CWE190_Integer_Overflow__int_connect_socket_multiply_44_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83049/CWE190_Integer_Overflow__int_connect_socket_multiply_44.c | CWE190_Integer_Overflow__int_connect_socket_multiply_44_good |
void CWE190_Integer_Overflow__int_connect_socket_multiply_44_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
45,199 | void CWE190_Integer_Overflow__int_connect_socket_multiply_45_bad()
{
int data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET connectSocket = INVALID_SOCKE... | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a connect socket */', '/* Abort on error or the connection was closed, make sure to recv one\r\n * less char than is in the recv_buf in order to append a terminator */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE190'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/83050/CWE190_Integer_Overflow__int_connect_socket_multiply_45.c | CWE190_Integer_Overflow__int_connect_socket_multiply_45_bad |
void CWE190_Integer_Overflow__int_connect_socket_multiply_45_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0;
iStack_10 = 0xffffffff;
iStack_10 = func_0x00400cf0... | ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.