Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
7,600
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67_structType myStruct) { int data = myStruct.structFirst; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110543/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400d40((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400c70(puVar1); return; }
['gcc']
7,601
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67_structType myStruct) { int data = myStruct.structFirst; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110543/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,602
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad() { int data; /* Initialize data */ data = -1; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to int */ data = atoi(inputBuffer); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData = data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to int */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad(void) { int iVar1; undefined auStack_36 [14]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_18; int iStack_14; int iStack_10; undefined4 uStack_c; uStack_c = 0xffffffff; iStack_14 = 0xffffffff; iStack_10 = -1; iStack_14 = func_0x00400dd0(2,1,6); if (iStack_14 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_14,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_14,5), iVar1 != -1)) && (iStack_10 = func_0x00400d90(iStack_14,0,0), iStack_10 != -1)) && ((iStack_18 = func_0x00400c80(iStack_10,auStack_36,0xd,0), iStack_18 != -1 && (iStack_18 != 0)))) { auStack_36[iStack_18] = 0; uStack_c = func_0x00400da0(auStack_36); } } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData = uStack_c; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink(); return; }
['gcc']
7,603
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good(void) { goodG2B(); return; }
['gcc']
7,604
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink() { int data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData; puVar2 = (undefined4 *) func_0x00400d40((long) CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400c70(puVar2); return; }
['gcc']
7,605
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink() { int data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData; puVar2 = (undefined4 *) func_0x00400ab0((long) CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,606
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110552/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,607
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110552/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good(void) { goodG2B(); return; }
['gcc']
7,608
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad() { int data; /* Initialize data */ data = -1; if(1) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110553/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,609
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110553/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,610
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad() { int data; /* Initialize data */ data = -1; if(5==5) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110554/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,611
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110554/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,612
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad() { int data; /* Initialize data */ data = -1; if(STATIC_CONST_TRUE) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110555/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_28; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uVar3; uStack_28 = uStack_28 + 1) { puVar4[uStack_28] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,613
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110555/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,614
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad() { int data; /* Initialize data */ data = -1; if(staticTrue) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110556/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (staticTrue != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,615
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110556/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,616
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad() { int data; /* Initialize data */ data = -1; if(STATIC_CONST_FIVE==5) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110557/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_28; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uVar3; uStack_28 = uStack_28 + 1) { puVar4[uStack_28] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,617
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110557/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,618
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad() { int data; /* Initialize data */ data = -1; if(staticFive==5) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110558/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (staticFive == 5) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,619
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110558/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,620
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad() { int data; /* Initialize data */ data = -1; if(staticReturnsTrue()) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110559/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,621
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110559/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,622
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad() { int data; /* Initialize data */ data = -1; if(GLOBAL_CONST_TRUE) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110560/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (GLOBAL_CONST_TRUE != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,623
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110560/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,624
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad() { int data; /* Initialize data */ data = -1; if(globalTrue) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110561/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (globalTrue != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,625
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110561/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,626
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad() { int data; /* Initialize data */ data = -1; if(globalReturnsTrue()) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110562/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,627
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110562/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,628
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad() { int data; /* Initialize data */ data = -1; if(globalReturnsTrueOrFalse()) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } else { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* FIX: Set data to a relatively small number greater than zero */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110563/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { uStack_1c = 0x14; } else { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,629
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110563/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good(void) { goodG2B(); return; }
['gcc']
7,630
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad() { int data; /* Initialize data */ data = -1; if(GLOBAL_CONST_FIVE==5) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110564/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (GLOBAL_CONST_FIVE == 5) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,631
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110564/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,632
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad() { int data; /* Initialize data */ data = -1; if(globalFive==5) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110565/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_1c; uStack_1c = 0xffffffff; if (globalFive == 5) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,633
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110565/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,634
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad() { int data; /* Initialize data */ data = -1; switch(6) { case 6: /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110566/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,635
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110566/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,636
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad() { int data; /* Initialize data */ data = -1; while(1) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); break; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110567/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,637
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110567/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good(void) { goodG2B(); return; }
['gcc']
7,638
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad() { int i; int data; /* Initialize data */ data = -1; for(i = 0; i < 1; i++) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110568/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad(void) { int iVar1; int iVar2; undefined4 *puVar3; ulong uStack_28; uint uStack_20; int iStack_1c; uStack_20 = 0xffffffff; for (iStack_1c = 0; iStack_1c < 1; iStack_1c = iStack_1c + 1) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_20 = func_0x00400ae0(); uStack_20 = uStack_20 ^ iVar1 << 0x1e ^ iVar2 << 0xf; } puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_20 << 2); for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_20; uStack_28 = uStack_28 + 1) { puVar3[uStack_28] = 0; } printIntLine(*puVar3); func_0x00400a20(puVar3); return; }
['gcc']
7,639
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110568/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good(void) { goodG2B(); return; }
['gcc']
7,640
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad() { int data; /* Initialize data */ data = -1; goto source; source: /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110569/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,641
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110569/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good(void) { goodG2B(); return; }
['gcc']
7,642
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad() { int data; /* Initialize data */ data = -1; badStatic = 1; /* true */ data = badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110570/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; badStatic = 1; iVar1 = badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,643
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110570/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,644
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad() { int data; /* Initialize data */ data = -1; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal = 1; /* true */ data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal = 1; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,645
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,646
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); } return data; }
['/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource
uint CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(uint param_1) { int iVar1; int iVar2; uint uStack_1c; uStack_1c = param_1; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal != 0) { iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_1c = func_0x00400ae0(); uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf; } return uStack_1c; }
['gcc']
7,647
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Global) { /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); } else { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } return data; }
['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source(undefined4 param_1) { undefined4 uStack_c; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Global == 0) { uStack_c = 0x14; } else { printLine(&UNK_004012c4); uStack_c = param_1; } return uStack_c; }
['gcc']
7,648
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Global) { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } return data; }
['/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source(undefined4 param_1) { undefined4 uStack_c; uStack_c = param_1; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Global != 0) { uStack_c = 0x14; } return uStack_c; }
['gcc']
7,649
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); { int dataCopy = data; int data = dataCopy; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110572/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,650
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110572/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good(void) { goodG2B(); return; }
['gcc']
7,651
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad() { int data; int *dataPtr1 = &data; int *dataPtr2 = &data; /* Initialize data */ data = -1; { int data = *dataPtr1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); *dataPtr1 = data; } { int data = *dataPtr2; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110573/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad
/* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad(void) { int iVar1; int iVar2; uint uStack_44; undefined4 *puStack_40; uint uStack_38; uint uStack_34; uint *puStack_30; uint *puStack_28; ulong uStack_20; puStack_28 = &uStack_44; puStack_30 = &uStack_44; uStack_44 = 0xffffffff; uStack_34 = 0xffffffff; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uStack_34 = func_0x00400ae0(); uStack_34 = uStack_34 ^ iVar1 << 0x1e ^ iVar2 << 0xf; *puStack_28 = uStack_34; uStack_38 = *puStack_30; puStack_40 = (undefined4 *)func_0x00400ab0((long)(int)uStack_38 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uStack_38; uStack_20 = uStack_20 + 1) { puStack_40[uStack_20] = 0; } printIntLine(*puStack_40); func_0x00400a20(puStack_40); return; }
['gcc']
7,652
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110573/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good(void) { goodG2B(); return; }
['gcc']
7,653
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad() { int data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_unionType myUnion; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); myUnion.unionFirst = data; { int data = myUnion.unionSecond; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110575/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad(void) { int iVar1; int iVar2; uint uVar3; undefined4 *puVar4; ulong uStack_20; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2); for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) { puVar4[uStack_20] = 0; } printIntLine(*puVar4); func_0x00400a20(puVar4); return; }
['gcc']
7,654
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110575/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good(void) { goodG2B(); return; }
['gcc']
7,655
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,656
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink (uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf); return; }
['gcc']
7,657
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,658
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good(void) { goodG2B(); return; }
['gcc']
7,659
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad() { int data; /* Initialize data */ data = -1; data = badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110577/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,660
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110577/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good(void) { goodG2B(); return; }
['gcc']
7,661
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink (uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf); return; }
['gcc']
7,662
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good(void) { goodG2B(); return; }
['gcc']
7,663
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,664
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,665
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink (uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf); return; }
['gcc']
7,666
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good(void) { goodG2B(); return; }
['gcc']
7,667
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(param_1); return; }
['gcc']
7,668
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(param_1); return; }
['gcc']
7,669
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,670
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,671
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink (uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf); return; }
['gcc']
7,672
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good(void) { goodG2B(); return; }
['gcc']
7,673
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(param_1); return; }
['gcc']
7,674
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(param_1); return; }
['gcc']
7,675
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(param_1); return; }
['gcc']
7,676
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(param_1); return; }
['gcc']
7,677
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,678
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,679
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink (uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf); return; }
['gcc']
7,680
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good(void) { goodG2B(); return; }
['gcc']
7,681
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(param_1); return; }
['gcc']
7,682
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(param_1); return; }
['gcc']
7,683
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(param_1); return; }
['gcc']
7,684
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(param_1); return; }
['gcc']
7,685
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(param_1); return; }
['gcc']
7,686
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(param_1); return; }
['gcc']
7,687
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,688
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,689
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad() { int data; /* Initialize data */ data = -1; data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,690
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good(void) { goodG2B(); return; }
['gcc']
7,691
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(int data) { /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); return data; }
['/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource
uint CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(void) { int iVar1; int iVar2; uint uVar3; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); uVar3 = func_0x00400ae0(); return uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf; }
['gcc']
7,692
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource(int data) { /* FIX: Set data to a relatively small number greater than zero */ data = 20; return data; }
['/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource(void) { return 0x14; }
['gcc']
7,693
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad(void) { int iVar1; int iVar2; uint auStack_1c [3]; auStack_1c[0] = 0xffffffff; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); auStack_1c[0] = func_0x00400ae0(); auStack_1c[0] = auStack_1c[0] ^ iVar1 << 0x1e ^ iVar2 << 0xf; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(auStack_1c); return; }
['gcc']
7,694
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good(void) { goodG2B(); return; }
['gcc']
7,695
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(int * dataPtr) { int data = *dataPtr; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,696
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink(int * dataPtr) { int data = *dataPtr; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,697
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Set data to a random value */ data = RAND32(); CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(&data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad(void) { int iVar1; int iVar2; uint auStack_1c [3]; auStack_1c[0] = 0xffffffff; iVar1 = func_0x00400ae0(); iVar2 = func_0x00400ae0(); auStack_1c[0] = func_0x00400ae0(); auStack_1c[0] = auStack_1c[0] ^ iVar1 << 0x1e ^ iVar2 << 0xf; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(auStack_1c); return; }
['gcc']
7,698
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good(void) { goodG2B(); return; }
['gcc']
7,699
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ int * dataPtr = (int *)dataVoidPtr; /* dereference dataPtr into data */ int data = (*dataPtr); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']