instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
static int stringin(char *txt, int sizemax) { int size; for (size = 0; size < sizemax; size++) { if (fread(txt + size, 1, 1, g_fin) != 1) return ERR_FAIL; if (!txt[size]) break; } return size; }
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2021-32273 - Severity: MEDIUM - CVSS Score: 6.8 Description: mp4read.c: fix stack-buffer-overflow in stringin()/ftypin() Terminate the string read into the stack buffer, fixes #56. Function: stringin File: frontend/mp4read.c Repository: knik0/faad2 Fixed Code:...
[ "CWE-787" ]
CVE-2021-32273
MEDIUM
6.8
knik0/faad2
stringin
frontend/mp4read.c
1073aeef823cafd844704389e9a497c257768e2f
1
Analyze the following code function for security vulnerabilities
static inline bool fuse_is_bad(struct inode *inode) { return unlikely(test_bit(FUSE_I_BAD, &get_fuse_inode(inode)->state)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fuse_is_bad File: fs/fuse/fuse_i.h Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-834" ]
CVE-2021-28950
LOW
2.1
torvalds/linux
fuse_is_bad
fs/fuse/fuse_i.h
775c5033a0d164622d9d10dd0f0a5531639ed3ed
0
Analyze the following code function for security vulnerabilities
bool sock_full(struct pool *pool) { if (strlen(pool->sockbuf)) return true; return (socket_full(pool, 0)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sock_full File: util.c Repository: ckolivas/cgminer The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-4501
HIGH
10
ckolivas/cgminer
sock_full
util.c
e1c5050734123973b99d181c45e74b2cbb00272e
0
Analyze the following code function for security vulnerabilities
void map_engine_on_person_event(person_op_t op, script_t* script) { script_t* old_script; old_script = s_def_person_scripts[op]; s_def_person_scripts[op] = script_ref(script); script_unref(old_script); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: map_engine_on_person_event File: src/minisphere/map_engine.c Repository: spheredev/neosphere The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-1000524
MEDIUM
4.3
spheredev/neosphere
map_engine_on_person_event
src/minisphere/map_engine.c
252c1ca184cb38e1acb917aa0e451c5f08519996
0
Analyze the following code function for security vulnerabilities
static void append_msg_id(struct strbuf *sb, const char *msg_id) { for (;;) { char c = *(msg_id)++; if (!c) break; if (c != '_') strbuf_addch(sb, tolower(c)); else { assert(*msg_id); strbuf_addch(sb, *(msg_id)++); } } strbuf_addstr(sb, ": "); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: append_msg_id File: fsck.c Repository: git The code follows secure coding practices.
[ "CWE-522" ]
CVE-2020-11008
MEDIUM
5
git
append_msg_id
fsck.c
c44088ecc4b0722636e0a305f9608d3047197282
0
Analyze the following code function for security vulnerabilities
static void on_receive(quicly_stream_t *qs, size_t off, const void *input, size_t len) { struct st_h2o_http3_server_stream_t *stream = qs->data; /* save received data (FIXME avoid copying if possible; see hqclient.c) */ h2o_http3_update_recvbuf(&stream->recvbuf.buf, off, input, len); if (stream->read_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: on_receive File: lib/http3/server.c Repository: h2o The code follows secure coding practices.
[ "CWE-908" ]
CVE-2021-43848
MEDIUM
4.3
h2o
on_receive
lib/http3/server.c
8c0eca3
0
Analyze the following code function for security vulnerabilities
static void nfs_writeback_done_full(struct rpc_task *task, void *calldata) { struct nfs_write_data *data = calldata; nfs_writeback_done(task, data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nfs_writeback_done_full File: fs/nfs/write.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2011-4325
MEDIUM
4.9
torvalds/linux
nfs_writeback_done_full
fs/nfs/write.c
1ae88b2e446261c038f2c0c3150ffae142b227a2
0
Analyze the following code function for security vulnerabilities
static struct usb_endpoint_descriptor *hso_get_ep(struct usb_interface *intf, int type, int dir) { int i; struct usb_host_interface *iface = intf->cur_altsetting; struct usb_endpoint_descriptor *endp; for (i = 0; i < iface->desc.bNumEndpoints; i++) { endp = &iface->endpoint[i].desc; if (((endp->bEndpoi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hso_get_ep File: drivers/net/usb/hso.c Repository: kernel/git/netdev/net The code follows secure coding practices.
[ "CWE-200" ]
CVE-2010-3298
LOW
2.1
kernel/git/netdev/net
hso_get_ep
drivers/net/usb/hso.c
7011e660938fc44ed86319c18a5954e95a82ab3e
0
Analyze the following code function for security vulnerabilities
static int dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_enumerated(tvb, offset, actx, tree, hf_index, 16, NULL, FALSE, 0, NULL); return offset; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13 File: epan/dissectors/packet-lte-rrc.c Repository: wireshark The code follows secure coding practices.
[ "CWE-401" ]
CVE-2020-9431
MEDIUM
5
wireshark
dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13
epan/dissectors/packet-lte-rrc.c
086003c9d616906e08bbeeab9c17b3aa4c6ff850
0
Analyze the following code function for security vulnerabilities
static void dtap_cc_release_complete(tvbuff_t *tvb, proto_tree *tree, packet_info *pinfo _U_, guint32 offset, guint len) { guint32 curr_offset; guint32 consumed; guint curr_len; curr_offset = offset; curr_len = len; is_uplink = IS_UPLINK_FALSE; ELEM_OPT_TLV(0x08, GSM_A_PDU_TYPE_DTAP, DE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dtap_cc_release_complete File: epan/dissectors/packet-gsm_a_dtap.c Repository: wireshark The code follows secure coding practices.
[ "CWE-119" ]
CVE-2018-11360
MEDIUM
5
wireshark
dtap_cc_release_complete
epan/dissectors/packet-gsm_a_dtap.c
a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
0
Analyze the following code function for security vulnerabilities
static bool singlespace(struct scanner *s) { int c; switch (s->chr) { case '$': c = getc(s->f); switch (c) { case '\r': crlf(s); /* fallthrough */ case '\n': break; default: ungetc(c, s->f); return false; } /* fallthrough */ case ' ': next(s); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: singlespace File: scan.c Repository: michaelforney/samurai The code follows secure coding practices.
[ "CWE-787" ]
CVE-2019-19795
MEDIUM
6.8
michaelforney/samurai
singlespace
scan.c
8b069471005e6c242795b68ad91c3b9000dad40e
0
Analyze the following code function for security vulnerabilities
int xc_domain_ioport_mapping( xc_interface *xch, uint32_t domid, uint32_t first_gport, uint32_t first_mport, uint32_t nr_ports, uint32_t add_mapping) { DECLARE_DOMCTL; domctl.cmd = XEN_DOMCTL_ioport_mapping; domctl.domain = domid; domctl.u.ioport_mapping.first_gport = first_gpor...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xc_domain_ioport_mapping File: tools/libxc/xc_domain.c Repository: xen-project/xen The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-2752
MEDIUM
4.9
xen-project/xen
xc_domain_ioport_mapping
tools/libxc/xc_domain.c
b10bca0483a1fa74de99807b89b13b27064794e1
0
Analyze the following code function for security vulnerabilities
static gboolean option_allow_cb (const gchar *option_name, const gchar *value, gpointer data, GError **error) { FlatpakContext *context = data; FlatpakContextFeatures feature; feature = flatpak_context_feature_from_string (value, error); if (feature ==...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: option_allow_cb File: common/flatpak-context.c Repository: flatpak The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-21682
MEDIUM
4
flatpak
option_allow_cb
common/flatpak-context.c
445bddeee657fdc8d2a0a1f0de12975400d4fc1a
0
Analyze the following code function for security vulnerabilities
int netlink_attachskb(struct sock *sk, struct sk_buff *skb, long *timeo, struct sock *ssk) { struct netlink_sock *nlk; nlk = nlk_sk(sk); if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf || test_bit(0, &nlk->state)) { DECLARE_WAITQUEUE(wait, current); if (!*timeo) { if (!ssk || netlink_is_ker...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: netlink_attachskb File: net/netlink/af_netlink.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-287" ]
CVE-2012-3520
LOW
1.9
torvalds/linux
netlink_attachskb
net/netlink/af_netlink.c
e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
0
Analyze the following code function for security vulnerabilities
static bool ShouldOptimizeNewClosure(Isolate* isolate, Handle<SharedFunctionInfo> info) { return isolate->use_crankshaft() && !info->is_toplevel() && info->is_compiled() && info->allows_lazy_compilation() && !info->optimization_disabled() && !isolate->DebuggerHas...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ShouldOptimizeNewClosure File: src/factory.cc Repository: chromium The code follows secure coding practices.
[ "CWE-17" ]
CVE-2014-7931
HIGH
7.5
chromium
ShouldOptimizeNewClosure
src/factory.cc
377de64246b3c1449f4e2090622ae1e1691e51ae
0
Analyze the following code function for security vulnerabilities
static void tg3_process_error(struct tg3 *tp) { u32 val; bool real_error = false; if (tg3_flag(tp, ERROR_PROCESSED)) return; /* Check Flow Attention register */ val = tr32(HOSTCC_FLOW_ATTN); if (val & ~HOSTCC_FLOW_ATTN_MBUF_LWM) { netdev_err(tp->dev, "FLOW Attention error. Resetting chip.\n"); real_error...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tg3_process_error File: drivers/net/ethernet/broadcom/tg3.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2013-1929
MEDIUM
4.4
torvalds/linux
tg3_process_error
drivers/net/ethernet/broadcom/tg3.c
715230a44310a8cf66fbfb5a46f9a62a9b2de424
0
Analyze the following code function for security vulnerabilities
bool FormOrFieldsetsToFormData( const blink::WebFormElement* form_element, const blink::WebFormControlElement* form_control_element, const std::vector<blink::WebElement>& fieldsets, const WebVector<WebFormControlElement>& control_elements, ExtractMask extract_mask, FormData* form, FormFieldD...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: FormOrFieldsetsToFormData File: components/autofill/content/renderer/form_autofill_util.cc Repository: chromium The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2016-1690
MEDIUM
5.1
chromium
FormOrFieldsetsToFormData
components/autofill/content/renderer/form_autofill_util.cc
7e112c1563632f57cfa1c4fa964987f823da17fa
0
Analyze the following code function for security vulnerabilities
static void netmon_close(wtap *wth) { netmon_t *netmon = (netmon_t *)wth->priv; if (netmon->frame_table != NULL) { g_free(netmon->frame_table); netmon->frame_table = NULL; } if (netmon->comment_table != NULL) { g_hash_table_destroy(netmon->comment_table); netmon->comment_table = NULL; } if (netmon->pro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: netmon_close File: wiretap/netmon.c Repository: wireshark The code follows secure coding practices.
[ "CWE-763" ]
CVE-2018-6836
HIGH
7.5
wireshark
netmon_close
wiretap/netmon.c
28960d79cca262ac6b974f339697b299a1e28fef
0
Analyze the following code function for security vulnerabilities
void __init check_bugs(void) { identify_boot_cpu(); /* * identify_boot_cpu() initialized SMT support information, let the * core code know. */ cpu_smt_check_topology(); if (!IS_ENABLED(CONFIG_SMP)) { pr_info("CPU: "); print_cpu_info(&boot_cpu_data); } /* * Read the SPEC_CTRL MSR to account for rese...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check_bugs File: arch/x86/kernel/cpu/bugs.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-440" ]
CVE-2020-10767
LOW
1.9
torvalds/linux
check_bugs
arch/x86/kernel/cpu/bugs.c
21998a351512eba4ed5969006f0c55882d995ada
0
Analyze the following code function for security vulnerabilities
void DTLS_RECORD_LAYER_set_saved_w_epoch(RECORD_LAYER *rl, unsigned short e) { if (e == rl->d->w_epoch - 1) { memcpy(rl->d->curr_write_sequence, rl->write_sequence, sizeof(rl->write_sequence)); memcpy(rl->write_sequence, rl->d->last_write_sequence, sizeof(rl->write_sequ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: DTLS_RECORD_LAYER_set_saved_w_epoch File: ssl/record/rec_layer_d1.c Repository: openssl The code follows secure coding practices.
[ "CWE-400" ]
CVE-2016-8610
MEDIUM
5
openssl
DTLS_RECORD_LAYER_set_saved_w_epoch
ssl/record/rec_layer_d1.c
af58be768ebb690f78530f796e92b8ae5c9a4401
0
Analyze the following code function for security vulnerabilities
int tcp_md5_hash_key(struct tcp_md5sig_pool *hp, const struct tcp_md5sig_key *key) { struct scatterlist sg; sg_init_one(&sg, key->key, key->keylen); ahash_request_set_crypt(hp->md5_req, &sg, NULL, key->keylen); return crypto_ahash_update(hp->md5_req); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tcp_md5_hash_key File: net/ipv4/tcp.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-369" ]
CVE-2017-14106
MEDIUM
4.9
torvalds/linux
tcp_md5_hash_key
net/ipv4/tcp.c
499350a5a6e7512d9ed369ed63a4244b6536f4f8
0
Analyze the following code function for security vulnerabilities
bool FrameLoader::prepareForCommit() { PluginScriptForbiddenScope forbidPluginDestructorScripting; DocumentLoader* pdl = m_provisionalDocumentLoader; if (m_frame->document()) { unsigned nodeCount = 0; for (Frame* frame = m_frame; frame; frame = frame->tree().traverseNext()) { if...
Vulnerability Classification: - CWE: CWE-285 - CVE: CVE-2016-1711 - Severity: MEDIUM - CVSS Score: 6.8 Description: Always use FrameNavigationDisabler during DocumentLoader detach. BUG=617495 Review-Url: https://codereview.chromium.org/2079473002 Cr-Commit-Position: refs/heads/master@{#400558} Function: FrameLoade...
[ "CWE-285" ]
CVE-2016-1711
MEDIUM
6.8
chromium
FrameLoader::prepareForCommit
third_party/WebKit/Source/core/loader/FrameLoader.cpp
be655fd4fb9ab3291a855a939496111674037a2f
1
Analyze the following code function for security vulnerabilities
bool GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment( const char* func_name) { Framebuffer* framebuffer = features().chromium_framebuffer_multisample ? framebuffer_state_.bound_read_framebuffer.get() : framebuffer_state_.bound_draw_framebuffer.get(); if (!framebuffer) return true; i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment File: gpu/command_buffer/service/gles2_cmd_decoder.cc Repository: chromium The code follows secure coding practices.
[ "CWE-362" ]
CVE-2015-1234
MEDIUM
6.8
chromium
GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment
gpu/command_buffer/service/gles2_cmd_decoder.cc
181c7400b2bf50ba02ac77149749fb419b4d4797
0
Analyze the following code function for security vulnerabilities
AP4_Result AP4_StsdAtom::InspectFields(AP4_AtomInspector& inspector) { inspector.AddField("entry-count", m_Children.ItemCount()); // inspect children m_Children.Apply(AP4_AtomListInspector(inspector)); return AP4_SUCCESS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: AP4_StsdAtom::InspectFields File: Source/C++/Core/Ap4StsdAtom.cpp Repository: axiomatic-systems/Bento4 The code follows secure coding practices.
[ "CWE-835" ]
CVE-2018-14445
MEDIUM
4.3
axiomatic-systems/Bento4
AP4_StsdAtom::InspectFields
Source/C++/Core/Ap4StsdAtom.cpp
6acb92d0beaebf5bb46ebc1ae94ddc64a5f0f6d5
0
Analyze the following code function for security vulnerabilities
static void f_keys(typval_T *argvars, typval_T *rettv) { dict_list(argvars, rettv, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: f_keys File: src/evalfunc.c Repository: vim The code follows secure coding practices.
[ "CWE-78" ]
CVE-2019-20807
MEDIUM
4.6
vim
f_keys
src/evalfunc.c
8c62a08faf89663e5633dc5036cd8695c80f1075
0
Analyze the following code function for security vulnerabilities
void nft_trans_gc_queue_sync_done(struct nft_trans_gc *trans) { WARN_ON_ONCE(!lockdep_commit_lock_is_held(trans->net)); if (trans->count == 0) { nft_trans_gc_destroy(trans); return; } call_rcu(&trans->rcu, nft_trans_gc_trans_free); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nft_trans_gc_queue_sync_done File: net/netfilter/nf_tables_api.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2023-5197
MEDIUM
6.6
torvalds/linux
nft_trans_gc_queue_sync_done
net/netfilter/nf_tables_api.c
f15f29fd4779be8a418b66e9d52979bb6d6c2325
0
Analyze the following code function for security vulnerabilities
lyd_node * lyd_parse_path(struct ly_ctx *ctx, const char *path, LYD_FORMAT format, int options, ...) { int fd; struct lyd_node *ret; va_list ap; if (!ctx || !path) { LOGARG; return NULL; } fd = open(path, O_RDONLY); if (fd == -1) { LOGERR(ctx, LY_ESYS, "Failed to op...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lyd_parse_path File: src/tree_data.c Repository: CESNET/libyang The code follows secure coding practices.
[ "CWE-119" ]
CVE-2019-20392
MEDIUM
4.3
CESNET/libyang
lyd_parse_path
src/tree_data.c
32fb4993bc8bb49e93e84016af3c10ea53964be5
0
Analyze the following code function for security vulnerabilities
static void adjust_insn_aux_data(struct bpf_verifier_env *env, struct bpf_insn_aux_data *new_data, struct bpf_prog *new_prog, u32 off, u32 cnt) { struct bpf_insn_aux_data *old_data = env->insn_aux_data; struct bpf_insn *insn = new_prog->insnsi; u32 old_seen = old_data[off].seen; u32 prog_len; int i; /*...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: adjust_insn_aux_data File: kernel/bpf/verifier.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-476" ]
CVE-2022-23222
HIGH
7.2
torvalds/linux
adjust_insn_aux_data
kernel/bpf/verifier.c
64620e0a1e712a778095bd35cbb277dc2259281f
0
Analyze the following code function for security vulnerabilities
const struct lys_module * lyp_get_import_module_ns(const struct lys_module *module, const char *ns) { int i; const struct lys_module *mod = NULL; assert(module && ns); if (module->type) { /* the module is actually submodule and to get the namespace, we need the main module */ if (ly_st...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lyp_get_import_module_ns File: src/parser.c Repository: CESNET/libyang The code follows secure coding practices.
[ "CWE-787" ]
CVE-2019-19333
HIGH
7.5
CESNET/libyang
lyp_get_import_module_ns
src/parser.c
f6d684ade99dd37b21babaa8a856f64faa1e2e0d
0
Analyze the following code function for security vulnerabilities
static struct dst_entry *tcp_v6_route_req(const struct sock *sk, struct flowi *fl, const struct request_sock *req, bool *strict) { if (strict) *strict = true; return inet6_csk_route_req(sk, &fl->u.ip6, req, IPPROTO_TCP); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tcp_v6_route_req File: net/ipv6/tcp_ipv6.c Repository: linux-audit/audit-kernel The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-6136
LOW
1.9
linux-audit/audit-kernel
tcp_v6_route_req
net/ipv6/tcp_ipv6.c
45caeaa5ac0b4b11784ac6f932c0ad4c6b67cda0
0
Analyze the following code function for security vulnerabilities
static int SetEccPublicKey(byte* output, ecc_key* key, int with_header) { byte bitString[1 + MAX_LENGTH_SZ + 1]; int algoSz; int curveSz; int bitStringSz; int idx; word32 pubSz = ECC_BUFSIZE; #ifdef WOLFSSL_SMALL_STACK byte* algo = NULL; byte* curve = NULL; byte* pub; #else b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: SetEccPublicKey File: wolfcrypt/src/asn.c Repository: wolfSSL/wolfssl The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-37155
HIGH
7.5
wolfSSL/wolfssl
SetEccPublicKey
wolfcrypt/src/asn.c
73076940af8904f98eee085994c176fe1876b95a
0
Analyze the following code function for security vulnerabilities
static int hso_mux_submit_intr_urb(struct hso_shared_int *shared_int, struct usb_device *usb, gfp_t gfp) { int result; usb_fill_int_urb(shared_int->shared_intr_urb, usb, usb_rcvintpipe(usb, shared_int->intr_endp->bEndpointAddress & 0x7F), shared_int->shared_intr_buf, 1, intr_callback, shar...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hso_mux_submit_intr_urb File: drivers/net/usb/hso.c Repository: kernel/git/netdev/net The code follows secure coding practices.
[ "CWE-200" ]
CVE-2010-3298
LOW
2.1
kernel/git/netdev/net
hso_mux_submit_intr_urb
drivers/net/usb/hso.c
7011e660938fc44ed86319c18a5954e95a82ab3e
0
Analyze the following code function for security vulnerabilities
int equalizer_get_center_frequency(equalizer_context_t *context __unused, int32_t band) { ALOGV("%s: band: %d", __func__, band); return (equalizer_band_freq_range[band][0] + equalizer_band_freq_range[band][1]) / 2; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equalizer_get_center_frequency File: post_proc/equalizer.c Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-0402
MEDIUM
4.3
android
equalizer_get_center_frequency
post_proc/equalizer.c
d72ea85c78a1a68bf99fd5804ad9784b4102fe57
0
Analyze the following code function for security vulnerabilities
PHPAPI char *php_session_create_id(PS_CREATE_SID_ARGS) /* {{{ */ { PHP_MD5_CTX md5_context; PHP_SHA1_CTX sha1_context; #if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH) void *hash_context = NULL; #endif unsigned char *digest; int digest_len; int j; char *buf, *outid; struct timeval tv; zval **array; zva...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2015-6835 - Severity: HIGH - CVSS Score: 7.5 Description: Fix bug #70219 (Use after free vulnerability in session deserializer) Function: php_session_create_id File: ext/session/session.c Repository: php/php-src Fixed Code: PHPAPI char *php_session_create_id(...
[ "CWE-Other" ]
CVE-2015-6835
HIGH
7.5
php/php-src
php_session_create_id
ext/session/session.c
df4bf28f9f104ca3ef78ed94b497859f15b004e5
1
Analyze the following code function for security vulnerabilities
void ext4_da_update_reserve_space(struct inode *inode, int used, int quota_claim) { struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb); struct ext4_inode_info *ei = EXT4_I(inode); spin_lock(&ei->i_block_reservation_lock); trace_ext4_da_update_reserve_space(inode, used, quota_claim); if (unlikely(used > ei->i_re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ext4_da_update_reserve_space File: fs/ext4/inode.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-190" ]
CVE-2021-33631
HIGH
7.8
torvalds/linux
ext4_da_update_reserve_space
fs/ext4/inode.c
5c099c4fdc438014d5893629e70a8ba934433ee8
0
Analyze the following code function for security vulnerabilities
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
Vulnerability Classification: - CWE: CWE-772 - CVE: CVE-2017-11141 - Severity: HIGH - CVSS Score: 7.1 Description: Fix moment when quantum info is acquired to fix issue reported in #469. Function: ReadMATImage File: coders/mat.c Repository: ImageMagick Fixed Code: static Image *ReadMATImage(const ImageInfo *image_in...
[ "CWE-772" ]
CVE-2017-11141
HIGH
7.1
ImageMagick
ReadMATImage
coders/mat.c
353b942bd83da7e1356ba99c942848bd1871ee9f
1
Analyze the following code function for security vulnerabilities
static void vmx_update_emulated_instruction(struct kvm_vcpu *vcpu) { struct vmcs12 *vmcs12 = get_vmcs12(vcpu); struct vcpu_vmx *vmx = to_vmx(vcpu); if (!is_guest_mode(vcpu)) return; /* * Per the SDM, MTF takes priority over debug-trap exceptions besides * TSS T-bit traps and ICEBP (INT1). KVM doesn't emula...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: vmx_update_emulated_instruction File: arch/x86/kvm/vmx/vmx.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-1188" ]
CVE-2022-2196
HIGH
8.8
torvalds/linux
vmx_update_emulated_instruction
arch/x86/kvm/vmx/vmx.c
2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
0
Analyze the following code function for security vulnerabilities
void showTree(const blink::Node* node) { if (node) node->showTreeForThis(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showTree File: third_party/WebKit/Source/core/dom/Node.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-3178
HIGH
7.5
chromium
showTree
third_party/WebKit/Source/core/dom/Node.cpp
0d4a68cad5e80f7a52f1de888be79a554e5df9d7
0
Analyze the following code function for security vulnerabilities
static void pdf_drop_ocg(fz_context *ctx, pdf_ocg_descriptor *desc) { if (!desc) return; pdf_drop_obj(ctx, desc->intent); fz_free(ctx, desc->ocgs); fz_free(ctx, desc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pdf_drop_ocg File: source/pdf/pdf-xref.c Repository: ArtifexSoftware/mupdf The code follows secure coding practices.
[ "CWE-416" ]
CVE-2016-8674
MEDIUM
4.3
ArtifexSoftware/mupdf
pdf_drop_ocg
source/pdf/pdf-xref.c
1e03c06456d997435019fb3526fa2d4be7dbc6ec
0
Analyze the following code function for security vulnerabilities
int security_inode_need_killpriv(struct dentry *dentry) { return security_ops->inode_need_killpriv(dentry); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: security_inode_need_killpriv File: security/security.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2010-1643
MEDIUM
6.9
torvalds/linux
security_inode_need_killpriv
security/security.c
731572d39fcd3498702eda4600db4c43d51e0b26
0
Analyze the following code function for security vulnerabilities
Magick::ErrorRegistry::ErrorRegistry(const std::string& what_) : Error(what_) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Magick::ErrorRegistry::ErrorRegistry File: Magick++/lib/Exception.cpp Repository: ImageMagick The code follows secure coding practices.
[ "CWE-772" ]
CVE-2017-6499
MEDIUM
4.3
ImageMagick
Magick::ErrorRegistry::ErrorRegistry
Magick++/lib/Exception.cpp
3358f060fc182551822576b2c0a8850faab5d543
0
Analyze the following code function for security vulnerabilities
static MonoMethod* mono_reflection_method_on_tb_inst_get_handle (MonoReflectionMethodOnTypeBuilderInst *m) { MonoClass *klass; MonoGenericContext tmp_context; MonoType **type_argv; MonoGenericInst *ginst; MonoMethod *method, *inflated; int count, i; method = inflate_method (m->inst, (MonoObject*)m->mb); klass...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mono_reflection_method_on_tb_inst_get_handle File: mono/metadata/reflection.c Repository: mono The code follows secure coding practices.
[ "CWE-20" ]
CVE-2010-4254
HIGH
7.5
mono
mono_reflection_method_on_tb_inst_get_handle
mono/metadata/reflection.c
4905ef1130feb26c3150b28b97e4a96752e0d399
0
Analyze the following code function for security vulnerabilities
gboolean flatpak_ensure_data_dir (GFile *app_id_dir, GCancellable *cancellable, GError **error) { g_autoptr(GFile) data_dir = g_file_get_child (app_id_dir, "data"); g_autoptr(GFile) cache_dir = g_file_get_child (app_id_dir, "cache"); g_autoptr(GFile) f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flatpak_ensure_data_dir File: common/flatpak-run.c Repository: flatpak The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-28100
MEDIUM
6.5
flatpak
flatpak_ensure_data_dir
common/flatpak-run.c
8e63de9a7d3124f91140fc74f8ca9ed73ed53be9
0
Analyze the following code function for security vulnerabilities
static void usb3_set_p0_con_stop(struct renesas_usb3 *usb3) { usb3_set_p0_con_update_res(usb3, P0_CON_ST_RES_FORCE_NRDY | P0_CON_OT_RES_FORCE_NRDY | P0_CON_IN_RES_FORCE_NRDY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: usb3_set_p0_con_stop File: drivers/usb/gadget/udc/renesas_usb3.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362", "CWE-416" ]
CVE-2023-35828
HIGH
7
torvalds/linux
usb3_set_p0_con_stop
drivers/usb/gadget/udc/renesas_usb3.c
2b947f8769be8b8181dc795fd292d3e7120f5204
0
Analyze the following code function for security vulnerabilities
void rssr_del(GF_Box *s) { gf_free(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rssr_del File: src/isomedia/box_code_base.c Repository: gpac The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-22675
MEDIUM
4.3
gpac
rssr_del
src/isomedia/box_code_base.c
5aa8c4bbd970a3a77517b00528a596063efca1a9
0
Analyze the following code function for security vulnerabilities
static void rcc_reset_callname(REgg *egg) { R_FREE (egg->lang.callname); egg->lang.nargs = 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rcc_reset_callname File: libr/egg/egg_lang.c Repository: radareorg/radare2 The code follows secure coding practices.
[ "CWE-416" ]
CVE-2019-12802
MEDIUM
6.8
radareorg/radare2
rcc_reset_callname
libr/egg/egg_lang.c
93af319e0af787ede96537d46210369f5c24240c
0
Analyze the following code function for security vulnerabilities
MagickExport MagickBooleanType DiscardBlobBytes(Image *image, const MagickSizeType length) { register MagickOffsetType i; size_t quantum; ssize_t count; unsigned char buffer[16384]; assert(image != (Image *) NULL); assert(image->signature == MagickCoreSignature); if (length != (Magic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: DiscardBlobBytes File: magick/blob.c Repository: ImageMagick/ImageMagick6 The code follows secure coding practices.
[ "CWE-416" ]
CVE-2019-14980
MEDIUM
4.3
ImageMagick/ImageMagick6
DiscardBlobBytes
magick/blob.c
614a257295bdcdeda347086761062ac7658b6830
0
Analyze the following code function for security vulnerabilities
int wake_up_state(struct task_struct *p, unsigned int state) { return try_to_wake_up(p, state, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wake_up_state File: kernel/sched/core.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-9903
LOW
2.1
torvalds/linux
wake_up_state
kernel/sched/core.c
4efbc454ba68def5ef285b26ebfcfdb605b52755
0
Analyze the following code function for security vulnerabilities
static freelist_idx_t next_random_slot(union freelist_init_state *state) { return (state->list[state->pos++] + state->rand) % state->count; }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2017-5546 - Severity: HIGH - CVSS Score: 7.2 Description: mm/slab.c: fix SLAB freelist randomization duplicate entries This patch fixes a bug in the freelist randomization code. When a high random number is used, the freelist will contain duplicate entries. ...
[ "CWE-Other" ]
CVE-2017-5546
HIGH
7.2
torvalds/linux
next_random_slot
mm/slab.c
c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
1
Analyze the following code function for security vulnerabilities
CompileResult generateBytecodeForExecution( Module &M, const BytecodeGenerationOptions &genOptions) { std::shared_ptr<Context> context = M.shareContext(); CompileResult result{Success}; if (cl::BytecodeFormat == cl::BytecodeFormatKind::HBC) { result.bytecodeProvider = hbc::BCProviderFromSrc::createBCP...
Vulnerability Classification: - CWE: CWE-681 - CVE: CVE-2022-40138 - Severity: CRITICAL - CVSS Score: 9.8 Description: Re-sync with internal repository (#822) Co-authored-by: Facebook Community Bot <6422482+facebook-github-bot@users.noreply.github.com> Function: generateBytecodeForExecution File: lib/CompilerDriver/...
[ "CWE-681" ]
CVE-2022-40138
CRITICAL
9.8
facebook/hermes
generateBytecodeForExecution
lib/CompilerDriver/CompilerDriver.cpp
6aa825e480d48127b480b08d13adf70033237097
1
Analyze the following code function for security vulnerabilities
bool_t xdr_kadm5_ret_t(XDR *xdrs, kadm5_ret_t *objp) { uint32_t tmp; if (xdrs->x_op == XDR_ENCODE) tmp = (uint32_t) *objp; if (!xdr_u_int32(xdrs, &tmp)) return (FALSE); if (xdrs->x_op == XDR_DECODE) *objp = (kadm5_ret_t) tmp; return (TRUE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xdr_kadm5_ret_t File: src/lib/kadm5/kadm_rpc_xdr.c Repository: krb5 The code follows secure coding practices.
[ "CWE-824" ]
CVE-2023-36054
MEDIUM
6.5
krb5
xdr_kadm5_ret_t
src/lib/kadm5/kadm_rpc_xdr.c
ef08b09c9459551aabbe7924fb176f1583053cdd
0
Analyze the following code function for security vulnerabilities
static ImapResponse ir_msg_att_uid(ImapMboxHandle *h, int c, unsigned seqno) { char buf[12]; c = imap_get_atom(h->sio, buf, sizeof(buf)); if(c!= -1) sio_ungetc(h->sio); CREATE_IMSG_IF_NEEDED(h, seqno); h->msg_cache[seqno-1]->uid = strtol(buf, NULL, 10); return IMR_OK; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ir_msg_att_uid File: libbalsa/imap/imap-handle.c Repository: GNOME/balsa The code follows secure coding practices.
[ "CWE-476" ]
CVE-2020-16118
MEDIUM
5
GNOME/balsa
ir_msg_att_uid
libbalsa/imap/imap-handle.c
4e245d758e1c826a01080d40c22ca8706f0339e5
0
Analyze the following code function for security vulnerabilities
static int dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index, ett_lte_rrc_InterFreqRSTDMeasurementIndication_r1...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs File: epan/dissectors/packet-lte-rrc.c Repository: wireshark The code follows secure coding practices.
[ "CWE-401" ]
CVE-2020-9431
MEDIUM
5
wireshark
dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs
epan/dissectors/packet-lte-rrc.c
086003c9d616906e08bbeeab9c17b3aa4c6ff850
0
Analyze the following code function for security vulnerabilities
void CLASS lin_interpolate() { int code[16][16][32], size=16, *ip, sum[4]; int f, c, x, y, row, col, shift, color; #ifdef DCRAW_VERBOSE if (verbose) fprintf (stderr,_("Bilinear interpolation...\n")); #endif #ifdef LIBRAW_LIBRARY_BUILD RUN_CALLBACK(LIBRAW_PROGRESS_INTERPOLATE,0,3); #endif if (filters == 9) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lin_interpolate File: dcraw/dcraw.c Repository: LibRaw The code follows secure coding practices.
[ "CWE-125" ]
CVE-2017-14608
MEDIUM
6.4
LibRaw
lin_interpolate
dcraw/dcraw.c
d13e8f6d1e987b7491182040a188c16a395f1d21
0
Analyze the following code function for security vulnerabilities
static void do_adjust_special_early(timelib_time* time) { if (time->relative.have_special_relative) { switch (time->relative.special.type) { case TIMELIB_SPECIAL_DAY_OF_WEEK_IN_MONTH: time->d = 1; time->m += time->relative.m; time->relative.m = 0; break; case TIMELIB_SPECIAL_LAST_DAY_OF_WEEK_IN...
Vulnerability Classification: - CWE: CWE-399 - CVE: CVE-2012-0789 - Severity: MEDIUM - CVSS Score: 5.0 Description: - Fixed bug #53502 (strtotime with timezone memory leak). - Fixed bug #52062 (large timestamps with DateTime::getTimestamp and DateTime::setTimestamp). - Fixed bug #51994 (date_parse_from_format is par...
[ "CWE-399" ]
CVE-2012-0789
MEDIUM
5
php/php-src
do_adjust_special_early
ext/date/lib/tm2unixtime.c
4c9fad8b362a7d2b6a94b4961e4b2dc037b2766d
1
Analyze the following code function for security vulnerabilities
ASSStyle *ff_ass_style_get(ASSSplitContext *ctx, const char *style) { ASS *ass = &ctx->ass; int i; if (!style || !*style) style = "Default"; for (i=0; i<ass->styles_count; i++) if (!strcmp(ass->styles[i].name, style)) return ass->styles + i; return NULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ff_ass_style_get File: libavcodec/ass_split.c Repository: ffmpeg The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2012-6615
MEDIUM
4.3
ffmpeg
ff_ass_style_get
libavcodec/ass_split.c
20c121c00747d6c3b0b0f98deeff021171b2ed74
0
Analyze the following code function for security vulnerabilities
static void set_sdma_integrity(struct sdma_engine *sde) { struct hfi1_devdata *dd = sde->dd; write_sde_csr(sde, SD(CHECK_ENABLE), hfi1_pkt_base_sdma_integrity(dd)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: set_sdma_integrity File: drivers/infiniband/hw/hfi1/sdma.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-401" ]
CVE-2019-19065
MEDIUM
4.7
torvalds/linux
set_sdma_integrity
drivers/infiniband/hw/hfi1/sdma.c
34b3be18a04ecdc610aae4c48e5d1b799d8689f6
0
Analyze the following code function for security vulnerabilities
static void pam_settrace() { void *defp; if ((defp = defopen_r(PAM_DEBUG)) != NULL) { char *arg; int code; int facility = LOG_AUTH; pam_debug = PAM_DEBUG_DEFAULT; log_priority = LOG_DEBUG; (void) defcntl_r(DC_SETFLAGS, DC_CASE, defp); if ((arg = defread_r(LOG_PRIORITY, defp)) != NULL) { code = (in...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pam_settrace File: usr/src/lib/libpam/pam_framework.c Repository: illumos/illumos-gate The code follows secure coding practices.
[ "CWE-120" ]
CVE-2020-27678
HIGH
7.5
illumos/illumos-gate
pam_settrace
usr/src/lib/libpam/pam_framework.c
1d276e0b382cf066dae93640746d8b4c54d15452
0
Analyze the following code function for security vulnerabilities
void sqlite3ExprListSetName( Parse *pParse, /* Parsing context */ ExprList *pList, /* List to which to add the span. */ Token *pName, /* Name to be added */ int dequote /* True to cause the name to be dequoted */ ){ assert( pList!=0 || pParse->db->mallocFailed!=0 ); if(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sqlite3ExprListSetName File: src/expr.c Repository: sqlite The code follows secure coding practices.
[ "CWE-476" ]
CVE-2019-19242
MEDIUM
4.3
sqlite
sqlite3ExprListSetName
src/expr.c
57f7ece78410a8aae86aa4625fb7556897db384c
0
Analyze the following code function for security vulnerabilities
void free_bprm(struct linux_binprm *bprm) { free_arg_pages(bprm); if (bprm->cred) { mutex_unlock(&current->signal->cred_guard_mutex); abort_creds(bprm->cred); } kfree(bprm); }
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2012-4530 - Severity: LOW - CVSS Score: 2.1 Description: exec: do not leave bprm->interp on stack If a series of scripts are executed, each triggering module loading via unprintable bytes in the script header, kernel stack contents can leak into the command line...
[ "CWE-200" ]
CVE-2012-4530
LOW
2.1
torvalds/linux
free_bprm
fs/exec.c
b66c5984017533316fd1951770302649baf1aa33
1
Analyze the following code function for security vulnerabilities
bool XMLHttpRequest::canSuspend() const { return !m_loader; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: XMLHttpRequest::canSuspend File: third_party/WebKit/Source/core/xml/XMLHttpRequest.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-399" ]
CVE-2013-2925
MEDIUM
6.8
chromium
XMLHttpRequest::canSuspend
third_party/WebKit/Source/core/xml/XMLHttpRequest.cpp
a276a009de874306899f9c88edb722ae58d313f9
0
Analyze the following code function for security vulnerabilities
static int iax2_poke_peer_s(const void *data) { struct iax2_peer *peer = (struct iax2_peer *)data; peer->pokeexpire = -1; #ifdef SCHED_MULTITHREADED if (schedule_action(__iax2_poke_peer_s, data)) #endif __iax2_poke_peer_s(data); return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: iax2_poke_peer_s File: channels/chan_iax2.c Repository: xrg/asterisk-xrg The code follows secure coding practices.
[ "CWE-287" ]
CVE-2008-1897
MEDIUM
4.3
xrg/asterisk-xrg
iax2_poke_peer_s
channels/chan_iax2.c
10da3dab24e8ca08cf2c983f8d0206e383535b5a
0
Analyze the following code function for security vulnerabilities
static GIOStatus irssi_ssl_close(GIOChannel *handle, GError **gerr) { GIOSSLChannel *chan = (GIOSSLChannel *)handle; return chan->giochan->funcs->io_close(handle, gerr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: irssi_ssl_close File: src/core/network-openssl.c Repository: ensc/irssi-proxy The code follows secure coding practices.
[ "CWE-20" ]
CVE-2010-1155
MEDIUM
6.8
ensc/irssi-proxy
irssi_ssl_close
src/core/network-openssl.c
85bbc05b21678e80423815d2ef1dfe26208491ab
0
Analyze the following code function for security vulnerabilities
static tvbuff_t * clean_telnet_iac(packet_info *pinfo, tvbuff_t *tvb, int offset, int len) { tvbuff_t *telnet_tvb; guint8 *buf; const guint8 *spos; guint8 *dpos; int skip_byte, len_remaining; spos=tvb_get_ptr(tvb, offset, len); buf = (guint8 *)wmem_alloc(pinfo->pool, len); dpo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clean_telnet_iac File: epan/dissectors/packet-cp2179.c Repository: wireshark The code follows secure coding practices.
[ "CWE-369" ]
CVE-2023-2906
MEDIUM
6.5
wireshark
clean_telnet_iac
epan/dissectors/packet-cp2179.c
44dc70cc5aadca91cb8ba3710c59c3651b7b0d4d
0
Analyze the following code function for security vulnerabilities
static void srch_nxtprv(int reverse) { int result; /* *INDENT-OFF* */ static int (*routine[2]) (Buffer *, char *) = { forwardSearch, backwardSearch }; /* *INDENT-ON* */ if (searchRoutine == NULL) { /* FIXME: gettextize? */ disp_message("No previous regular expression", TRUE); return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: srch_nxtprv File: main.c Repository: tats/w3m The code follows secure coding practices.
[ "CWE-59" ]
CVE-2018-6198
LOW
3.3
tats/w3m
srch_nxtprv
main.c
18dcbadf2771cdb0c18509b14e4e73505b242753
0
Analyze the following code function for security vulnerabilities
int dtls1_buffer_message(SSL *s, int is_ccs) { pitem *item; hm_fragment *frag; unsigned char seq64be[8]; /* this function is called immediately after a message has * been serialized */ OPENSSL_assert(s->init_off == 0); frag = dtls1_hm_fragment_new(s->init_num, 0); if (!frag) return 0; memcpy(frag->frag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dtls1_buffer_message File: ssl/d1_both.c Repository: openssl The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-3505
MEDIUM
5
openssl
dtls1_buffer_message
ssl/d1_both.c
bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b
0
Analyze the following code function for security vulnerabilities
OSExchangeData::Provider* OSExchangeData::CreateProvider() { return new OSExchangeDataProviderAuraX11(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: OSExchangeData::CreateProvider File: ui/base/dragdrop/os_exchange_data_provider_aurax11.cc Repository: chromium The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-6660
MEDIUM
5
chromium
OSExchangeData::CreateProvider
ui/base/dragdrop/os_exchange_data_provider_aurax11.cc
1161a49d663dd395bd639549c2dfe7324f847938
0
Analyze the following code function for security vulnerabilities
static int network_dispatch_notification (notification_t *n) /* {{{ */ { int status; assert (n->meta == NULL); status = plugin_notification_meta_add_boolean (n, "network:received", 1); if (status != 0) { ERROR ("network plugin: plugin_notification_meta_add_boolean failed."); plugin_notification_meta...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: network_dispatch_notification File: src/network.c Repository: collectd The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-6254
MEDIUM
6.4
collectd
network_dispatch_notification
src/network.c
b589096f907052b3a4da2b9ccc9b0e2e888dfc18
0
Analyze the following code function for security vulnerabilities
int ocfs2_size_fits_inline_data(struct buffer_head *di_bh, u64 new_size) { struct ocfs2_dinode *di = (struct ocfs2_dinode *)di_bh->b_data; if (new_size <= le16_to_cpu(di->id2.i_data.id_count)) return 1; return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ocfs2_size_fits_inline_data File: fs/ocfs2/aops.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362" ]
CVE-2017-18224
LOW
1.9
torvalds/linux
ocfs2_size_fits_inline_data
fs/ocfs2/aops.c
3e4c56d41eef5595035872a2ec5a483f42e8917f
0
Analyze the following code function for security vulnerabilities
static int smb3_verify_reconfigure_ctx(struct fs_context *fc, struct smb3_fs_context *new_ctx, struct smb3_fs_context *old_ctx) { if (new_ctx->posix_paths != old_ctx->posix_paths) { cifs_errorf(fc, "can not change posixpaths during remount\n"); return -EINVAL; } if (new_ctx->sectype != old_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: smb3_verify_reconfigure_ctx File: fs/smb/client/fs_context.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2023-5345
HIGH
7.8
torvalds/linux
smb3_verify_reconfigure_ctx
fs/smb/client/fs_context.c
e6e43b8aa7cd3c3af686caf0c2e11819a886d705
0
Analyze the following code function for security vulnerabilities
static enum bgp_attr_parse_ret bgp_attr_large_community(struct bgp_attr_parser_args *args) { struct peer *const peer = args->peer; struct attr *const attr = args->attr; const bgp_size_t length = args->length; /* * Large community follows new attribute format. */ if (length == 0) { bgp_attr_set_lcommunity(at...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bgp_attr_large_community File: bgpd/bgp_attr.c Repository: FRRouting/frr The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-46752
MEDIUM
5.9
FRRouting/frr
bgp_attr_large_community
bgpd/bgp_attr.c
b08afc81c60607a4f736f418f2e3eb06087f1a35
0
Analyze the following code function for security vulnerabilities
Result BinaryReaderIR::OnDataSymbol(Index index, uint32_t flags, std::string_view name, Index segment, uint32_t offset, uint32_t size) { i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: BinaryReaderIR::OnDataSymbol File: src/binary-reader-ir.cc Repository: WebAssembly/wabt The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-31670
HIGH
7.5
WebAssembly/wabt
BinaryReaderIR::OnDataSymbol
src/binary-reader-ir.cc
1b3105a132b925a1d300c2f03b3cd213875ffca8
0
Analyze the following code function for security vulnerabilities
static void mqtt_cb(struct mg_connection *c, int ev, void *ev_data, void *fn_data) { if (ev == MG_EV_READ) { for (;;) { uint8_t version = c->is_mqtt5 ? 5 : 4; struct mg_mqtt_message mm; int rc = mg_mqtt_parse(c->recv.buf, c->recv.len, version, &mm); if (rc == MQTT_MALFO...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mqtt_cb File: mongoose.c Repository: cesanta/mongoose The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2905
HIGH
8.8
cesanta/mongoose
mqtt_cb
mongoose.c
aed7b6b37ae189680dce9f5d444c90b4dc8df7a2
0
Analyze the following code function for security vulnerabilities
int X509v3_addr_get_range(IPAddressOrRange *aor, const unsigned afi, unsigned char *min, unsigned char *max, const int length) { int afi_length = length_from_afi(afi); if (aor == NULL || min == NULL || max == NULL || afi_lengt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: X509v3_addr_get_range File: crypto/x509v3/v3_addr.c Repository: openssl The code follows secure coding practices.
[ "CWE-119" ]
CVE-2017-3735
MEDIUM
5
openssl
X509v3_addr_get_range
crypto/x509v3/v3_addr.c
068b963bb7afc57f5bdd723de0dd15e7795d5822
0
Analyze the following code function for security vulnerabilities
BigInt BigInt::operator-() const { BigInt x = (*this); x.flip_sign(); return x; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: BigInt::operator- File: src/lib/math/bigint/bigint.cpp Repository: randombit/botan The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-14737
LOW
2.1
randombit/botan
BigInt::operator-
src/lib/math/bigint/bigint.cpp
2718c02d429d024b2cd65534f7e54cab1d123348
0
Analyze the following code function for security vulnerabilities
static int tty_tiocmget(struct tty_struct *tty, int __user *p) { int retval = -EINVAL; if (tty->ops->tiocmget) { retval = tty->ops->tiocmget(tty); if (retval >= 0) retval = put_user(retval, p); } return retval; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tty_tiocmget File: drivers/tty/tty_io.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-667", "CWE-416" ]
CVE-2020-29660
LOW
2.1
torvalds/linux
tty_tiocmget
drivers/tty/tty_io.c
c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
0
Analyze the following code function for security vulnerabilities
rfbBool rfbSendSupportedEncodings(rfbClientPtr cl) { rfbFramebufferUpdateRectHeader rect; static uint32_t supported[] = { rfbEncodingRaw, rfbEncodingCopyRect, rfbEncodingRRE, rfbEncodingCoRRE, rfbEncodingHextile, #ifdef LIBVNCSERVER_HAVE_LIBZ rfbEncodingZlib, rfbEncodingZRLE, rfbEncodingZYWRLE, #...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rfbSendSupportedEncodings File: libvncserver/rfbserver.c Repository: LibVNC/libvncserver The code follows secure coding practices.
[ "CWE-476" ]
CVE-2020-14397
MEDIUM
5
LibVNC/libvncserver
rfbSendSupportedEncodings
libvncserver/rfbserver.c
38e98ee61d74f5f5ab4aa4c77146faad1962d6d0
0
Analyze the following code function for security vulnerabilities
void serverLogRaw(int level, const char *msg) { const int syslogLevelMap[] = { LOG_DEBUG, LOG_INFO, LOG_NOTICE, LOG_WARNING }; const char *c = ".-*#"; FILE *fp; char buf[64]; int rawmode = (level & LL_RAW); int log_to_stdout = server.logfile[0] == '\0'; level &= 0xff; /* clear flags */ ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serverLogRaw File: src/server.c Repository: redis The code follows secure coding practices.
[ "CWE-770" ]
CVE-2021-32675
MEDIUM
5
redis
serverLogRaw
src/server.c
5674b0057ff2903d43eaff802017eddf37c360f8
0
Analyze the following code function for security vulnerabilities
static int selinux_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) { return sock_has_perm(sock->sk, SOCKET__WRITE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selinux_socket_sendmsg File: security/selinux/hooks.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2021-43057
HIGH
7.2
torvalds/linux
selinux_socket_sendmsg
security/selinux/hooks.c
a3727a8bac0a9e77c70820655fd8715523ba3db7
0
Analyze the following code function for security vulnerabilities
error::Error GLES2DecoderImpl::HandleDeleteShader( uint32 immediate_data_size, const cmds::DeleteShader& c) { GLuint client_id = c.shader; if (client_id) { Shader* shader = GetShader(client_id); if (shader) { if (!shader->IsDeleted()) { glDeleteShader(shader->service_id()); shader_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: GLES2DecoderImpl::HandleDeleteShader File: gpu/command_buffer/service/gles2_cmd_decoder.cc Repository: chromium The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-3173
MEDIUM
5
chromium
GLES2DecoderImpl::HandleDeleteShader
gpu/command_buffer/service/gles2_cmd_decoder.cc
ee7579229ff7e9e5ae28bf53aea069251499d7da
0
Analyze the following code function for security vulnerabilities
static vector3 get_light_direction (RsvgNodeLightSource * source, gdouble x1, gdouble y1, gdouble z, cairo_matrix_t *affine, RsvgDrawingCtx * ctx) { vector3 output; switch (source->type) { case DISTANTLIGHT: output.x = cos (source->azimuth) * cos (source->elevation); ou...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get_light_direction File: rsvg-filter.c Repository: GNOME/librsvg The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-7558
MEDIUM
5
GNOME/librsvg
get_light_direction
rsvg-filter.c
a51919f7e1ca9c535390a746fbf6e28c8402dc61
0
Analyze the following code function for security vulnerabilities
static void tcp_process_sack(struct pico_socket_tcp *t, uint32_t start, uint32_t end) { struct pico_frame *f; struct pico_tree_node *index, *temp; uint16_t count = 0; pico_tree_foreach_safe(index, &t->tcpq_out.pool, temp){ f = index->keyValue; if (tcp_sack_marker(f, start, end, &count) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tcp_process_sack File: modules/pico_tcp.c Repository: virtualsquare/picotcp The code follows secure coding practices.
[ "CWE-908", "CWE-682" ]
CVE-2023-35847
HIGH
7.5
virtualsquare/picotcp
tcp_process_sack
modules/pico_tcp.c
eaf166009e44641e6570c576ba071217f100fd99
0
Analyze the following code function for security vulnerabilities
static int hfs_file_read_lzvn_attr(TSK_FS_FILE* fs_file, char* buffer, uint32_t attributeLength, uint64_t uncSize) { return hfs_file_read_compressed_attr( fs_file, DECMPFS_TYPE_LZVN_ATTR, buffer, attributeLength, unc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hfs_file_read_lzvn_attr File: tsk/fs/hfs.c Repository: sleuthkit The code follows secure coding practices.
[ "CWE-190" ]
CVE-2019-1010065
MEDIUM
4.3
sleuthkit
hfs_file_read_lzvn_attr
tsk/fs/hfs.c
114cd3d0aac8bd1aeaf4b33840feb0163d342d5b
0
Analyze the following code function for security vulnerabilities
static int coroutine_fn bdrv_mirror_top_flush(BlockDriverState *bs) { if (bs->backing == NULL) { /* we can be here after failed bdrv_append in mirror_start_job */ return 0; } return bdrv_co_flush(bs->backing->bs); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bdrv_mirror_top_flush File: block/mirror.c Repository: qemu-project/qemu The code follows secure coding practices.
[ "CWE-476" ]
CVE-2021-4145
MEDIUM
4.9
qemu-project/qemu
bdrv_mirror_top_flush
block/mirror.c
66fed30c9cd11854fc878a4eceb507e915d7c9cd
0
Analyze the following code function for security vulnerabilities
static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx, const char *identity, const char *key_str) { unsigned char key[32]; size_t key_len; size_t i = 0; if (identity == NULL && key_str...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mg_ssl_if_ossl_set_psk File: mongoose.c Repository: cesanta/mongoose The code follows secure coding practices.
[ "CWE-120" ]
CVE-2020-25756
HIGH
7.5
cesanta/mongoose
mg_ssl_if_ossl_set_psk
mongoose.c
a3691602960e0a479565b439645e6b883a11a273
0
Analyze the following code function for security vulnerabilities
static void free_gfar_dev(struct gfar_private *priv) { int i, j; for (i = 0; i < priv->num_grps; i++) for (j = 0; j < GFAR_NUM_IRQS; j++) { kfree(priv->gfargrp[i].irqinfo[j]); priv->gfargrp[i].irqinfo[j] = NULL; } free_netdev(priv->ndev); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: free_gfar_dev File: drivers/net/ethernet/freescale/gianfar.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-29264
MEDIUM
4.7
torvalds/linux
free_gfar_dev
drivers/net/ethernet/freescale/gianfar.c
d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f
0
Analyze the following code function for security vulnerabilities
static int stbi__decode_jpeg_image(stbi__jpeg *j) { int m; for (m = 0; m < 4; m++) { j->img_comp[m].raw_data = NULL; j->img_comp[m].raw_coeff = NULL; } j->restart_interval = 0; if (!stbi__decode_jpeg_header(j, STBI__SCAN_load)) return 0; m = stbi__get_marker(j); while (!stbi__EOI(m)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stbi__decode_jpeg_image File: stb_image.h Repository: nothings/stb The code follows secure coding practices.
[ "CWE-476" ]
CVE-2023-43898
MEDIUM
5.5
nothings/stb
stbi__decode_jpeg_image
stb_image.h
4e58258d8c434111fe2e8f1146ae0a72b0e8c554
0
Analyze the following code function for security vulnerabilities
static void lan78xx_terminate_urbs(struct lan78xx_net *dev) { DECLARE_WAIT_QUEUE_HEAD_ONSTACK(unlink_wakeup); DECLARE_WAITQUEUE(wait, current); int temp; /* ensure there are no more active urbs */ add_wait_queue(&unlink_wakeup, &wait); set_current_state(TASK_UNINTERRUPTIBLE); dev->wait = &unlink_wakeup; temp =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lan78xx_terminate_urbs File: drivers/net/usb/lan78xx.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2023-6039
MEDIUM
5.5
torvalds/linux
lan78xx_terminate_urbs
drivers/net/usb/lan78xx.c
1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3
0
Analyze the following code function for security vulnerabilities
void SoftMP3::onPortFlushCompleted(OMX_U32 portIndex) { if (portIndex == 0) { // Make sure that the next buffer output does not still // depend on fragments from the last one decoded. pvmp3_InitDecoder(mConfig, mDecoderBuf); mIsFirst = true; mSignalledError = false; m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: SoftMP3::onPortFlushCompleted File: media/libstagefright/codecs/mp3dec/SoftMP3.cpp Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3871
HIGH
9.3
android
SoftMP3::onPortFlushCompleted
media/libstagefright/codecs/mp3dec/SoftMP3.cpp
3c4edac2a5b00dec6c8579a0ee658cfb3bb16d94
0
Analyze the following code function for security vulnerabilities
dbus_bool_t _dbus_read_local_machine_uuid (DBusGUID *machine_id, dbus_bool_t create_if_not_found, DBusError *error) { DBusError our_error = DBUS_ERROR_INIT; DBusError etc_error = DBUS_ERROR_INIT; DBusString filename; dbus_bool_t b; _dbus_string...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _dbus_read_local_machine_uuid File: dbus/dbus-sysdeps-unix.c Repository: dbus The code follows secure coding practices.
[ "CWE-404" ]
CVE-2020-12049
MEDIUM
4.9
dbus
_dbus_read_local_machine_uuid
dbus/dbus-sysdeps-unix.c
872b085f12f56da25a2dbd9bd0b2dff31d5aea63
0
Analyze the following code function for security vulnerabilities
void OnEvent(Event &ev) { cap.HandleEvent(ev); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: OnEvent File: src/modules/m_sasl.cpp Repository: inspircd The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-7142
MEDIUM
4.3
inspircd
OnEvent
src/modules/m_sasl.cpp
74fafb7f11b06747f69f182ad5e3769b665eea7a
0
Analyze the following code function for security vulnerabilities
const EVP_CIPHER *EVP_chacha20(void) { return &chacha20; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: EVP_chacha20 File: crypto/evp/e_chacha20_poly1305.c Repository: openssl The code follows secure coding practices.
[ "CWE-327", "CWE-330" ]
CVE-2019-1543
MEDIUM
5.8
openssl
EVP_chacha20
crypto/evp/e_chacha20_poly1305.c
f426625b6ae9a7831010750490a5f0ad689c5ba3
0
Analyze the following code function for security vulnerabilities
static struct net_device *get_netvsc_byref(struct net_device *vf_netdev) { struct net_device_context *net_device_ctx; struct net_device *dev; dev = netdev_master_upper_dev_get(vf_netdev); if (!dev || dev->netdev_ops != &device_ops) return NULL; /* not a netvsc device */ net_device_ctx = netdev_priv(dev); if (...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get_netvsc_byref File: drivers/net/hyperv/netvsc_drv.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-476" ]
CVE-2022-3107
MEDIUM
5.5
torvalds/linux
get_netvsc_byref
drivers/net/hyperv/netvsc_drv.c
886e44c9298a6b428ae046e2fa092ca52e822e6a
0
Analyze the following code function for security vulnerabilities
void ResourceFetcher::decrementRequestCount(const Resource* res) { if (res->ignoreForRequestCount()) return; --m_requestCount; ASSERT(m_requestCount > -1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ResourceFetcher::decrementRequestCount File: third_party/WebKit/Source/core/fetch/ResourceFetcher.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-399" ]
CVE-2013-2921
MEDIUM
6.8
chromium
ResourceFetcher::decrementRequestCount
third_party/WebKit/Source/core/fetch/ResourceFetcher.cpp
739caf62f8354c90010c385e73218f2dc6d66e2f
0
Analyze the following code function for security vulnerabilities
void nl80211_send_rx_auth(struct cfg80211_registered_device *rdev, struct net_device *netdev, const u8 *buf, size_t len, gfp_t gfp) { nl80211_send_mlme_event(rdev, netdev, buf, len, NL80211_CMD_AUTHENTICATE, gfp); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nl80211_send_rx_auth File: net/wireless/nl80211.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2011-2517
HIGH
7.2
torvalds/linux
nl80211_send_rx_auth
net/wireless/nl80211.c
208c72f4fe44fe09577e7975ba0e7fa0278f3d03
0
Analyze the following code function for security vulnerabilities
MODRET set_tlsdsakeyfile(cmd_rec *cmd) { int res; char *path; SSL_CTX *ctx; CHECK_ARGS(cmd, 1); CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL); path = cmd->argv[1]; PRIVS_ROOT ctx = SSL_CTX_new(SSLv23_server_method()); if (ctx != NULL) { /* Note that the configured key file might be passp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: set_tlsdsakeyfile File: contrib/mod_tls.c Repository: proftpd The code follows secure coding practices.
[ "CWE-476", "CWE-295" ]
CVE-2019-19270
MEDIUM
5
proftpd
set_tlsdsakeyfile
contrib/mod_tls.c
81cc5dce4fc0285629a1b08a07a109af10c208dd
0
Analyze the following code function for security vulnerabilities
static void coff_fix_symbol_name (bfd *abfd, asymbol *symbol, combined_entry_type *native, bfd_size_type *string_size_p, asection **debug_string_section_p, bfd_size_type *debug_string_size_p) { unsigned int name_length; union internal_auxent *auxent; char *name = (char *) (...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: coff_fix_symbol_name File: bfd/coffgen.c Repository: binutils-gdb The code follows secure coding practices.
[ "CWE-190" ]
CVE-2017-16831
MEDIUM
6.8
binutils-gdb
coff_fix_symbol_name
bfd/coffgen.c
6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
0
Analyze the following code function for security vulnerabilities
static int v4l_log_status(const struct v4l2_ioctl_ops *ops, struct file *file, void *fh, void *arg) { struct video_device *vfd = video_devdata(file); int ret; if (vfd->v4l2_dev) pr_info("%s: ================= START STATUS =================\n", vfd->v4l2_dev->name); ret = ops->vidioc_log_status(file, fh)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: v4l_log_status File: drivers/media/v4l2-core/v4l2-ioctl.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-30002
LOW
2.1
torvalds/linux
v4l_log_status
drivers/media/v4l2-core/v4l2-ioctl.c
fb18802a338b36f675a388fc03d2aa504a0d0899
0
Analyze the following code function for security vulnerabilities
static int rkvdec_probe(struct platform_device *pdev) { struct rkvdec_dev *rkvdec; unsigned int i; int ret, irq; rkvdec = devm_kzalloc(&pdev->dev, sizeof(*rkvdec), GFP_KERNEL); if (!rkvdec) return -ENOMEM; platform_set_drvdata(pdev, rkvdec); rkvdec->dev = &pdev->dev; mutex_init(&rkvdec->vdev_lock); INIT_DE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rkvdec_probe File: drivers/staging/media/rkvdec/rkvdec.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362", "CWE-416" ]
CVE-2023-35829
HIGH
7
torvalds/linux
rkvdec_probe
drivers/staging/media/rkvdec/rkvdec.c
3228cec23b8b29215e18090c6ba635840190993d
0
Analyze the following code function for security vulnerabilities
static void mbim_decode_sms_cdma_text(tvbuff_t *tvb, proto_tree *tree, const int hfindex, gint offset, guint32 encoding_id, guint32 size_in_bytes, guint32 size_in_chars) { unsigned char *src, *dest; switch (encoding_id) { case MBIM_ENCODING_7BIT_ASCII: ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mbim_decode_sms_cdma_text File: epan/dissectors/packet-mbim.c Repository: wireshark The code follows secure coding practices.
[ "CWE-400" ]
CVE-2017-15193
HIGH
7.8
wireshark
mbim_decode_sms_cdma_text
epan/dissectors/packet-mbim.c
afb9ff7982971aba6e42472de0db4c1bedfc641b
0