instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | static int stringin(char *txt, int sizemax)
{
int size;
for (size = 0; size < sizemax; size++)
{
if (fread(txt + size, 1, 1, g_fin) != 1)
return ERR_FAIL;
if (!txt[size])
break;
}
return size;
} | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2021-32273
- Severity: MEDIUM
- CVSS Score: 6.8
Description: mp4read.c: fix stack-buffer-overflow in stringin()/ftypin()
Terminate the string read into the stack buffer,
fixes #56.
Function: stringin
File: frontend/mp4read.c
Repository: knik0/faad2
Fixed Code:... | [
"CWE-787"
] | CVE-2021-32273 | MEDIUM | 6.8 | knik0/faad2 | stringin | frontend/mp4read.c | 1073aeef823cafd844704389e9a497c257768e2f | 1 |
Analyze the following code function for security vulnerabilities | static inline bool fuse_is_bad(struct inode *inode)
{
return unlikely(test_bit(FUSE_I_BAD, &get_fuse_inode(inode)->state));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fuse_is_bad
File: fs/fuse/fuse_i.h
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-834"
] | CVE-2021-28950 | LOW | 2.1 | torvalds/linux | fuse_is_bad | fs/fuse/fuse_i.h | 775c5033a0d164622d9d10dd0f0a5531639ed3ed | 0 |
Analyze the following code function for security vulnerabilities | bool sock_full(struct pool *pool)
{
if (strlen(pool->sockbuf))
return true;
return (socket_full(pool, 0));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sock_full
File: util.c
Repository: ckolivas/cgminer
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2014-4501 | HIGH | 10 | ckolivas/cgminer | sock_full | util.c | e1c5050734123973b99d181c45e74b2cbb00272e | 0 |
Analyze the following code function for security vulnerabilities | void
map_engine_on_person_event(person_op_t op, script_t* script)
{
script_t* old_script;
old_script = s_def_person_scripts[op];
s_def_person_scripts[op] = script_ref(script);
script_unref(old_script);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: map_engine_on_person_event
File: src/minisphere/map_engine.c
Repository: spheredev/neosphere
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2018-1000524 | MEDIUM | 4.3 | spheredev/neosphere | map_engine_on_person_event | src/minisphere/map_engine.c | 252c1ca184cb38e1acb917aa0e451c5f08519996 | 0 |
Analyze the following code function for security vulnerabilities | static void append_msg_id(struct strbuf *sb, const char *msg_id)
{
for (;;) {
char c = *(msg_id)++;
if (!c)
break;
if (c != '_')
strbuf_addch(sb, tolower(c));
else {
assert(*msg_id);
strbuf_addch(sb, *(msg_id)++);
}
}
strbuf_addstr(sb, ": ");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: append_msg_id
File: fsck.c
Repository: git
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2020-11008 | MEDIUM | 5 | git | append_msg_id | fsck.c | c44088ecc4b0722636e0a305f9608d3047197282 | 0 |
Analyze the following code function for security vulnerabilities | static void on_receive(quicly_stream_t *qs, size_t off, const void *input, size_t len)
{
struct st_h2o_http3_server_stream_t *stream = qs->data;
/* save received data (FIXME avoid copying if possible; see hqclient.c) */
h2o_http3_update_recvbuf(&stream->recvbuf.buf, off, input, len);
if (stream->read_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: on_receive
File: lib/http3/server.c
Repository: h2o
The code follows secure coding practices. | [
"CWE-908"
] | CVE-2021-43848 | MEDIUM | 4.3 | h2o | on_receive | lib/http3/server.c | 8c0eca3 | 0 |
Analyze the following code function for security vulnerabilities | static void nfs_writeback_done_full(struct rpc_task *task, void *calldata)
{
struct nfs_write_data *data = calldata;
nfs_writeback_done(task, data);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nfs_writeback_done_full
File: fs/nfs/write.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2011-4325 | MEDIUM | 4.9 | torvalds/linux | nfs_writeback_done_full | fs/nfs/write.c | 1ae88b2e446261c038f2c0c3150ffae142b227a2 | 0 |
Analyze the following code function for security vulnerabilities | static struct usb_endpoint_descriptor *hso_get_ep(struct usb_interface *intf,
int type, int dir)
{
int i;
struct usb_host_interface *iface = intf->cur_altsetting;
struct usb_endpoint_descriptor *endp;
for (i = 0; i < iface->desc.bNumEndpoints; i++) {
endp = &iface->endpoint[i].desc;
if (((endp->bEndpoi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hso_get_ep
File: drivers/net/usb/hso.c
Repository: kernel/git/netdev/net
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2010-3298 | LOW | 2.1 | kernel/git/netdev/net | hso_get_ep | drivers/net/usb/hso.c | 7011e660938fc44ed86319c18a5954e95a82ab3e | 0 |
Analyze the following code function for security vulnerabilities | static int
dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_enumerated(tvb, offset, actx, tree, hf_index,
16, NULL, FALSE, 0, NULL);
return offset;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13
File: epan/dissectors/packet-lte-rrc.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2020-9431 | MEDIUM | 5 | wireshark | dissect_lte_rrc_T_npdcch_NumRepetitions_RA_r13 | epan/dissectors/packet-lte-rrc.c | 086003c9d616906e08bbeeab9c17b3aa4c6ff850 | 0 |
Analyze the following code function for security vulnerabilities | static void
dtap_cc_release_complete(tvbuff_t *tvb, proto_tree *tree, packet_info *pinfo _U_, guint32 offset, guint len)
{
guint32 curr_offset;
guint32 consumed;
guint curr_len;
curr_offset = offset;
curr_len = len;
is_uplink = IS_UPLINK_FALSE;
ELEM_OPT_TLV(0x08, GSM_A_PDU_TYPE_DTAP, DE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dtap_cc_release_complete
File: epan/dissectors/packet-gsm_a_dtap.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2018-11360 | MEDIUM | 5 | wireshark | dtap_cc_release_complete | epan/dissectors/packet-gsm_a_dtap.c | a55b36c51f83a7b9680824e8ee3a6ce8429ab24b | 0 |
Analyze the following code function for security vulnerabilities | static bool
singlespace(struct scanner *s) {
int c;
switch (s->chr) {
case '$':
c = getc(s->f);
switch (c) {
case '\r':
crlf(s);
/* fallthrough */
case '\n':
break;
default:
ungetc(c, s->f);
return false;
}
/* fallthrough */
case ' ':
next(s);
return true;
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: singlespace
File: scan.c
Repository: michaelforney/samurai
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2019-19795 | MEDIUM | 6.8 | michaelforney/samurai | singlespace | scan.c | 8b069471005e6c242795b68ad91c3b9000dad40e | 0 |
Analyze the following code function for security vulnerabilities | int xc_domain_ioport_mapping(
xc_interface *xch,
uint32_t domid,
uint32_t first_gport,
uint32_t first_mport,
uint32_t nr_ports,
uint32_t add_mapping)
{
DECLARE_DOMCTL;
domctl.cmd = XEN_DOMCTL_ioport_mapping;
domctl.domain = domid;
domctl.u.ioport_mapping.first_gport = first_gpor... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xc_domain_ioport_mapping
File: tools/libxc/xc_domain.c
Repository: xen-project/xen
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2015-2752 | MEDIUM | 4.9 | xen-project/xen | xc_domain_ioport_mapping | tools/libxc/xc_domain.c | b10bca0483a1fa74de99807b89b13b27064794e1 | 0 |
Analyze the following code function for security vulnerabilities | static gboolean
option_allow_cb (const gchar *option_name,
const gchar *value,
gpointer data,
GError **error)
{
FlatpakContext *context = data;
FlatpakContextFeatures feature;
feature = flatpak_context_feature_from_string (value, error);
if (feature ==... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: option_allow_cb
File: common/flatpak-context.c
Repository: flatpak
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-21682 | MEDIUM | 4 | flatpak | option_allow_cb | common/flatpak-context.c | 445bddeee657fdc8d2a0a1f0de12975400d4fc1a | 0 |
Analyze the following code function for security vulnerabilities | int netlink_attachskb(struct sock *sk, struct sk_buff *skb,
long *timeo, struct sock *ssk)
{
struct netlink_sock *nlk;
nlk = nlk_sk(sk);
if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf ||
test_bit(0, &nlk->state)) {
DECLARE_WAITQUEUE(wait, current);
if (!*timeo) {
if (!ssk || netlink_is_ker... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: netlink_attachskb
File: net/netlink/af_netlink.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2012-3520 | LOW | 1.9 | torvalds/linux | netlink_attachskb | net/netlink/af_netlink.c | e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea | 0 |
Analyze the following code function for security vulnerabilities | static bool ShouldOptimizeNewClosure(Isolate* isolate,
Handle<SharedFunctionInfo> info) {
return isolate->use_crankshaft() && !info->is_toplevel() &&
info->is_compiled() && info->allows_lazy_compilation() &&
!info->optimization_disabled() && !isolate->DebuggerHas... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ShouldOptimizeNewClosure
File: src/factory.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-17"
] | CVE-2014-7931 | HIGH | 7.5 | chromium | ShouldOptimizeNewClosure | src/factory.cc | 377de64246b3c1449f4e2090622ae1e1691e51ae | 0 |
Analyze the following code function for security vulnerabilities | static void tg3_process_error(struct tg3 *tp)
{
u32 val;
bool real_error = false;
if (tg3_flag(tp, ERROR_PROCESSED))
return;
/* Check Flow Attention register */
val = tr32(HOSTCC_FLOW_ATTN);
if (val & ~HOSTCC_FLOW_ATTN_MBUF_LWM) {
netdev_err(tp->dev, "FLOW Attention error. Resetting chip.\n");
real_error... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tg3_process_error
File: drivers/net/ethernet/broadcom/tg3.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2013-1929 | MEDIUM | 4.4 | torvalds/linux | tg3_process_error | drivers/net/ethernet/broadcom/tg3.c | 715230a44310a8cf66fbfb5a46f9a62a9b2de424 | 0 |
Analyze the following code function for security vulnerabilities | bool FormOrFieldsetsToFormData(
const blink::WebFormElement* form_element,
const blink::WebFormControlElement* form_control_element,
const std::vector<blink::WebElement>& fieldsets,
const WebVector<WebFormControlElement>& control_elements,
ExtractMask extract_mask,
FormData* form,
FormFieldD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: FormOrFieldsetsToFormData
File: components/autofill/content/renderer/form_autofill_util.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2016-1690 | MEDIUM | 5.1 | chromium | FormOrFieldsetsToFormData | components/autofill/content/renderer/form_autofill_util.cc | 7e112c1563632f57cfa1c4fa964987f823da17fa | 0 |
Analyze the following code function for security vulnerabilities | static void
netmon_close(wtap *wth)
{
netmon_t *netmon = (netmon_t *)wth->priv;
if (netmon->frame_table != NULL) {
g_free(netmon->frame_table);
netmon->frame_table = NULL;
}
if (netmon->comment_table != NULL) {
g_hash_table_destroy(netmon->comment_table);
netmon->comment_table = NULL;
}
if (netmon->pro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: netmon_close
File: wiretap/netmon.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-763"
] | CVE-2018-6836 | HIGH | 7.5 | wireshark | netmon_close | wiretap/netmon.c | 28960d79cca262ac6b974f339697b299a1e28fef | 0 |
Analyze the following code function for security vulnerabilities | void __init check_bugs(void)
{
identify_boot_cpu();
/*
* identify_boot_cpu() initialized SMT support information, let the
* core code know.
*/
cpu_smt_check_topology();
if (!IS_ENABLED(CONFIG_SMP)) {
pr_info("CPU: ");
print_cpu_info(&boot_cpu_data);
}
/*
* Read the SPEC_CTRL MSR to account for rese... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check_bugs
File: arch/x86/kernel/cpu/bugs.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-440"
] | CVE-2020-10767 | LOW | 1.9 | torvalds/linux | check_bugs | arch/x86/kernel/cpu/bugs.c | 21998a351512eba4ed5969006f0c55882d995ada | 0 |
Analyze the following code function for security vulnerabilities | void DTLS_RECORD_LAYER_set_saved_w_epoch(RECORD_LAYER *rl, unsigned short e)
{
if (e == rl->d->w_epoch - 1) {
memcpy(rl->d->curr_write_sequence,
rl->write_sequence, sizeof(rl->write_sequence));
memcpy(rl->write_sequence,
rl->d->last_write_sequence, sizeof(rl->write_sequ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: DTLS_RECORD_LAYER_set_saved_w_epoch
File: ssl/record/rec_layer_d1.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2016-8610 | MEDIUM | 5 | openssl | DTLS_RECORD_LAYER_set_saved_w_epoch | ssl/record/rec_layer_d1.c | af58be768ebb690f78530f796e92b8ae5c9a4401 | 0 |
Analyze the following code function for security vulnerabilities | int tcp_md5_hash_key(struct tcp_md5sig_pool *hp, const struct tcp_md5sig_key *key)
{
struct scatterlist sg;
sg_init_one(&sg, key->key, key->keylen);
ahash_request_set_crypt(hp->md5_req, &sg, NULL, key->keylen);
return crypto_ahash_update(hp->md5_req);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tcp_md5_hash_key
File: net/ipv4/tcp.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-369"
] | CVE-2017-14106 | MEDIUM | 4.9 | torvalds/linux | tcp_md5_hash_key | net/ipv4/tcp.c | 499350a5a6e7512d9ed369ed63a4244b6536f4f8 | 0 |
Analyze the following code function for security vulnerabilities | bool FrameLoader::prepareForCommit()
{
PluginScriptForbiddenScope forbidPluginDestructorScripting;
DocumentLoader* pdl = m_provisionalDocumentLoader;
if (m_frame->document()) {
unsigned nodeCount = 0;
for (Frame* frame = m_frame; frame; frame = frame->tree().traverseNext()) {
if... | Vulnerability Classification:
- CWE: CWE-285
- CVE: CVE-2016-1711
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Always use FrameNavigationDisabler during DocumentLoader detach.
BUG=617495
Review-Url: https://codereview.chromium.org/2079473002
Cr-Commit-Position: refs/heads/master@{#400558}
Function: FrameLoade... | [
"CWE-285"
] | CVE-2016-1711 | MEDIUM | 6.8 | chromium | FrameLoader::prepareForCommit | third_party/WebKit/Source/core/loader/FrameLoader.cpp | be655fd4fb9ab3291a855a939496111674037a2f | 1 |
Analyze the following code function for security vulnerabilities | bool GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment(
const char* func_name) {
Framebuffer* framebuffer = features().chromium_framebuffer_multisample ?
framebuffer_state_.bound_read_framebuffer.get() :
framebuffer_state_.bound_draw_framebuffer.get();
if (!framebuffer)
return true;
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment
File: gpu/command_buffer/service/gles2_cmd_decoder.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2015-1234 | MEDIUM | 6.8 | chromium | GLES2DecoderImpl::CheckBoundReadFramebufferColorAttachment | gpu/command_buffer/service/gles2_cmd_decoder.cc | 181c7400b2bf50ba02ac77149749fb419b4d4797 | 0 |
Analyze the following code function for security vulnerabilities | AP4_Result
AP4_StsdAtom::InspectFields(AP4_AtomInspector& inspector)
{
inspector.AddField("entry-count", m_Children.ItemCount());
// inspect children
m_Children.Apply(AP4_AtomListInspector(inspector));
return AP4_SUCCESS;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: AP4_StsdAtom::InspectFields
File: Source/C++/Core/Ap4StsdAtom.cpp
Repository: axiomatic-systems/Bento4
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2018-14445 | MEDIUM | 4.3 | axiomatic-systems/Bento4 | AP4_StsdAtom::InspectFields | Source/C++/Core/Ap4StsdAtom.cpp | 6acb92d0beaebf5bb46ebc1ae94ddc64a5f0f6d5 | 0 |
Analyze the following code function for security vulnerabilities | static void
f_keys(typval_T *argvars, typval_T *rettv)
{
dict_list(argvars, rettv, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: f_keys
File: src/evalfunc.c
Repository: vim
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2019-20807 | MEDIUM | 4.6 | vim | f_keys | src/evalfunc.c | 8c62a08faf89663e5633dc5036cd8695c80f1075 | 0 |
Analyze the following code function for security vulnerabilities | void nft_trans_gc_queue_sync_done(struct nft_trans_gc *trans)
{
WARN_ON_ONCE(!lockdep_commit_lock_is_held(trans->net));
if (trans->count == 0) {
nft_trans_gc_destroy(trans);
return;
}
call_rcu(&trans->rcu, nft_trans_gc_trans_free);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nft_trans_gc_queue_sync_done
File: net/netfilter/nf_tables_api.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2023-5197 | MEDIUM | 6.6 | torvalds/linux | nft_trans_gc_queue_sync_done | net/netfilter/nf_tables_api.c | f15f29fd4779be8a418b66e9d52979bb6d6c2325 | 0 |
Analyze the following code function for security vulnerabilities | lyd_node *
lyd_parse_path(struct ly_ctx *ctx, const char *path, LYD_FORMAT format, int options, ...)
{
int fd;
struct lyd_node *ret;
va_list ap;
if (!ctx || !path) {
LOGARG;
return NULL;
}
fd = open(path, O_RDONLY);
if (fd == -1) {
LOGERR(ctx, LY_ESYS, "Failed to op... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lyd_parse_path
File: src/tree_data.c
Repository: CESNET/libyang
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2019-20392 | MEDIUM | 4.3 | CESNET/libyang | lyd_parse_path | src/tree_data.c | 32fb4993bc8bb49e93e84016af3c10ea53964be5 | 0 |
Analyze the following code function for security vulnerabilities | static void adjust_insn_aux_data(struct bpf_verifier_env *env,
struct bpf_insn_aux_data *new_data,
struct bpf_prog *new_prog, u32 off, u32 cnt)
{
struct bpf_insn_aux_data *old_data = env->insn_aux_data;
struct bpf_insn *insn = new_prog->insnsi;
u32 old_seen = old_data[off].seen;
u32 prog_len;
int i;
/*... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: adjust_insn_aux_data
File: kernel/bpf/verifier.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2022-23222 | HIGH | 7.2 | torvalds/linux | adjust_insn_aux_data | kernel/bpf/verifier.c | 64620e0a1e712a778095bd35cbb277dc2259281f | 0 |
Analyze the following code function for security vulnerabilities | const struct lys_module *
lyp_get_import_module_ns(const struct lys_module *module, const char *ns)
{
int i;
const struct lys_module *mod = NULL;
assert(module && ns);
if (module->type) {
/* the module is actually submodule and to get the namespace, we need the main module */
if (ly_st... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lyp_get_import_module_ns
File: src/parser.c
Repository: CESNET/libyang
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2019-19333 | HIGH | 7.5 | CESNET/libyang | lyp_get_import_module_ns | src/parser.c | f6d684ade99dd37b21babaa8a856f64faa1e2e0d | 0 |
Analyze the following code function for security vulnerabilities | static struct dst_entry *tcp_v6_route_req(const struct sock *sk,
struct flowi *fl,
const struct request_sock *req,
bool *strict)
{
if (strict)
*strict = true;
return inet6_csk_route_req(sk, &fl->u.ip6, req, IPPROTO_TCP);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tcp_v6_route_req
File: net/ipv6/tcp_ipv6.c
Repository: linux-audit/audit-kernel
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-6136 | LOW | 1.9 | linux-audit/audit-kernel | tcp_v6_route_req | net/ipv6/tcp_ipv6.c | 45caeaa5ac0b4b11784ac6f932c0ad4c6b67cda0 | 0 |
Analyze the following code function for security vulnerabilities | static int SetEccPublicKey(byte* output, ecc_key* key, int with_header)
{
byte bitString[1 + MAX_LENGTH_SZ + 1];
int algoSz;
int curveSz;
int bitStringSz;
int idx;
word32 pubSz = ECC_BUFSIZE;
#ifdef WOLFSSL_SMALL_STACK
byte* algo = NULL;
byte* curve = NULL;
byte* pub;
#else
b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: SetEccPublicKey
File: wolfcrypt/src/asn.c
Repository: wolfSSL/wolfssl
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-37155 | HIGH | 7.5 | wolfSSL/wolfssl | SetEccPublicKey | wolfcrypt/src/asn.c | 73076940af8904f98eee085994c176fe1876b95a | 0 |
Analyze the following code function for security vulnerabilities | static int hso_mux_submit_intr_urb(struct hso_shared_int *shared_int,
struct usb_device *usb, gfp_t gfp)
{
int result;
usb_fill_int_urb(shared_int->shared_intr_urb, usb,
usb_rcvintpipe(usb,
shared_int->intr_endp->bEndpointAddress & 0x7F),
shared_int->shared_intr_buf,
1,
intr_callback, shar... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hso_mux_submit_intr_urb
File: drivers/net/usb/hso.c
Repository: kernel/git/netdev/net
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2010-3298 | LOW | 2.1 | kernel/git/netdev/net | hso_mux_submit_intr_urb | drivers/net/usb/hso.c | 7011e660938fc44ed86319c18a5954e95a82ab3e | 0 |
Analyze the following code function for security vulnerabilities | int equalizer_get_center_frequency(equalizer_context_t *context __unused, int32_t band)
{
ALOGV("%s: band: %d", __func__, band);
return (equalizer_band_freq_range[band][0] +
equalizer_band_freq_range[band][1]) / 2;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equalizer_get_center_frequency
File: post_proc/equalizer.c
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-0402 | MEDIUM | 4.3 | android | equalizer_get_center_frequency | post_proc/equalizer.c | d72ea85c78a1a68bf99fd5804ad9784b4102fe57 | 0 |
Analyze the following code function for security vulnerabilities | PHPAPI char *php_session_create_id(PS_CREATE_SID_ARGS) /* {{{ */
{
PHP_MD5_CTX md5_context;
PHP_SHA1_CTX sha1_context;
#if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
void *hash_context = NULL;
#endif
unsigned char *digest;
int digest_len;
int j;
char *buf, *outid;
struct timeval tv;
zval **array;
zva... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2015-6835
- Severity: HIGH
- CVSS Score: 7.5
Description: Fix bug #70219 (Use after free vulnerability in session deserializer)
Function: php_session_create_id
File: ext/session/session.c
Repository: php/php-src
Fixed Code:
PHPAPI char *php_session_create_id(... | [
"CWE-Other"
] | CVE-2015-6835 | HIGH | 7.5 | php/php-src | php_session_create_id | ext/session/session.c | df4bf28f9f104ca3ef78ed94b497859f15b004e5 | 1 |
Analyze the following code function for security vulnerabilities | void ext4_da_update_reserve_space(struct inode *inode,
int used, int quota_claim)
{
struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb);
struct ext4_inode_info *ei = EXT4_I(inode);
spin_lock(&ei->i_block_reservation_lock);
trace_ext4_da_update_reserve_space(inode, used, quota_claim);
if (unlikely(used > ei->i_re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ext4_da_update_reserve_space
File: fs/ext4/inode.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2021-33631 | HIGH | 7.8 | torvalds/linux | ext4_da_update_reserve_space | fs/ext4/inode.c | 5c099c4fdc438014d5893629e70a8ba934433ee8 | 0 |
Analyze the following code function for security vulnerabilities | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | Vulnerability Classification:
- CWE: CWE-772
- CVE: CVE-2017-11141
- Severity: HIGH
- CVSS Score: 7.1
Description: Fix moment when quantum info is acquired to fix issue reported in #469.
Function: ReadMATImage
File: coders/mat.c
Repository: ImageMagick
Fixed Code:
static Image *ReadMATImage(const ImageInfo *image_in... | [
"CWE-772"
] | CVE-2017-11141 | HIGH | 7.1 | ImageMagick | ReadMATImage | coders/mat.c | 353b942bd83da7e1356ba99c942848bd1871ee9f | 1 |
Analyze the following code function for security vulnerabilities | static void vmx_update_emulated_instruction(struct kvm_vcpu *vcpu)
{
struct vmcs12 *vmcs12 = get_vmcs12(vcpu);
struct vcpu_vmx *vmx = to_vmx(vcpu);
if (!is_guest_mode(vcpu))
return;
/*
* Per the SDM, MTF takes priority over debug-trap exceptions besides
* TSS T-bit traps and ICEBP (INT1). KVM doesn't emula... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: vmx_update_emulated_instruction
File: arch/x86/kvm/vmx/vmx.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-1188"
] | CVE-2022-2196 | HIGH | 8.8 | torvalds/linux | vmx_update_emulated_instruction | arch/x86/kvm/vmx/vmx.c | 2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 | 0 |
Analyze the following code function for security vulnerabilities | void showTree(const blink::Node* node)
{
if (node)
node->showTreeForThis();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showTree
File: third_party/WebKit/Source/core/dom/Node.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-3178 | HIGH | 7.5 | chromium | showTree | third_party/WebKit/Source/core/dom/Node.cpp | 0d4a68cad5e80f7a52f1de888be79a554e5df9d7 | 0 |
Analyze the following code function for security vulnerabilities | static void
pdf_drop_ocg(fz_context *ctx, pdf_ocg_descriptor *desc)
{
if (!desc)
return;
pdf_drop_obj(ctx, desc->intent);
fz_free(ctx, desc->ocgs);
fz_free(ctx, desc);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pdf_drop_ocg
File: source/pdf/pdf-xref.c
Repository: ArtifexSoftware/mupdf
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2016-8674 | MEDIUM | 4.3 | ArtifexSoftware/mupdf | pdf_drop_ocg | source/pdf/pdf-xref.c | 1e03c06456d997435019fb3526fa2d4be7dbc6ec | 0 |
Analyze the following code function for security vulnerabilities | int security_inode_need_killpriv(struct dentry *dentry)
{
return security_ops->inode_need_killpriv(dentry);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: security_inode_need_killpriv
File: security/security.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2010-1643 | MEDIUM | 6.9 | torvalds/linux | security_inode_need_killpriv | security/security.c | 731572d39fcd3498702eda4600db4c43d51e0b26 | 0 |
Analyze the following code function for security vulnerabilities | Magick::ErrorRegistry::ErrorRegistry(const std::string& what_)
: Error(what_)
{
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Magick::ErrorRegistry::ErrorRegistry
File: Magick++/lib/Exception.cpp
Repository: ImageMagick
The code follows secure coding practices. | [
"CWE-772"
] | CVE-2017-6499 | MEDIUM | 4.3 | ImageMagick | Magick::ErrorRegistry::ErrorRegistry | Magick++/lib/Exception.cpp | 3358f060fc182551822576b2c0a8850faab5d543 | 0 |
Analyze the following code function for security vulnerabilities | static MonoMethod*
mono_reflection_method_on_tb_inst_get_handle (MonoReflectionMethodOnTypeBuilderInst *m)
{
MonoClass *klass;
MonoGenericContext tmp_context;
MonoType **type_argv;
MonoGenericInst *ginst;
MonoMethod *method, *inflated;
int count, i;
method = inflate_method (m->inst, (MonoObject*)m->mb);
klass... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mono_reflection_method_on_tb_inst_get_handle
File: mono/metadata/reflection.c
Repository: mono
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2010-4254 | HIGH | 7.5 | mono | mono_reflection_method_on_tb_inst_get_handle | mono/metadata/reflection.c | 4905ef1130feb26c3150b28b97e4a96752e0d399 | 0 |
Analyze the following code function for security vulnerabilities | gboolean
flatpak_ensure_data_dir (GFile *app_id_dir,
GCancellable *cancellable,
GError **error)
{
g_autoptr(GFile) data_dir = g_file_get_child (app_id_dir, "data");
g_autoptr(GFile) cache_dir = g_file_get_child (app_id_dir, "cache");
g_autoptr(GFile) f... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flatpak_ensure_data_dir
File: common/flatpak-run.c
Repository: flatpak
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-28100 | MEDIUM | 6.5 | flatpak | flatpak_ensure_data_dir | common/flatpak-run.c | 8e63de9a7d3124f91140fc74f8ca9ed73ed53be9 | 0 |
Analyze the following code function for security vulnerabilities | static void usb3_set_p0_con_stop(struct renesas_usb3 *usb3)
{
usb3_set_p0_con_update_res(usb3, P0_CON_ST_RES_FORCE_NRDY |
P0_CON_OT_RES_FORCE_NRDY |
P0_CON_IN_RES_FORCE_NRDY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: usb3_set_p0_con_stop
File: drivers/usb/gadget/udc/renesas_usb3.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362",
"CWE-416"
] | CVE-2023-35828 | HIGH | 7 | torvalds/linux | usb3_set_p0_con_stop | drivers/usb/gadget/udc/renesas_usb3.c | 2b947f8769be8b8181dc795fd292d3e7120f5204 | 0 |
Analyze the following code function for security vulnerabilities | void rssr_del(GF_Box *s)
{
gf_free(s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rssr_del
File: src/isomedia/box_code_base.c
Repository: gpac
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2020-22675 | MEDIUM | 4.3 | gpac | rssr_del | src/isomedia/box_code_base.c | 5aa8c4bbd970a3a77517b00528a596063efca1a9 | 0 |
Analyze the following code function for security vulnerabilities | static void rcc_reset_callname(REgg *egg) {
R_FREE (egg->lang.callname);
egg->lang.nargs = 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rcc_reset_callname
File: libr/egg/egg_lang.c
Repository: radareorg/radare2
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2019-12802 | MEDIUM | 6.8 | radareorg/radare2 | rcc_reset_callname | libr/egg/egg_lang.c | 93af319e0af787ede96537d46210369f5c24240c | 0 |
Analyze the following code function for security vulnerabilities | MagickExport MagickBooleanType DiscardBlobBytes(Image *image,
const MagickSizeType length)
{
register MagickOffsetType
i;
size_t
quantum;
ssize_t
count;
unsigned char
buffer[16384];
assert(image != (Image *) NULL);
assert(image->signature == MagickCoreSignature);
if (length != (Magic... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: DiscardBlobBytes
File: magick/blob.c
Repository: ImageMagick/ImageMagick6
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2019-14980 | MEDIUM | 4.3 | ImageMagick/ImageMagick6 | DiscardBlobBytes | magick/blob.c | 614a257295bdcdeda347086761062ac7658b6830 | 0 |
Analyze the following code function for security vulnerabilities | int wake_up_state(struct task_struct *p, unsigned int state)
{
return try_to_wake_up(p, state, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wake_up_state
File: kernel/sched/core.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-9903 | LOW | 2.1 | torvalds/linux | wake_up_state | kernel/sched/core.c | 4efbc454ba68def5ef285b26ebfcfdb605b52755 | 0 |
Analyze the following code function for security vulnerabilities | static freelist_idx_t next_random_slot(union freelist_init_state *state)
{
return (state->list[state->pos++] + state->rand) % state->count;
} | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2017-5546
- Severity: HIGH
- CVSS Score: 7.2
Description: mm/slab.c: fix SLAB freelist randomization duplicate entries
This patch fixes a bug in the freelist randomization code. When a high
random number is used, the freelist will contain duplicate entries. ... | [
"CWE-Other"
] | CVE-2017-5546 | HIGH | 7.2 | torvalds/linux | next_random_slot | mm/slab.c | c4e490cf148e85ead0d1b1c2caaba833f1d5b29f | 1 |
Analyze the following code function for security vulnerabilities | CompileResult generateBytecodeForExecution(
Module &M,
const BytecodeGenerationOptions &genOptions) {
std::shared_ptr<Context> context = M.shareContext();
CompileResult result{Success};
if (cl::BytecodeFormat == cl::BytecodeFormatKind::HBC) {
result.bytecodeProvider = hbc::BCProviderFromSrc::createBCP... | Vulnerability Classification:
- CWE: CWE-681
- CVE: CVE-2022-40138
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Re-sync with internal repository (#822)
Co-authored-by: Facebook Community Bot <6422482+facebook-github-bot@users.noreply.github.com>
Function: generateBytecodeForExecution
File: lib/CompilerDriver/... | [
"CWE-681"
] | CVE-2022-40138 | CRITICAL | 9.8 | facebook/hermes | generateBytecodeForExecution | lib/CompilerDriver/CompilerDriver.cpp | 6aa825e480d48127b480b08d13adf70033237097 | 1 |
Analyze the following code function for security vulnerabilities | bool_t
xdr_kadm5_ret_t(XDR *xdrs, kadm5_ret_t *objp)
{
uint32_t tmp;
if (xdrs->x_op == XDR_ENCODE)
tmp = (uint32_t) *objp;
if (!xdr_u_int32(xdrs, &tmp))
return (FALSE);
if (xdrs->x_op == XDR_DECODE)
*objp = (kadm5_ret_t) tmp;
return (TRUE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xdr_kadm5_ret_t
File: src/lib/kadm5/kadm_rpc_xdr.c
Repository: krb5
The code follows secure coding practices. | [
"CWE-824"
] | CVE-2023-36054 | MEDIUM | 6.5 | krb5 | xdr_kadm5_ret_t | src/lib/kadm5/kadm_rpc_xdr.c | ef08b09c9459551aabbe7924fb176f1583053cdd | 0 |
Analyze the following code function for security vulnerabilities | static ImapResponse
ir_msg_att_uid(ImapMboxHandle *h, int c, unsigned seqno)
{
char buf[12];
c = imap_get_atom(h->sio, buf, sizeof(buf));
if(c!= -1) sio_ungetc(h->sio);
CREATE_IMSG_IF_NEEDED(h, seqno);
h->msg_cache[seqno-1]->uid = strtol(buf, NULL, 10);
return IMR_OK;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ir_msg_att_uid
File: libbalsa/imap/imap-handle.c
Repository: GNOME/balsa
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2020-16118 | MEDIUM | 5 | GNOME/balsa | ir_msg_att_uid | libbalsa/imap/imap-handle.c | 4e245d758e1c826a01080d40c22ca8706f0339e5 | 0 |
Analyze the following code function for security vulnerabilities | static int
dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_lte_rrc_InterFreqRSTDMeasurementIndication_r1... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs
File: epan/dissectors/packet-lte-rrc.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2020-9431 | MEDIUM | 5 | wireshark | dissect_lte_rrc_InterFreqRSTDMeasurementIndication_r10_IEs | epan/dissectors/packet-lte-rrc.c | 086003c9d616906e08bbeeab9c17b3aa4c6ff850 | 0 |
Analyze the following code function for security vulnerabilities | void CLASS lin_interpolate()
{
int code[16][16][32], size=16, *ip, sum[4];
int f, c, x, y, row, col, shift, color;
#ifdef DCRAW_VERBOSE
if (verbose) fprintf (stderr,_("Bilinear interpolation...\n"));
#endif
#ifdef LIBRAW_LIBRARY_BUILD
RUN_CALLBACK(LIBRAW_PROGRESS_INTERPOLATE,0,3);
#endif
if (filters == 9) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lin_interpolate
File: dcraw/dcraw.c
Repository: LibRaw
The code follows secure coding practices. | [
"CWE-125"
] | CVE-2017-14608 | MEDIUM | 6.4 | LibRaw | lin_interpolate | dcraw/dcraw.c | d13e8f6d1e987b7491182040a188c16a395f1d21 | 0 |
Analyze the following code function for security vulnerabilities | static void do_adjust_special_early(timelib_time* time)
{
if (time->relative.have_special_relative) {
switch (time->relative.special.type) {
case TIMELIB_SPECIAL_DAY_OF_WEEK_IN_MONTH:
time->d = 1;
time->m += time->relative.m;
time->relative.m = 0;
break;
case TIMELIB_SPECIAL_LAST_DAY_OF_WEEK_IN... | Vulnerability Classification:
- CWE: CWE-399
- CVE: CVE-2012-0789
- Severity: MEDIUM
- CVSS Score: 5.0
Description: - Fixed bug #53502 (strtotime with timezone memory leak).
- Fixed bug #52062 (large timestamps with DateTime::getTimestamp and
DateTime::setTimestamp).
- Fixed bug #51994 (date_parse_from_format is par... | [
"CWE-399"
] | CVE-2012-0789 | MEDIUM | 5 | php/php-src | do_adjust_special_early | ext/date/lib/tm2unixtime.c | 4c9fad8b362a7d2b6a94b4961e4b2dc037b2766d | 1 |
Analyze the following code function for security vulnerabilities | ASSStyle *ff_ass_style_get(ASSSplitContext *ctx, const char *style)
{
ASS *ass = &ctx->ass;
int i;
if (!style || !*style)
style = "Default";
for (i=0; i<ass->styles_count; i++)
if (!strcmp(ass->styles[i].name, style))
return ass->styles + i;
return NULL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ff_ass_style_get
File: libavcodec/ass_split.c
Repository: ffmpeg
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2012-6615 | MEDIUM | 4.3 | ffmpeg | ff_ass_style_get | libavcodec/ass_split.c | 20c121c00747d6c3b0b0f98deeff021171b2ed74 | 0 |
Analyze the following code function for security vulnerabilities | static void set_sdma_integrity(struct sdma_engine *sde)
{
struct hfi1_devdata *dd = sde->dd;
write_sde_csr(sde, SD(CHECK_ENABLE),
hfi1_pkt_base_sdma_integrity(dd));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: set_sdma_integrity
File: drivers/infiniband/hw/hfi1/sdma.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2019-19065 | MEDIUM | 4.7 | torvalds/linux | set_sdma_integrity | drivers/infiniband/hw/hfi1/sdma.c | 34b3be18a04ecdc610aae4c48e5d1b799d8689f6 | 0 |
Analyze the following code function for security vulnerabilities | static void
pam_settrace()
{
void *defp;
if ((defp = defopen_r(PAM_DEBUG)) != NULL) {
char *arg;
int code;
int facility = LOG_AUTH;
pam_debug = PAM_DEBUG_DEFAULT;
log_priority = LOG_DEBUG;
(void) defcntl_r(DC_SETFLAGS, DC_CASE, defp);
if ((arg = defread_r(LOG_PRIORITY, defp)) != NULL) {
code = (in... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pam_settrace
File: usr/src/lib/libpam/pam_framework.c
Repository: illumos/illumos-gate
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2020-27678 | HIGH | 7.5 | illumos/illumos-gate | pam_settrace | usr/src/lib/libpam/pam_framework.c | 1d276e0b382cf066dae93640746d8b4c54d15452 | 0 |
Analyze the following code function for security vulnerabilities | void sqlite3ExprListSetName(
Parse *pParse, /* Parsing context */
ExprList *pList, /* List to which to add the span. */
Token *pName, /* Name to be added */
int dequote /* True to cause the name to be dequoted */
){
assert( pList!=0 || pParse->db->mallocFailed!=0 );
if(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sqlite3ExprListSetName
File: src/expr.c
Repository: sqlite
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2019-19242 | MEDIUM | 4.3 | sqlite | sqlite3ExprListSetName | src/expr.c | 57f7ece78410a8aae86aa4625fb7556897db384c | 0 |
Analyze the following code function for security vulnerabilities | void free_bprm(struct linux_binprm *bprm)
{
free_arg_pages(bprm);
if (bprm->cred) {
mutex_unlock(¤t->signal->cred_guard_mutex);
abort_creds(bprm->cred);
}
kfree(bprm);
} | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2012-4530
- Severity: LOW
- CVSS Score: 2.1
Description: exec: do not leave bprm->interp on stack
If a series of scripts are executed, each triggering module loading via
unprintable bytes in the script header, kernel stack contents can leak
into the command line... | [
"CWE-200"
] | CVE-2012-4530 | LOW | 2.1 | torvalds/linux | free_bprm | fs/exec.c | b66c5984017533316fd1951770302649baf1aa33 | 1 |
Analyze the following code function for security vulnerabilities | bool XMLHttpRequest::canSuspend() const
{
return !m_loader;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: XMLHttpRequest::canSuspend
File: third_party/WebKit/Source/core/xml/XMLHttpRequest.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2013-2925 | MEDIUM | 6.8 | chromium | XMLHttpRequest::canSuspend | third_party/WebKit/Source/core/xml/XMLHttpRequest.cpp | a276a009de874306899f9c88edb722ae58d313f9 | 0 |
Analyze the following code function for security vulnerabilities | static int iax2_poke_peer_s(const void *data)
{
struct iax2_peer *peer = (struct iax2_peer *)data;
peer->pokeexpire = -1;
#ifdef SCHED_MULTITHREADED
if (schedule_action(__iax2_poke_peer_s, data))
#endif
__iax2_poke_peer_s(data);
return 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: iax2_poke_peer_s
File: channels/chan_iax2.c
Repository: xrg/asterisk-xrg
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2008-1897 | MEDIUM | 4.3 | xrg/asterisk-xrg | iax2_poke_peer_s | channels/chan_iax2.c | 10da3dab24e8ca08cf2c983f8d0206e383535b5a | 0 |
Analyze the following code function for security vulnerabilities | static GIOStatus irssi_ssl_close(GIOChannel *handle, GError **gerr)
{
GIOSSLChannel *chan = (GIOSSLChannel *)handle;
return chan->giochan->funcs->io_close(handle, gerr);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: irssi_ssl_close
File: src/core/network-openssl.c
Repository: ensc/irssi-proxy
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2010-1155 | MEDIUM | 6.8 | ensc/irssi-proxy | irssi_ssl_close | src/core/network-openssl.c | 85bbc05b21678e80423815d2ef1dfe26208491ab | 0 |
Analyze the following code function for security vulnerabilities | static tvbuff_t *
clean_telnet_iac(packet_info *pinfo, tvbuff_t *tvb, int offset, int len)
{
tvbuff_t *telnet_tvb;
guint8 *buf;
const guint8 *spos;
guint8 *dpos;
int skip_byte, len_remaining;
spos=tvb_get_ptr(tvb, offset, len);
buf = (guint8 *)wmem_alloc(pinfo->pool, len);
dpo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clean_telnet_iac
File: epan/dissectors/packet-cp2179.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-369"
] | CVE-2023-2906 | MEDIUM | 6.5 | wireshark | clean_telnet_iac | epan/dissectors/packet-cp2179.c | 44dc70cc5aadca91cb8ba3710c59c3651b7b0d4d | 0 |
Analyze the following code function for security vulnerabilities | static void
srch_nxtprv(int reverse)
{
int result;
/* *INDENT-OFF* */
static int (*routine[2]) (Buffer *, char *) = {
forwardSearch, backwardSearch
};
/* *INDENT-ON* */
if (searchRoutine == NULL) {
/* FIXME: gettextize? */
disp_message("No previous regular expression", TRUE);
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: srch_nxtprv
File: main.c
Repository: tats/w3m
The code follows secure coding practices. | [
"CWE-59"
] | CVE-2018-6198 | LOW | 3.3 | tats/w3m | srch_nxtprv | main.c | 18dcbadf2771cdb0c18509b14e4e73505b242753 | 0 |
Analyze the following code function for security vulnerabilities | int
dtls1_buffer_message(SSL *s, int is_ccs)
{
pitem *item;
hm_fragment *frag;
unsigned char seq64be[8];
/* this function is called immediately after a message has
* been serialized */
OPENSSL_assert(s->init_off == 0);
frag = dtls1_hm_fragment_new(s->init_num, 0);
if (!frag)
return 0;
memcpy(frag->frag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dtls1_buffer_message
File: ssl/d1_both.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-3505 | MEDIUM | 5 | openssl | dtls1_buffer_message | ssl/d1_both.c | bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b | 0 |
Analyze the following code function for security vulnerabilities | OSExchangeData::Provider* OSExchangeData::CreateProvider() {
return new OSExchangeDataProviderAuraX11();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: OSExchangeData::CreateProvider
File: ui/base/dragdrop/os_exchange_data_provider_aurax11.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-6660 | MEDIUM | 5 | chromium | OSExchangeData::CreateProvider | ui/base/dragdrop/os_exchange_data_provider_aurax11.cc | 1161a49d663dd395bd639549c2dfe7324f847938 | 0 |
Analyze the following code function for security vulnerabilities | static int network_dispatch_notification (notification_t *n) /* {{{ */
{
int status;
assert (n->meta == NULL);
status = plugin_notification_meta_add_boolean (n, "network:received", 1);
if (status != 0)
{
ERROR ("network plugin: plugin_notification_meta_add_boolean failed.");
plugin_notification_meta... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: network_dispatch_notification
File: src/network.c
Repository: collectd
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-6254 | MEDIUM | 6.4 | collectd | network_dispatch_notification | src/network.c | b589096f907052b3a4da2b9ccc9b0e2e888dfc18 | 0 |
Analyze the following code function for security vulnerabilities | int ocfs2_size_fits_inline_data(struct buffer_head *di_bh, u64 new_size)
{
struct ocfs2_dinode *di = (struct ocfs2_dinode *)di_bh->b_data;
if (new_size <= le16_to_cpu(di->id2.i_data.id_count))
return 1;
return 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ocfs2_size_fits_inline_data
File: fs/ocfs2/aops.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2017-18224 | LOW | 1.9 | torvalds/linux | ocfs2_size_fits_inline_data | fs/ocfs2/aops.c | 3e4c56d41eef5595035872a2ec5a483f42e8917f | 0 |
Analyze the following code function for security vulnerabilities | static int smb3_verify_reconfigure_ctx(struct fs_context *fc,
struct smb3_fs_context *new_ctx,
struct smb3_fs_context *old_ctx)
{
if (new_ctx->posix_paths != old_ctx->posix_paths) {
cifs_errorf(fc, "can not change posixpaths during remount\n");
return -EINVAL;
}
if (new_ctx->sectype != old_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: smb3_verify_reconfigure_ctx
File: fs/smb/client/fs_context.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2023-5345 | HIGH | 7.8 | torvalds/linux | smb3_verify_reconfigure_ctx | fs/smb/client/fs_context.c | e6e43b8aa7cd3c3af686caf0c2e11819a886d705 | 0 |
Analyze the following code function for security vulnerabilities | static enum bgp_attr_parse_ret
bgp_attr_large_community(struct bgp_attr_parser_args *args)
{
struct peer *const peer = args->peer;
struct attr *const attr = args->attr;
const bgp_size_t length = args->length;
/*
* Large community follows new attribute format.
*/
if (length == 0) {
bgp_attr_set_lcommunity(at... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bgp_attr_large_community
File: bgpd/bgp_attr.c
Repository: FRRouting/frr
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-46752 | MEDIUM | 5.9 | FRRouting/frr | bgp_attr_large_community | bgpd/bgp_attr.c | b08afc81c60607a4f736f418f2e3eb06087f1a35 | 0 |
Analyze the following code function for security vulnerabilities | Result BinaryReaderIR::OnDataSymbol(Index index,
uint32_t flags,
std::string_view name,
Index segment,
uint32_t offset,
uint32_t size) {
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: BinaryReaderIR::OnDataSymbol
File: src/binary-reader-ir.cc
Repository: WebAssembly/wabt
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-31670 | HIGH | 7.5 | WebAssembly/wabt | BinaryReaderIR::OnDataSymbol | src/binary-reader-ir.cc | 1b3105a132b925a1d300c2f03b3cd213875ffca8 | 0 |
Analyze the following code function for security vulnerabilities | static void mqtt_cb(struct mg_connection *c, int ev, void *ev_data,
void *fn_data) {
if (ev == MG_EV_READ) {
for (;;) {
uint8_t version = c->is_mqtt5 ? 5 : 4;
struct mg_mqtt_message mm;
int rc = mg_mqtt_parse(c->recv.buf, c->recv.len, version, &mm);
if (rc == MQTT_MALFO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mqtt_cb
File: mongoose.c
Repository: cesanta/mongoose
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2905 | HIGH | 8.8 | cesanta/mongoose | mqtt_cb | mongoose.c | aed7b6b37ae189680dce9f5d444c90b4dc8df7a2 | 0 |
Analyze the following code function for security vulnerabilities | int X509v3_addr_get_range(IPAddressOrRange *aor,
const unsigned afi,
unsigned char *min,
unsigned char *max, const int length)
{
int afi_length = length_from_afi(afi);
if (aor == NULL || min == NULL || max == NULL ||
afi_lengt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: X509v3_addr_get_range
File: crypto/x509v3/v3_addr.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2017-3735 | MEDIUM | 5 | openssl | X509v3_addr_get_range | crypto/x509v3/v3_addr.c | 068b963bb7afc57f5bdd723de0dd15e7795d5822 | 0 |
Analyze the following code function for security vulnerabilities | BigInt BigInt::operator-() const
{
BigInt x = (*this);
x.flip_sign();
return x;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: BigInt::operator-
File: src/lib/math/bigint/bigint.cpp
Repository: randombit/botan
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-14737 | LOW | 2.1 | randombit/botan | BigInt::operator- | src/lib/math/bigint/bigint.cpp | 2718c02d429d024b2cd65534f7e54cab1d123348 | 0 |
Analyze the following code function for security vulnerabilities | static int tty_tiocmget(struct tty_struct *tty, int __user *p)
{
int retval = -EINVAL;
if (tty->ops->tiocmget) {
retval = tty->ops->tiocmget(tty);
if (retval >= 0)
retval = put_user(retval, p);
}
return retval;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tty_tiocmget
File: drivers/tty/tty_io.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-667",
"CWE-416"
] | CVE-2020-29660 | LOW | 2.1 | torvalds/linux | tty_tiocmget | drivers/tty/tty_io.c | c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 | 0 |
Analyze the following code function for security vulnerabilities | rfbBool
rfbSendSupportedEncodings(rfbClientPtr cl)
{
rfbFramebufferUpdateRectHeader rect;
static uint32_t supported[] = {
rfbEncodingRaw,
rfbEncodingCopyRect,
rfbEncodingRRE,
rfbEncodingCoRRE,
rfbEncodingHextile,
#ifdef LIBVNCSERVER_HAVE_LIBZ
rfbEncodingZlib,
rfbEncodingZRLE,
rfbEncodingZYWRLE,
#... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rfbSendSupportedEncodings
File: libvncserver/rfbserver.c
Repository: LibVNC/libvncserver
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2020-14397 | MEDIUM | 5 | LibVNC/libvncserver | rfbSendSupportedEncodings | libvncserver/rfbserver.c | 38e98ee61d74f5f5ab4aa4c77146faad1962d6d0 | 0 |
Analyze the following code function for security vulnerabilities | void serverLogRaw(int level, const char *msg) {
const int syslogLevelMap[] = { LOG_DEBUG, LOG_INFO, LOG_NOTICE, LOG_WARNING };
const char *c = ".-*#";
FILE *fp;
char buf[64];
int rawmode = (level & LL_RAW);
int log_to_stdout = server.logfile[0] == '\0';
level &= 0xff; /* clear flags */
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serverLogRaw
File: src/server.c
Repository: redis
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2021-32675 | MEDIUM | 5 | redis | serverLogRaw | src/server.c | 5674b0057ff2903d43eaff802017eddf37c360f8 | 0 |
Analyze the following code function for security vulnerabilities | static int selinux_socket_sendmsg(struct socket *sock, struct msghdr *msg,
int size)
{
return sock_has_perm(sock->sk, SOCKET__WRITE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selinux_socket_sendmsg
File: security/selinux/hooks.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2021-43057 | HIGH | 7.2 | torvalds/linux | selinux_socket_sendmsg | security/selinux/hooks.c | a3727a8bac0a9e77c70820655fd8715523ba3db7 | 0 |
Analyze the following code function for security vulnerabilities | error::Error GLES2DecoderImpl::HandleDeleteShader(
uint32 immediate_data_size, const cmds::DeleteShader& c) {
GLuint client_id = c.shader;
if (client_id) {
Shader* shader = GetShader(client_id);
if (shader) {
if (!shader->IsDeleted()) {
glDeleteShader(shader->service_id());
shader_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: GLES2DecoderImpl::HandleDeleteShader
File: gpu/command_buffer/service/gles2_cmd_decoder.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2014-3173 | MEDIUM | 5 | chromium | GLES2DecoderImpl::HandleDeleteShader | gpu/command_buffer/service/gles2_cmd_decoder.cc | ee7579229ff7e9e5ae28bf53aea069251499d7da | 0 |
Analyze the following code function for security vulnerabilities | static vector3
get_light_direction (RsvgNodeLightSource * source, gdouble x1, gdouble y1, gdouble z,
cairo_matrix_t *affine, RsvgDrawingCtx * ctx)
{
vector3 output;
switch (source->type) {
case DISTANTLIGHT:
output.x = cos (source->azimuth) * cos (source->elevation);
ou... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get_light_direction
File: rsvg-filter.c
Repository: GNOME/librsvg
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2015-7558 | MEDIUM | 5 | GNOME/librsvg | get_light_direction | rsvg-filter.c | a51919f7e1ca9c535390a746fbf6e28c8402dc61 | 0 |
Analyze the following code function for security vulnerabilities | static void tcp_process_sack(struct pico_socket_tcp *t, uint32_t start, uint32_t end)
{
struct pico_frame *f;
struct pico_tree_node *index, *temp;
uint16_t count = 0;
pico_tree_foreach_safe(index, &t->tcpq_out.pool, temp){
f = index->keyValue;
if (tcp_sack_marker(f, start, end, &count) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tcp_process_sack
File: modules/pico_tcp.c
Repository: virtualsquare/picotcp
The code follows secure coding practices. | [
"CWE-908",
"CWE-682"
] | CVE-2023-35847 | HIGH | 7.5 | virtualsquare/picotcp | tcp_process_sack | modules/pico_tcp.c | eaf166009e44641e6570c576ba071217f100fd99 | 0 |
Analyze the following code function for security vulnerabilities | static int hfs_file_read_lzvn_attr(TSK_FS_FILE* fs_file,
char* buffer,
uint32_t attributeLength,
uint64_t uncSize)
{
return hfs_file_read_compressed_attr(
fs_file, DECMPFS_TYPE_LZVN_ATTR,
buffer, attributeLength, unc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hfs_file_read_lzvn_attr
File: tsk/fs/hfs.c
Repository: sleuthkit
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2019-1010065 | MEDIUM | 4.3 | sleuthkit | hfs_file_read_lzvn_attr | tsk/fs/hfs.c | 114cd3d0aac8bd1aeaf4b33840feb0163d342d5b | 0 |
Analyze the following code function for security vulnerabilities | static int coroutine_fn bdrv_mirror_top_flush(BlockDriverState *bs)
{
if (bs->backing == NULL) {
/* we can be here after failed bdrv_append in mirror_start_job */
return 0;
}
return bdrv_co_flush(bs->backing->bs);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bdrv_mirror_top_flush
File: block/mirror.c
Repository: qemu-project/qemu
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2021-4145 | MEDIUM | 4.9 | qemu-project/qemu | bdrv_mirror_top_flush | block/mirror.c | 66fed30c9cd11854fc878a4eceb507e915d7c9cd | 0 |
Analyze the following code function for security vulnerabilities | static enum mg_ssl_if_result mg_ssl_if_ossl_set_psk(struct mg_ssl_if_ctx *ctx,
const char *identity,
const char *key_str) {
unsigned char key[32];
size_t key_len;
size_t i = 0;
if (identity == NULL && key_str... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mg_ssl_if_ossl_set_psk
File: mongoose.c
Repository: cesanta/mongoose
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2020-25756 | HIGH | 7.5 | cesanta/mongoose | mg_ssl_if_ossl_set_psk | mongoose.c | a3691602960e0a479565b439645e6b883a11a273 | 0 |
Analyze the following code function for security vulnerabilities | static void free_gfar_dev(struct gfar_private *priv)
{
int i, j;
for (i = 0; i < priv->num_grps; i++)
for (j = 0; j < GFAR_NUM_IRQS; j++) {
kfree(priv->gfargrp[i].irqinfo[j]);
priv->gfargrp[i].irqinfo[j] = NULL;
}
free_netdev(priv->ndev);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: free_gfar_dev
File: drivers/net/ethernet/freescale/gianfar.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-29264 | MEDIUM | 4.7 | torvalds/linux | free_gfar_dev | drivers/net/ethernet/freescale/gianfar.c | d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f | 0 |
Analyze the following code function for security vulnerabilities | static int stbi__decode_jpeg_image(stbi__jpeg *j)
{
int m;
for (m = 0; m < 4; m++) {
j->img_comp[m].raw_data = NULL;
j->img_comp[m].raw_coeff = NULL;
}
j->restart_interval = 0;
if (!stbi__decode_jpeg_header(j, STBI__SCAN_load)) return 0;
m = stbi__get_marker(j);
while (!stbi__EOI(m)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stbi__decode_jpeg_image
File: stb_image.h
Repository: nothings/stb
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2023-43898 | MEDIUM | 5.5 | nothings/stb | stbi__decode_jpeg_image | stb_image.h | 4e58258d8c434111fe2e8f1146ae0a72b0e8c554 | 0 |
Analyze the following code function for security vulnerabilities | static void lan78xx_terminate_urbs(struct lan78xx_net *dev)
{
DECLARE_WAIT_QUEUE_HEAD_ONSTACK(unlink_wakeup);
DECLARE_WAITQUEUE(wait, current);
int temp;
/* ensure there are no more active urbs */
add_wait_queue(&unlink_wakeup, &wait);
set_current_state(TASK_UNINTERRUPTIBLE);
dev->wait = &unlink_wakeup;
temp =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lan78xx_terminate_urbs
File: drivers/net/usb/lan78xx.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2023-6039 | MEDIUM | 5.5 | torvalds/linux | lan78xx_terminate_urbs | drivers/net/usb/lan78xx.c | 1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3 | 0 |
Analyze the following code function for security vulnerabilities | void SoftMP3::onPortFlushCompleted(OMX_U32 portIndex) {
if (portIndex == 0) {
// Make sure that the next buffer output does not still
// depend on fragments from the last one decoded.
pvmp3_InitDecoder(mConfig, mDecoderBuf);
mIsFirst = true;
mSignalledError = false;
m... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: SoftMP3::onPortFlushCompleted
File: media/libstagefright/codecs/mp3dec/SoftMP3.cpp
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3871 | HIGH | 9.3 | android | SoftMP3::onPortFlushCompleted | media/libstagefright/codecs/mp3dec/SoftMP3.cpp | 3c4edac2a5b00dec6c8579a0ee658cfb3bb16d94 | 0 |
Analyze the following code function for security vulnerabilities | dbus_bool_t
_dbus_read_local_machine_uuid (DBusGUID *machine_id,
dbus_bool_t create_if_not_found,
DBusError *error)
{
DBusError our_error = DBUS_ERROR_INIT;
DBusError etc_error = DBUS_ERROR_INIT;
DBusString filename;
dbus_bool_t b;
_dbus_string... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _dbus_read_local_machine_uuid
File: dbus/dbus-sysdeps-unix.c
Repository: dbus
The code follows secure coding practices. | [
"CWE-404"
] | CVE-2020-12049 | MEDIUM | 4.9 | dbus | _dbus_read_local_machine_uuid | dbus/dbus-sysdeps-unix.c | 872b085f12f56da25a2dbd9bd0b2dff31d5aea63 | 0 |
Analyze the following code function for security vulnerabilities | void OnEvent(Event &ev)
{
cap.HandleEvent(ev);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: OnEvent
File: src/modules/m_sasl.cpp
Repository: inspircd
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-7142 | MEDIUM | 4.3 | inspircd | OnEvent | src/modules/m_sasl.cpp | 74fafb7f11b06747f69f182ad5e3769b665eea7a | 0 |
Analyze the following code function for security vulnerabilities | const EVP_CIPHER *EVP_chacha20(void)
{
return &chacha20;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: EVP_chacha20
File: crypto/evp/e_chacha20_poly1305.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-327",
"CWE-330"
] | CVE-2019-1543 | MEDIUM | 5.8 | openssl | EVP_chacha20 | crypto/evp/e_chacha20_poly1305.c | f426625b6ae9a7831010750490a5f0ad689c5ba3 | 0 |
Analyze the following code function for security vulnerabilities | static struct net_device *get_netvsc_byref(struct net_device *vf_netdev)
{
struct net_device_context *net_device_ctx;
struct net_device *dev;
dev = netdev_master_upper_dev_get(vf_netdev);
if (!dev || dev->netdev_ops != &device_ops)
return NULL; /* not a netvsc device */
net_device_ctx = netdev_priv(dev);
if (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get_netvsc_byref
File: drivers/net/hyperv/netvsc_drv.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2022-3107 | MEDIUM | 5.5 | torvalds/linux | get_netvsc_byref | drivers/net/hyperv/netvsc_drv.c | 886e44c9298a6b428ae046e2fa092ca52e822e6a | 0 |
Analyze the following code function for security vulnerabilities | void ResourceFetcher::decrementRequestCount(const Resource* res)
{
if (res->ignoreForRequestCount())
return;
--m_requestCount;
ASSERT(m_requestCount > -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ResourceFetcher::decrementRequestCount
File: third_party/WebKit/Source/core/fetch/ResourceFetcher.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2013-2921 | MEDIUM | 6.8 | chromium | ResourceFetcher::decrementRequestCount | third_party/WebKit/Source/core/fetch/ResourceFetcher.cpp | 739caf62f8354c90010c385e73218f2dc6d66e2f | 0 |
Analyze the following code function for security vulnerabilities | void nl80211_send_rx_auth(struct cfg80211_registered_device *rdev,
struct net_device *netdev, const u8 *buf,
size_t len, gfp_t gfp)
{
nl80211_send_mlme_event(rdev, netdev, buf, len,
NL80211_CMD_AUTHENTICATE, gfp);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nl80211_send_rx_auth
File: net/wireless/nl80211.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2011-2517 | HIGH | 7.2 | torvalds/linux | nl80211_send_rx_auth | net/wireless/nl80211.c | 208c72f4fe44fe09577e7975ba0e7fa0278f3d03 | 0 |
Analyze the following code function for security vulnerabilities | MODRET set_tlsdsakeyfile(cmd_rec *cmd) {
int res;
char *path;
SSL_CTX *ctx;
CHECK_ARGS(cmd, 1);
CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL);
path = cmd->argv[1];
PRIVS_ROOT
ctx = SSL_CTX_new(SSLv23_server_method());
if (ctx != NULL) {
/* Note that the configured key file might be passp... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: set_tlsdsakeyfile
File: contrib/mod_tls.c
Repository: proftpd
The code follows secure coding practices. | [
"CWE-476",
"CWE-295"
] | CVE-2019-19270 | MEDIUM | 5 | proftpd | set_tlsdsakeyfile | contrib/mod_tls.c | 81cc5dce4fc0285629a1b08a07a109af10c208dd | 0 |
Analyze the following code function for security vulnerabilities | static void
coff_fix_symbol_name (bfd *abfd,
asymbol *symbol,
combined_entry_type *native,
bfd_size_type *string_size_p,
asection **debug_string_section_p,
bfd_size_type *debug_string_size_p)
{
unsigned int name_length;
union internal_auxent *auxent;
char *name = (char *) (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: coff_fix_symbol_name
File: bfd/coffgen.c
Repository: binutils-gdb
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2017-16831 | MEDIUM | 6.8 | binutils-gdb | coff_fix_symbol_name | bfd/coffgen.c | 6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca | 0 |
Analyze the following code function for security vulnerabilities | static int v4l_log_status(const struct v4l2_ioctl_ops *ops,
struct file *file, void *fh, void *arg)
{
struct video_device *vfd = video_devdata(file);
int ret;
if (vfd->v4l2_dev)
pr_info("%s: ================= START STATUS =================\n",
vfd->v4l2_dev->name);
ret = ops->vidioc_log_status(file, fh)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: v4l_log_status
File: drivers/media/v4l2-core/v4l2-ioctl.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-30002 | LOW | 2.1 | torvalds/linux | v4l_log_status | drivers/media/v4l2-core/v4l2-ioctl.c | fb18802a338b36f675a388fc03d2aa504a0d0899 | 0 |
Analyze the following code function for security vulnerabilities | static int rkvdec_probe(struct platform_device *pdev)
{
struct rkvdec_dev *rkvdec;
unsigned int i;
int ret, irq;
rkvdec = devm_kzalloc(&pdev->dev, sizeof(*rkvdec), GFP_KERNEL);
if (!rkvdec)
return -ENOMEM;
platform_set_drvdata(pdev, rkvdec);
rkvdec->dev = &pdev->dev;
mutex_init(&rkvdec->vdev_lock);
INIT_DE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rkvdec_probe
File: drivers/staging/media/rkvdec/rkvdec.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362",
"CWE-416"
] | CVE-2023-35829 | HIGH | 7 | torvalds/linux | rkvdec_probe | drivers/staging/media/rkvdec/rkvdec.c | 3228cec23b8b29215e18090c6ba635840190993d | 0 |
Analyze the following code function for security vulnerabilities | static void mbim_decode_sms_cdma_text(tvbuff_t *tvb, proto_tree *tree, const int hfindex, gint offset,
guint32 encoding_id, guint32 size_in_bytes, guint32 size_in_chars)
{
unsigned char *src, *dest;
switch (encoding_id) {
case MBIM_ENCODING_7BIT_ASCII:
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mbim_decode_sms_cdma_text
File: epan/dissectors/packet-mbim.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2017-15193 | HIGH | 7.8 | wireshark | mbim_decode_sms_cdma_text | epan/dissectors/packet-mbim.c | afb9ff7982971aba6e42472de0db4c1bedfc641b | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.