instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | int msPostGISLayerSetTimeFilter(layerObj *lp, const char *timestring, const char *timefield)
{
char **atimes, **aranges = NULL;
int numtimes=0,i=0,numranges=0;
size_t buffer_size = 512;
char buffer[512], bufferTmp[512];
buffer[0] = '\0';
bufferTmp[0] = '\0';
if (!lp || !timestring || !timefield)
ret... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2013-7262
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Fix potential SQL Injection with postgis TIME filters (#4834)
Function: msPostGISLayerSetTimeFilter
File: mappostgis.c
Repository: MapServer
Fixed Code:
int msPostGISLayerSetTimeFilter(layerObj *lp, con... | [
"CWE-89"
] | CVE-2013-7262 | MEDIUM | 6.8 | MapServer | msPostGISLayerSetTimeFilter | mappostgis.c | 3a10f6b829297dae63492a8c63385044bc6953ed | 1 |
Analyze the following code function for security vulnerabilities | Scope JointMatrixINTELType::getScope() const { return getImpl()->scope; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: JointMatrixINTELType::getScope
File: mlir/lib/Dialect/SPIRV/IR/SPIRVTypes.cpp
Repository: llvm/llvm-project
The code follows secure coding practices. | [
"CWE-125"
] | CVE-2023-29942 | MEDIUM | 5.5 | llvm/llvm-project | JointMatrixINTELType::getScope | mlir/lib/Dialect/SPIRV/IR/SPIRVTypes.cpp | 30ca16ec87206294f4ad0e9688c88f32421b343e | 0 |
Analyze the following code function for security vulnerabilities | static int f2fs_read_data_page(struct file *file, struct page *page)
{
struct inode *inode = page->mapping->host;
int ret = -EAGAIN;
trace_f2fs_readpage(page, DATA);
/* If the file has inline data, try to read it directly */
if (f2fs_has_inline_data(inode))
ret = f2fs_read_inline_data(inode, page);
if (ret ==... | Vulnerability Classification:
- CWE: CWE-476
- CVE: CVE-2019-19815
- Severity: HIGH
- CVSS Score: 7.1
Description: f2fs: support swap file w/ DIO
Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
Function: f2fs_read_data_page
File: fs/f2fs/data.c
Repository: torvalds/linux
Fixed Code:
static int f2fs_read_data_page(s... | [
"CWE-476"
] | CVE-2019-19815 | HIGH | 7.1 | torvalds/linux | f2fs_read_data_page | fs/f2fs/data.c | 4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6 | 1 |
Analyze the following code function for security vulnerabilities | R_API inline int r_anal_bb_is_in_offset (RAnalBlock *bb, ut64 off) {
return (off >= bb->addr && off < bb->addr + bb->size);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: r_anal_bb_is_in_offset
File: libr/anal/bb.c
Repository: radareorg/radare2
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2018-12320 | MEDIUM | 6.8 | radareorg/radare2 | r_anal_bb_is_in_offset | libr/anal/bb.c | 90b71c017a7fa9732fe45fd21b245ee051b1f548 | 0 |
Analyze the following code function for security vulnerabilities | pcap_dumper_t *
dump_open(const char *dumpfile, ino_t* dump_inode)
{
capture_info_t *capinfo;
if (vector_count(capture_cfg.sources) == 1) {
capture_cfg.dumpfilename = dumpfile;
capinfo = vector_first(capture_cfg.sources);
FILE *fp = fopen(dumpfile,"wb+");
if (!fp)
r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump_open
File: src/capture.c
Repository: irontec/sngrep
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-31981 | HIGH | 7.8 | irontec/sngrep | dump_open | src/capture.c | 038a65883551fdccc0bb86600309bb85d2251f98 | 0 |
Analyze the following code function for security vulnerabilities | Jsi_Value* Jsi_ValueMakeNumber(Jsi_Interp *interp, Jsi_Value **vPtr, Jsi_Number n) {
Jsi_Value *v = (vPtr?*vPtr:NULL);
if (!v)
v = Jsi_ValueNew(interp);
else
Jsi_ValueReset(interp, vPtr);
v->vt = JSI_VT_NUMBER;
v->d.num = n;
return v;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Jsi_ValueMakeNumber
File: src/jsiValue.c
Repository: pcmacdon/jsish
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2020-22874 | HIGH | 7.5 | pcmacdon/jsish | Jsi_ValueMakeNumber | src/jsiValue.c | 858da537bde4de9d8c92466d5a866505310bc328 | 0 |
Analyze the following code function for security vulnerabilities | int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a,
const BIGNUM *b, BN_CTX *ctx)
{
if (group->meth->group_set_curve == 0) {
ECerr(EC_F_EC_GROUP_SET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return 0;
}
return group->meth->group_set_c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: EC_GROUP_set_curve_GFp
File: crypto/ec/ec_lib.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-1547 | LOW | 1.9 | openssl | EC_GROUP_set_curve_GFp | crypto/ec/ec_lib.c | 21c856b75d81eff61aa63b4f036bb64a85bf6d46 | 0 |
Analyze the following code function for security vulnerabilities | Handle<JSArray> Factory::NewJSArray(ElementsKind elements_kind,
int length,
int capacity,
ArrayStorageAllocationMode mode,
PretenureFlag pretenure) {
Handle<JSArray> array = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Factory::NewJSArray
File: src/factory.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-17"
] | CVE-2014-7931 | HIGH | 7.5 | chromium | Factory::NewJSArray | src/factory.cc | 377de64246b3c1449f4e2090622ae1e1691e51ae | 0 |
Analyze the following code function for security vulnerabilities | void NppParameters::setFontList(HWND hWnd)
{
//---------------//
// Sys font list //
//---------------//
LOGFONT lf;
_fontlist.clear();
_fontlist.reserve(64); // arbitrary
_fontlist.push_back(generic_string());
lf.lfCharSet = DEFAULT_CHARSET;
lf.lfFaceName[0]='\0';
lf.lfPitchAndFamily = 0;
HDC hDC = ::GetDC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: NppParameters::setFontList
File: PowerEditor/src/Parameters.cpp
Repository: notepad-plus-plus
The code follows secure coding practices. | [
"CWE-427"
] | CVE-2022-32168 | HIGH | 7.8 | notepad-plus-plus | NppParameters::setFontList | PowerEditor/src/Parameters.cpp | 85d7215d9b3e0d5a8433fc31aec4f2966821051e | 0 |
Analyze the following code function for security vulnerabilities | gboolean janus_av1_is_keyframe(const char *buffer, int len) {
if(!buffer || len < 3)
return FALSE;
/* Read the aggregation header */
uint8_t aggrh = *buffer;
uint8_t zbit = (aggrh & 0x80) >> 7;
uint8_t nbit = (aggrh & 0x08) >> 3;
/* FIXME Ugly hack: we consider a packet with Z=0 and N=1 a keyframe */
return (!... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: janus_av1_is_keyframe
File: utils.c
Repository: meetecho/janus-gateway
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2020-14033 | HIGH | 7.5 | meetecho/janus-gateway | janus_av1_is_keyframe | utils.c | fb85040405495748dbc7c4850b97da9b67b7b47b | 0 |
Analyze the following code function for security vulnerabilities | void js_dup2(js_State *J)
{
CHECKSTACK(2);
STACK[TOP] = STACK[TOP-2];
STACK[TOP+1] = STACK[TOP-1];
TOP += 2;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: js_dup2
File: jsrun.c
Repository: ArtifexSoftware/mujs
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-10133 | HIGH | 7.5 | ArtifexSoftware/mujs | js_dup2 | jsrun.c | 77ab465f1c394bb77f00966cd950650f3f53cb24 | 0 |
Analyze the following code function for security vulnerabilities | static int ext4_htree_next_block(struct inode *dir, __u32 hash,
struct dx_frame *frame,
struct dx_frame *frames,
__u32 *start_hash)
{
struct dx_frame *p;
struct buffer_head *bh;
int err, num_frames = 0;
__u32 bhash;
p = frame;
/*
* Find the next leaf page by incrementing the frame pointer.
* I... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ext4_htree_next_block
File: fs/ext4/namei.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2009-0746 | MEDIUM | 4.9 | torvalds/linux | ext4_htree_next_block | fs/ext4/namei.c | e6b8bc09ba2075cd91fbffefcd2778b1a00bd76f | 0 |
Analyze the following code function for security vulnerabilities | void CompactProtocolReader::readBool(bool& value) {
if (boolValue_.hasBoolValue == true) {
value = boolValue_.boolValue;
boolValue_.hasBoolValue = false;
} else {
int8_t val;
readByte(val);
value = (val == detail::compact::CT_BOOLEAN_TRUE);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: CompactProtocolReader::readBool
File: thrift/lib/cpp2/protocol/CompactProtocol-inl.h
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-3553 | MEDIUM | 5 | facebook/fbthrift | CompactProtocolReader::readBool | thrift/lib/cpp2/protocol/CompactProtocol-inl.h | c9a903e5902834e95bbd4ab0e9fa53ba0189f351 | 0 |
Analyze the following code function for security vulnerabilities | static void
dispatchSIM_APDU (Parcel &p, RequestInfo *pRI) {
int32_t t;
status_t status;
RIL_SIM_APDU apdu;
#if VDBG
RLOGD("dispatchSIM_APDU");
#endif
memset (&apdu, 0, sizeof(RIL_SIM_APDU));
// Note we only check status at the end. Any single failure leads to
// subsequent reads filing.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchSIM_APDU
File: libril/ril.cpp
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-0823 | MEDIUM | 5 | android | dispatchSIM_APDU | libril/ril.cpp | cd5f15f588a5d27e99ba12f057245bfe507f8c42 | 0 |
Analyze the following code function for security vulnerabilities | void GfxSubpath::lineTo(double x1, double y1) {
if (n >= size) {
size += 16;
x = (double *)greallocn(x, size, sizeof(double));
y = (double *)greallocn(y, size, sizeof(double));
curve = (GBool *)greallocn(curve, size, sizeof(GBool));
}
x[n] = x1;
y[n] = y1;
curve[n] = gFalse;
++n;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: GfxSubpath::lineTo
File: poppler/GfxState.cc
Repository: poppler
The code follows secure coding practices. | [
"CWE-189"
] | CVE-2009-3606 | HIGH | 9.3 | poppler | GfxSubpath::lineTo | poppler/GfxState.cc | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | 0 |
Analyze the following code function for security vulnerabilities | static void *htab_lru_map_lookup_elem_sys(struct bpf_map *map, void *key)
{
return __htab_lru_map_lookup_elem(map, key, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: htab_lru_map_lookup_elem_sys
File: kernel/bpf/hashtab.c
Repository: kernel/git/bpf/bpf
The code follows secure coding practices. | [
"CWE-190",
"CWE-787"
] | CVE-2021-38166 | MEDIUM | 4.6 | kernel/git/bpf/bpf | htab_lru_map_lookup_elem_sys | kernel/bpf/hashtab.c | c4eb1f403243fc7bbb7de644db8587c03de36da6 | 0 |
Analyze the following code function for security vulnerabilities | PJ_DEF(pjsip_transport_type_e) pjsip_transport_get_type_from_name(const pj_str_t *name)
{
unsigned i;
if (name->slen == 0)
return PJSIP_TRANSPORT_UNSPECIFIED;
/* Get transport type from name. */
for (i=0; i<PJ_ARRAY_SIZE(transport_names); ++i) {
if (pj_stricmp(name, &transport_names[i].name) == 0) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pjsip_transport_get_type_from_name
File: pjsip/src/pjsip/sip_transport.c
Repository: pjsip/pjproject
The code follows secure coding practices. | [
"CWE-295"
] | CVE-2020-15260 | MEDIUM | 4.3 | pjsip/pjproject | pjsip_transport_get_type_from_name | pjsip/src/pjsip/sip_transport.c | 67e46c1ac45ad784db5b9080f5ed8b133c122872 | 0 |
Analyze the following code function for security vulnerabilities | int js_isobject(js_State *J, int idx) { return stackidx(J, idx)->type == JS_TOBJECT; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: js_isobject
File: jsrun.c
Repository: ArtifexSoftware/mujs
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-10133 | HIGH | 7.5 | ArtifexSoftware/mujs | js_isobject | jsrun.c | 77ab465f1c394bb77f00966cd950650f3f53cb24 | 0 |
Analyze the following code function for security vulnerabilities | static void tun_put(struct tun_struct *tun)
{
dev_put(tun->dev);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tun_put
File: drivers/net/tun.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-843"
] | CVE-2023-1076 | MEDIUM | 5.5 | torvalds/linux | tun_put | drivers/net/tun.c | a096ccca6e503a5c575717ff8a36ace27510ab0a | 0 |
Analyze the following code function for security vulnerabilities | static void OnRejoin1CycleTimerEvent( void* context )
{
TimerStop( &MacCtx.Rejoin1CycleTimer );
ConvertRejoinCycleTime( Nvm.MacGroup2.Rejoin1CycleInSec, &MacCtx.Rejoin1CycleTime );
if( ( MacCtx.MacCallbacks != NULL ) && ( MacCtx.MacCallbacks->MacProcessNotify != NULL ) )
{
MacCtx.MacCallbacks->... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: OnRejoin1CycleTimerEvent
File: src/mac/LoRaMac.c
Repository: Lora-net/LoRaMac-node
The code follows secure coding practices. | [
"CWE-193"
] | CVE-2022-39274 | CRITICAL | 9.8 | Lora-net/LoRaMac-node | OnRejoin1CycleTimerEvent | src/mac/LoRaMac.c | e851b079c82ba1bcf3f4d291ab69a571b0bf458a | 0 |
Analyze the following code function for security vulnerabilities | int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy,
STACK_OF(X509) *certs,
STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags)
{
int init_ret;
int ret;
int calc_ret;
X509_POLICY_TREE *tree = NULL;
STACK_OF(X509_POLICY_NODE) *nodes, *... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: X509_policy_check
File: crypto/x509v3/pcy_tree.c
Repository: openssl
The code follows secure coding practices. | [
"CWE-295"
] | CVE-2023-0464 | HIGH | 7.5 | openssl | X509_policy_check | crypto/x509v3/pcy_tree.c | 879f7080d7e141f415c79eaa3a8ac4a3dad0348b | 0 |
Analyze the following code function for security vulnerabilities | static VncRectStat *vnc_stat_rect(VncDisplay *vd, int x, int y)
{
struct VncSurface *vs = &vd->guest;
return &vs->stats[y / VNC_STAT_RECT][x / VNC_STAT_RECT];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: vnc_stat_rect
File: ui/vnc.c
Repository: qemu-project/qemu
The code follows secure coding practices. | [
"CWE-191"
] | CVE-2022-3165 | MEDIUM | 6.5 | qemu-project/qemu | vnc_stat_rect | ui/vnc.c | d307040b18 | 0 |
Analyze the following code function for security vulnerabilities | void PropertiesWidget::loadTorrentInfos(BitTorrent::TorrentHandle *const torrent)
{
clear();
m_torrent = torrent;
downloaded_pieces->setTorrent(m_torrent);
pieces_availability->setTorrent(m_torrent);
if (!m_torrent) return;
// Save path
updateSavePath(m_torrent);
// Hash
hash_lbl->s... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2017-6503
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Add Utils::String::toHtmlEscaped
Function: PropertiesWidget::loadTorrentInfos
File: src/gui/properties/propertieswidget.cpp
Repository: qbittorrent/qBittorrent
Fixed Code:
void PropertiesWidget::loadTor... | [
"CWE-79"
] | CVE-2017-6503 | MEDIUM | 4.3 | qbittorrent/qBittorrent | PropertiesWidget::loadTorrentInfos | src/gui/properties/propertieswidget.cpp | 6ca3e4f094da0a0017cb2d483ec1db6176bb0b16 | 1 |
Analyze the following code function for security vulnerabilities | void Instance::CreateToolbar(const ToolbarButtonInfo* tb_info, size_t size) {
toolbar_.reset(new FadingControls());
DCHECK(tb_info);
DCHECK(size >= 0);
// Remember the current toolbar information in case we need to recreate the
// images later.
current_tb_info_ = tb_info;
current_tb_info_size_ = size;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Instance::CreateToolbar
File: pdf/instance.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2014-3198 | MEDIUM | 5 | chromium | Instance::CreateToolbar | pdf/instance.cc | 9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | 0 |
Analyze the following code function for security vulnerabilities | GF_Err aom_av1_parse_temporal_unit_from_annexb(GF_BitStream *bs, AV1State *state)
{
GF_Err e = GF_OK;
u64 sz = read_leb128(bs, NULL);
if (!bs || !state) return GF_BAD_PARAM;
GF_LOG(GF_LOG_DEBUG, GF_LOG_CONTAINER, ("[AV1] Annex B temporal unit detected (size "LLU") ***** \n", sz));
while (sz > 0) {
u8 Leb128Byte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: aom_av1_parse_temporal_unit_from_annexb
File: src/media_tools/av_parsers.c
Repository: gpac
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2019-20160 | MEDIUM | 4.3 | gpac | aom_av1_parse_temporal_unit_from_annexb | src/media_tools/av_parsers.c | bcfcb3e90476692fe0d2bb532ea8deeb2a77580e | 0 |
Analyze the following code function for security vulnerabilities | static int
dissect_lte_rrc_SPS_Config_v1430(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_lte_rrc_SPS_Config_v1430, SPS_Config_v1430_sequence);
return offset;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dissect_lte_rrc_SPS_Config_v1430
File: epan/dissectors/packet-lte-rrc.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2020-9431 | MEDIUM | 5 | wireshark | dissect_lte_rrc_SPS_Config_v1430 | epan/dissectors/packet-lte-rrc.c | 086003c9d616906e08bbeeab9c17b3aa4c6ff850 | 0 |
Analyze the following code function for security vulnerabilities | uint32_t Hash() override { return hash_; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Hash
File: src/objects.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5128 | MEDIUM | 6.8 | chromium | Hash | src/objects.cc | 2c8ca9ad09281d4138ae363566051e45afd0838c | 0 |
Analyze the following code function for security vulnerabilities | static void svm_vmexit_ud_intercept(struct cpu_user_regs *regs)
{
struct hvm_emulate_ctxt ctxt;
int rc;
if ( opt_hvm_fep )
{
char sig[5]; /* ud2; .ascii "xen" */
if ( (hvm_fetch_from_guest_virt_nofault(
sig, regs->eip, sizeof(sig), 0) == HVMCOPY_okay) &&
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: svm_vmexit_ud_intercept
File: xen/arch/x86/hvm/svm/svm.c
Repository: xen-project/xen
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2015-5307 | MEDIUM | 4.9 | xen-project/xen | svm_vmexit_ud_intercept | xen/arch/x86/hvm/svm/svm.c | bd2239d9fa975a1ee5bcd27c218ae042cd0a57bc | 0 |
Analyze the following code function for security vulnerabilities | int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d,
XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
{
int ret;
struct dt_device_node *dev;
switch ( domctl->cmd )
{
case XEN_DOMCTL_assign_device:
ASSERT(d);
/* fall through */
case XEN_DOMCTL_... | Vulnerability Classification:
- CWE: CWE-78
- CVE: CVE-2019-18424
- Severity: MEDIUM
- CVSS Score: 6.9
Description: passthrough: quarantine PCI devices
When a PCI device is assigned to an untrusted domain, it is possible for
that domain to program the device to DMA to an arbitrary address. The
IOMMU is used to protec... | [
"CWE-78"
] | CVE-2019-18424 | MEDIUM | 6.9 | xen-project/xen | iommu_do_dt_domctl | xen/drivers/passthrough/device_tree.c | 319f9a0ba94c7db505cd5dd9cb0b037ab1aa8e12 | 1 |
Analyze the following code function for security vulnerabilities | static int
dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_enumerated(tvb, offset, actx, tree, hf_index,
1, NULL, FALSE, 0, NULL);
return offset;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13
File: epan/dissectors/packet-lte-rrc.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2020-9431 | MEDIUM | 5 | wireshark | dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13 | epan/dissectors/packet-lte-rrc.c | 086003c9d616906e08bbeeab9c17b3aa4c6ff850 | 0 |
Analyze the following code function for security vulnerabilities | static void
tcp_sequence_number_analysis_print_bytes_in_flight(packet_info * pinfo _U_,
tvbuff_t * tvb,
proto_tree * flags_tree,
struct tcp_acked *ta
)
{
proto_item * flags_item;
if (tcp_track_bytes_in_flight)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tcp_sequence_number_analysis_print_bytes_in_flight
File: epan/dissectors/packet-tcp.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9258 | MEDIUM | 5 | wireshark | tcp_sequence_number_analysis_print_bytes_in_flight | epan/dissectors/packet-tcp.c | 2d4695de1477df60b0188fd581c0c279db601978 | 0 |
Analyze the following code function for security vulnerabilities | static int
add_def_function(ufunc_T *ufunc)
{
dfunc_T *dfunc;
if (def_functions.ga_len == 0)
{
// The first position is not used, so that a zero uf_dfunc_idx means it
// wasn't set.
if (GA_GROW_FAILS(&def_functions, 1))
return FAIL;
++def_functions.ga_len;
}
// Add the function to "def_fu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: add_def_function
File: src/vim9compile.c
Repository: vim
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2021-4173 | MEDIUM | 6.8 | vim | add_def_function | src/vim9compile.c | 9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04 | 0 |
Analyze the following code function for security vulnerabilities | static inline int timer_delete_hook(struct k_itimer *timer)
{
return CLOCK_DISPATCH(timer->it_clock, timer_del, (timer));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: timer_delete_hook
File: kernel/posix-timers.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2009-2767 | HIGH | 7.2 | torvalds/linux | timer_delete_hook | kernel/posix-timers.c | 70d715fd0597f18528f389b5ac59102263067744 | 0 |
Analyze the following code function for security vulnerabilities | int main(int argc, char **argv) {
const char *source_path = NULL;
const char *label = NULL;
uid_t uid = 0;
gid_t gid = 0;
userid_t userid = 0;
bool multi_user = false;
bool full_write = false;
int i;
struct rlimit rlim;
int fs_version;
int opt;
while ((opt = getopt(argc,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: main
File: sdcard/sdcard.c
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2494 | HIGH | 9.3 | android | main | sdcard/sdcard.c | 864e2e22fcd0cba3f5e67680ccabd0302dfda45d | 0 |
Analyze the following code function for security vulnerabilities | int _yr_process_detach(YR_PROC_ITERATOR_CTX* context)
{
YR_PROC_INFO* proc_info = (YR_PROC_INFO*) context->proc_info;
CloseHandle(proc_info->hProcess);
return ERROR_SUCCESS;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _yr_process_detach
File: libyara/proc/windows.c
Repository: VirusTotal/yara
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2021-45429 | MEDIUM | 4.3 | VirusTotal/yara | _yr_process_detach | libyara/proc/windows.c | b34b7e74c862c129b801832b6b85401fbada2b01 | 0 |
Analyze the following code function for security vulnerabilities | static inline void
dump_sessionid(const char *fn, struct nfs4_sessionid *sessionid)
{
u32 *ptr = (u32 *)(&sessionid->data[0]);
dprintk("%s: %u:%u:%u:%u\n", fn, ptr[0], ptr[1], ptr[2], ptr[3]);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump_sessionid
File: fs/nfsd/nfs4state.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2009-3623 | HIGH | 7.8 | torvalds/linux | dump_sessionid | fs/nfsd/nfs4state.c | 80fc015bdfe1f5b870c1e1ee02d78e709523fee7 | 0 |
Analyze the following code function for security vulnerabilities | static void base_unsigned_one_tenth_unitless(gchar *buf, guint32 value) {
g_snprintf(buf, ITEM_LABEL_LENGTH, "%u.%u", value / 10, value % 10);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: base_unsigned_one_tenth_unitless
File: epan/dissectors/packet-btatt.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2020-7045 | LOW | 3.3 | wireshark | base_unsigned_one_tenth_unitless | epan/dissectors/packet-btatt.c | 01f261de41f4dd3233ef578e5c0ffb9c25c7d14d | 0 |
Analyze the following code function for security vulnerabilities | void gdImageColorDeallocate (gdImagePtr im, int color)
{
if (im->trueColor) {
return;
}
/* Mark it open. */
im->open[color] = 1;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gdImageColorDeallocate
File: ext/gd/libgd/gd.c
Repository: php/php-src
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2016-5767 | MEDIUM | 6.8 | php/php-src | gdImageColorDeallocate | ext/gd/libgd/gd.c | c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6 | 0 |
Analyze the following code function for security vulnerabilities | void jsi_ObjInsertObjCheck(Jsi_Interp *interp, Jsi_Obj *obj, Jsi_Value *value, bool add)
{
if (!add) return;
if (obj == value->d.obj && !interp->memLeakCnt++)
Jsi_LogWarn("recursive add of object will leak memory");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsi_ObjInsertObjCheck
File: src/jsiObj.c
Repository: pcmacdon/jsish
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2021-46499 | MEDIUM | 4.3 | pcmacdon/jsish | jsi_ObjInsertObjCheck | src/jsiObj.c | 9c9dbe59760a660e21d69d5cf6007c9ccbb5c9a3 | 0 |
Analyze the following code function for security vulnerabilities | BITCODE_BS
dwg_ent_spline_get_scenario(const dwg_ent_spline *restrict spline,
int *restrict error)
{
if (spline)
{
*error = 0;
return spline->scenario;
}
else
{
*error = 1;
LOG_ERROR("%s: empty arg", __FUNCTION__)
return 0;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dwg_ent_spline_get_scenario
File: src/dwg_api.c
Repository: LibreDWG/libredwg
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2018-14471 | MEDIUM | 4.3 | LibreDWG/libredwg | dwg_ent_spline_get_scenario | src/dwg_api.c | b03ab41c86375351925921f3dccb810007c4425d | 0 |
Analyze the following code function for security vulnerabilities | void DocumentLoader::stopLoading()
{
RefPtrWillBeRawPtr<LocalFrame> protectFrame(m_frame.get());
RefPtrWillBeRawPtr<DocumentLoader> protectLoader(this);
if (isLoading())
cancelMainResourceLoad(ResourceError::cancelledError(m_request.url()));
m_fetcher->stopFetching();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: DocumentLoader::stopLoading
File: third_party/WebKit/Source/core/loader/DocumentLoader.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2016-1655 | MEDIUM | 6.8 | chromium | DocumentLoader::stopLoading | third_party/WebKit/Source/core/loader/DocumentLoader.cpp | 43ea0649d4b70fdcf3e9fa5c03aee1bbba0b04bb | 0 |
Analyze the following code function for security vulnerabilities | struct dentry *d_lookup(const struct dentry *parent, const struct qstr *name)
{
struct dentry *dentry;
unsigned seq;
do {
seq = read_seqbegin(&rename_lock);
dentry = __d_lookup(parent, name);
if (dentry)
break;
} while (read_seqretry(&rename_lock, seq));
return dentry;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: d_lookup
File: fs/dcache.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2015-2925 | MEDIUM | 6.9 | torvalds/linux | d_lookup | fs/dcache.c | cde93be45a8a90d8c264c776fab63487b5038a65 | 0 |
Analyze the following code function for security vulnerabilities | char *
cdf_u16tos8(char *buf, size_t len, const uint16_t *p)
{
size_t i;
for (i = 0; i < len && p[i]; i++)
buf[i] = (char)p[i];
buf[i] = '\0';
return buf;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cdf_u16tos8
File: src/cdf.c
Repository: file
The code follows secure coding practices. | [
"CWE-189"
] | CVE-2014-3587 | MEDIUM | 4.3 | file | cdf_u16tos8 | src/cdf.c | 0641e56be1af003aa02c7c6b0184466540637233 | 0 |
Analyze the following code function for security vulnerabilities | void DecimalQuantity::_setToInt(int32_t n) {
if (n == INT32_MIN) {
readLongToBcd(-static_cast<int64_t>(n));
} else {
readIntToBcd(n);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: DecimalQuantity::_setToInt
File: icu4c/source/i18n/number_decimalquantity.cpp
Repository: unicode-org/icu
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2018-18928 | HIGH | 7.5 | unicode-org/icu | DecimalQuantity::_setToInt | icu4c/source/i18n/number_decimalquantity.cpp | 53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | 0 |
Analyze the following code function for security vulnerabilities | static int hci_uart_tty_ioctl(struct tty_struct *tty, struct file *file,
unsigned int cmd, unsigned long arg)
{
struct hci_uart *hu = tty->disc_data;
int err = 0;
BT_DBG("");
/* Verify the status of the device */
if (!hu)
return -EBADF;
switch (cmd) {
case HCIUARTSETPROTO:
if (!test_and_set_bit(H... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hci_uart_tty_ioctl
File: drivers/bluetooth/hci_ldisc.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2019-15917 | MEDIUM | 6.9 | torvalds/linux | hci_uart_tty_ioctl | drivers/bluetooth/hci_ldisc.c | 56897b217a1d0a91c9920cb418d6b3fe922f590a | 0 |
Analyze the following code function for security vulnerabilities | static float
angle_between(const fz_point u, const fz_point v)
{
float det = u.x * v.y - u.y * v.x;
float sign = (det < 0 ? -1 : 1);
float magu = u.x * u.x + u.y * u.y;
float magv = v.x * v.x + v.y * v.y;
float udotv = u.x * v.x + u.y * v.y;
float t = udotv / (magu * magv);
/* guard against rounding errors when ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: angle_between
File: source/xps/xps-path.c
Repository: ArtifexSoftware/mupdf
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2017-14687 | MEDIUM | 6.8 | ArtifexSoftware/mupdf | angle_between | source/xps/xps-path.c | 2b16dbd8f73269cb15ca61ece75cf8d2d196ed28 | 0 |
Analyze the following code function for security vulnerabilities | long __sched sleep_on_timeout(wait_queue_head_t *q, long timeout)
{
return sleep_on_common(q, TASK_UNINTERRUPTIBLE, timeout);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sleep_on_timeout
File: kernel/sched.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2011-4621 | MEDIUM | 4.9 | torvalds/linux | sleep_on_timeout | kernel/sched.c | f26f9aff6aaf67e9a430d16c266f91b13a5bff64 | 0 |
Analyze the following code function for security vulnerabilities | static void bdrv_co_em_bh(void *opaque)
{
BlockDriverAIOCBCoroutine *acb = opaque;
acb->common.cb(acb->common.opaque, acb->req.error);
qemu_bh_delete(acb->bh);
qemu_aio_release(acb);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bdrv_co_em_bh
File: block.c
Repository: kvm/qemu-kvm
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2012-2652 | MEDIUM | 4.4 | kvm/qemu-kvm | bdrv_co_em_bh | block.c | eba25057b9a5e19d10ace2bc7716667a31297169 | 0 |
Analyze the following code function for security vulnerabilities | void jbd2_journal_set_triggers(struct buffer_head *bh,
struct jbd2_buffer_trigger_type *type)
{
struct journal_head *jh = bh2jh(bh);
jh->b_triggers = type;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jbd2_journal_set_triggers
File: fs/jbd2/transaction.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2011-4086 | MEDIUM | 4.9 | torvalds/linux | jbd2_journal_set_triggers | fs/jbd2/transaction.c | 15291164b22a357cb211b618adfef4fa82fc0de3 | 0 |
Analyze the following code function for security vulnerabilities | char *
elfcore_write_ppc_ebb (bfd *abfd,
char *buf,
int *bufsiz,
const void *ppc_ebb,
int size)
{
char *note_name = "LINUX";
return elfcore_write_note (abfd, buf, bufsiz,
note_name, NT_PPC_EBB, p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: elfcore_write_ppc_ebb
File: bfd/elf.c
Repository: binutils-gdb
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2018-19932 | MEDIUM | 4.3 | binutils-gdb | elfcore_write_ppc_ebb | bfd/elf.c | beab453223769279cc1cef68a1622ab8978641f7 | 0 |
Analyze the following code function for security vulnerabilities | bool
rec_parser_seek (rec_parser_t parser,
size_t line_number,
size_t position)
{
if (parser->in_file)
{
if (fseek (parser->in_file, position, SEEK_SET))
return false;
}
else if (parser->in_buffer)
{
if (position > parser->in_size)
return fal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rec_parser_seek
File: src/rec-parser.c
Repository: gnu-mirror-unofficial/recutils
The code follows secure coding practices. | [
"CWE-416",
"CWE-476"
] | CVE-2021-46019 | MEDIUM | 4.3 | gnu-mirror-unofficial/recutils | rec_parser_seek | src/rec-parser.c | 34b75ed7ad492c8e38b669ebafe0176f1f9992d2 | 0 |
Analyze the following code function for security vulnerabilities | void skb_condense(struct sk_buff *skb)
{
if (skb->data_len) {
if (skb->data_len > skb->end - skb->tail ||
skb_cloned(skb))
return;
/* Nice, we can free page frag(s) right now */
__pskb_pull_tail(skb, skb->data_len);
}
/* At this point, skb->truesize might be over estimated,
* because skb had a frag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: skb_condense
File: net/core/skbuff.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-125"
] | CVE-2017-7277 | MEDIUM | 6.6 | torvalds/linux | skb_condense | net/core/skbuff.c | 4ef1b2869447411ad3ef91ad7d4891a83c1a509a | 0 |
Analyze the following code function for security vulnerabilities | static int
mailimf_resent_msg_id_parse(const char * message, size_t length,
size_t * indx,
struct mailimf_message_id ** result)
{
char * value;
size_t cur_token;
struct mailimf_message_id * message_id;
int r;
int res;
cur_token = * indx;
r = mailimf_token_case_insensitive_parse(message, le... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mailimf_resent_msg_id_parse
File: src/low-level/imf/mailimf.c
Repository: dinhvh/libetpan
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2017-8825 | MEDIUM | 5 | dinhvh/libetpan | mailimf_resent_msg_id_parse | src/low-level/imf/mailimf.c | 1fe8fbc032ccda1db9af66d93016b49c16c1f22d | 0 |
Analyze the following code function for security vulnerabilities | static int
dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_lte_rrc_UE_EUTRA_Capability_v10f0_IEs, UE_EUTRA_Capability... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs
File: epan/dissectors/packet-lte-rrc.c
Repository: wireshark
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2020-9431 | MEDIUM | 5 | wireshark | dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs | epan/dissectors/packet-lte-rrc.c | 086003c9d616906e08bbeeab9c17b3aa4c6ff850 | 0 |
Analyze the following code function for security vulnerabilities | caddr_t
bif_lisp_read (caddr_t * qst, caddr_t * err_ret, state_slot_t ** args)
{
caddr_t str = bif_string_arg (qst, args, 0, "lisp_read");
lisp_stream_t st;
volatile caddr_t res = NULL;
lisp_stream_init (&st, str);
CATCH (CATCH_LISP_ERROR)
{
res = lisp_read (&st);
}
END_CATCH;
return res;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bif_lisp_read
File: libsrc/Wi/sqlbif.c
Repository: openlink/virtuoso-opensource
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-31616 | HIGH | 7.5 | openlink/virtuoso-opensource | bif_lisp_read | libsrc/Wi/sqlbif.c | 25fff0eaa85898004bb14909e9f29d16b2918792 | 0 |
Analyze the following code function for security vulnerabilities | CRPCTable::CRPCTable()
{
unsigned int vcidx;
for (vcidx = 0; vcidx < (sizeof(vRPCCommands) / sizeof(vRPCCommands[0])); vcidx++)
{
const CRPCCommand *pcmd;
pcmd = &vRPCCommands[vcidx];
mapCommands[pcmd->name] = pcmd;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: CRPCTable::CRPCTable
File: src/bitcoinrpc.cpp
Repository: Ziftr/primecoin
The code follows secure coding practices. | [
"CWE-208"
] | CVE-2013-10006 | LOW | 1.4 | Ziftr/primecoin | CRPCTable::CRPCTable | src/bitcoinrpc.cpp | cdb3441b5cd2c1bae49fae671dc4a496f7c96322 | 0 |
Analyze the following code function for security vulnerabilities | static void pmcraid_internal_done(struct pmcraid_cmd *cmd)
{
pmcraid_info("response internal cmd CDB[0] = %x ioasc = %x\n",
cmd->ioa_cb->ioarcb.cdb[0],
le32_to_cpu(cmd->ioa_cb->ioasa.ioasc));
/* Some of the internal commands are sent with callers blocking for the
* response. Same will be indicated as... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pmcraid_internal_done
File: drivers/scsi/pmcraid.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2011-2906 | MEDIUM | 4.7 | torvalds/linux | pmcraid_internal_done | drivers/scsi/pmcraid.c | b5b515445f4f5a905c5dd27e6e682868ccd6c09d | 0 |
Analyze the following code function for security vulnerabilities | void setprocessname(const char * const title)
{
#ifndef NO_PROCNAME_CHANGE
# ifdef HAVE_SETPROCTITLE
setproctitle("-%s", title);
# elif defined(__linux__)
if (argv0 != NULL && argv_lth > strlen(title) - 2) {
memset(argv0[0], 0, argv_lth);
strncpy(argv0[0], title, argv_lth - 2);
argv0[1] ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setprocessname
File: src/ftpd.c
Repository: jedisct1/pure-ftpd
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-40524 | MEDIUM | 5 | jedisct1/pure-ftpd | setprocessname | src/ftpd.c | 37ad222868e52271905b94afea4fc780d83294b4 | 0 |
Analyze the following code function for security vulnerabilities | static inline void tlb_remove_page(struct mmu_gather *tlb, struct page *page)
{
free_page_and_swap_cache(page);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tlb_remove_page
File: include/asm-s390/tlb.h
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2143 | MEDIUM | 6.9 | torvalds/linux | tlb_remove_page | include/asm-s390/tlb.h | 6252d702c5311ce916caf75ed82e5c8245171c92 | 0 |
Analyze the following code function for security vulnerabilities | static int
iscsi_get_host_stats(struct iscsi_transport *transport, struct nlmsghdr *nlh)
{
struct iscsi_uevent *ev = nlmsg_data(nlh);
struct Scsi_Host *shost = NULL;
struct iscsi_internal *priv;
struct sk_buff *skbhost_stats;
struct nlmsghdr *nlhhost_stats;
struct iscsi_uevent *evhost_stats;
int host_stats_size ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: iscsi_get_host_stats
File: drivers/scsi/scsi_transport_iscsi.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-Other",
"CWE-125"
] | CVE-2021-27363 | LOW | 3.6 | torvalds/linux | iscsi_get_host_stats | drivers/scsi/scsi_transport_iscsi.c | 688e8128b7a92df982709a4137ea4588d16f24aa | 0 |
Analyze the following code function for security vulnerabilities | xmlElementTablePtr
xmlCopyElementTable(xmlElementTablePtr table) {
return((xmlElementTablePtr) xmlHashCopy(table, xmlCopyElement));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xmlCopyElementTable
File: valid.c
Repository: GNOME/libxml2
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2022-23308 | MEDIUM | 4.3 | GNOME/libxml2 | xmlCopyElementTable | valid.c | 652dd12a858989b14eed4e84e453059cd3ba340e | 0 |
Analyze the following code function for security vulnerabilities | static void ene_rx_reset(struct ene_device *dev)
{
ene_clear_reg_mask(dev, ENE_CIRCFG, ENE_CIRCFG_RX_EN);
ene_set_reg_mask(dev, ENE_CIRCFG, ENE_CIRCFG_RX_EN);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ene_rx_reset
File: drivers/media/rc/ene_ir.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2023-1118 | HIGH | 7.8 | torvalds/linux | ene_rx_reset | drivers/media/rc/ene_ir.c | 29b0589a865b6f66d141d79b2dd1373e4e50fe17 | 0 |
Analyze the following code function for security vulnerabilities | int wc_RsaSSL_VerifyInline(byte* in, word32 inLen, byte** out, RsaKey* key)
{
WC_RNG* rng;
#ifdef WC_RSA_BLINDING
rng = key->rng;
#else
rng = NULL;
#endif
return RsaPrivateDecryptEx(in, inLen, in, inLen, out, key,
RSA_PUBLIC_DECRYPT, RSA_BLOCK_TYPE_1, WC_RSA_PKCSV15_PAD,
WC_HASH_TYPE_NON... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wc_RsaSSL_VerifyInline
File: wolfcrypt/src/rsa.c
Repository: wolfSSL/wolfssl
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2020-36177 | HIGH | 10 | wolfSSL/wolfssl | wc_RsaSSL_VerifyInline | wolfcrypt/src/rsa.c | fb2288c46dd4c864b78f00a47a364b96a09a5c0f | 0 |
Analyze the following code function for security vulnerabilities | void kvm_ioapic_destroy(struct kvm *kvm)
{
struct kvm_ioapic *ioapic = kvm->arch.vioapic;
if (!ioapic)
return;
cancel_delayed_work_sync(&ioapic->eoi_inject);
mutex_lock(&kvm->slots_lock);
kvm_io_bus_unregister_dev(kvm, KVM_MMIO_BUS, &ioapic->dev);
mutex_unlock(&kvm->slots_lock);
kvm->arch.vioapic = NULL;
kf... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: kvm_ioapic_destroy
File: arch/x86/kvm/ioapic.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2020-27152 | LOW | 2.1 | torvalds/linux | kvm_ioapic_destroy | arch/x86/kvm/ioapic.c | 77377064c3a94911339f13ce113b3abf265e06da | 0 |
Analyze the following code function for security vulnerabilities | static void
dissect_rsvp_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gboolean e2ei)
{
guint8 message_type;
int session_off, tempfilt_off;
rsvp_conversation_info *rsvph;
conversation_t *conversation;
struct rsvp_request_key request_key, *new_request_key;
struct rsvp... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2015-8727
- Severity: MEDIUM
- CVSS Score: 4.3
Description: RSVP: copy all rsvp_request_key info in file scope
This is needed as it is later used for comparisons in the request hash table
Bug: 11793
Change-Id: I5fce82f77c27cf728c61676ef937fbbcd0833fd9
Reviewed-o... | [
"CWE-20"
] | CVE-2015-8727 | MEDIUM | 4.3 | wireshark | dissect_rsvp_common | epan/dissectors/packet-rsvp.c | 56baca60271379cb97f6a4a6bf72eb526e8b52d0 | 1 |
Analyze the following code function for security vulnerabilities | static int copy_vm86_regs_to_user(struct vm86_regs __user *user,
const struct kernel_vm86_regs *regs)
{
int ret = 0;
/*
* kernel_vm86_regs is missing gs, so copy everything up to
* (but not including) orig_eax, and then rest including orig_eax.
*/
ret += copy_to_user(user, regs, offsetof(struct kernel_v... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy_vm86_regs_to_user
File: arch/x86/kernel/vm86_32.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2012-1179 | MEDIUM | 5.2 | torvalds/linux | copy_vm86_regs_to_user | arch/x86/kernel/vm86_32.c | 4a1d704194a441bf83c636004a479e01360ec850 | 0 |
Analyze the following code function for security vulnerabilities | static void classdump_java(RCore *r, RBinClass *c) {
RBinField *f;
RListIter *iter2, *iter3;
RBinSymbol *sym;
char *pn = strdup (c->name);
char *cn = (char *)r_str_rchr (pn, NULL, '/');
if (cn) {
*cn = 0;
cn++;
r_str_replace_char (pn, '/', '.');
}
r_cons_printf ("package %s;\n\n", pn);
r_cons_printf ("pu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: classdump_java
File: libr/core/cbin.c
Repository: radareorg/radare2
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2019-14745 | MEDIUM | 6.8 | radareorg/radare2 | classdump_java | libr/core/cbin.c | f0c6dfa7a3eaad6a4a684ebfac0b2d282266adf9 | 0 |
Analyze the following code function for security vulnerabilities | XRef *XRef::copy() const
{
XRef *xref = new XRef();
xref->str = str->copy();
xref->strOwner = true;
xref->encrypted = encrypted;
xref->permFlags = permFlags;
xref->ownerPasswordOk = ownerPasswordOk;
xref->rootGen = rootGen;
xref->rootNum = rootNum;
xref->start = start;
xref->pre... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: XRef::copy
File: poppler/XRef.cc
Repository: poppler
The code follows secure coding practices. | [
"CWE-617"
] | CVE-2022-37052 | MEDIUM | 6.5 | poppler | XRef::copy | poppler/XRef.cc | 8677500399fc2548fa816b619580c2c07915a98c | 0 |
Analyze the following code function for security vulnerabilities | static void __ref show_saved_mc(void)
{
int i, j;
unsigned int sig, pf, rev, total_size, data_size, date;
struct ucode_cpu_info uci;
if (mc_saved_data.mc_saved_count == 0) {
pr_debug("no microcode data saved.\n");
return;
}
pr_debug("Total microcode saved: %d\n", mc_saved_data.mc_saved_count);
collect_cpu_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: show_saved_mc
File: arch/x86/kernel/cpu/microcode/intel_early.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2015-2666 | MEDIUM | 6.9 | torvalds/linux | show_saved_mc | arch/x86/kernel/cpu/microcode/intel_early.c | f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4 | 0 |
Analyze the following code function for security vulnerabilities | static ssize_t mem_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
return mem_rw(file, (char __user*)buf, count, ppos, 1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mem_write
File: fs/proc/base.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2018-1120 | LOW | 3.5 | torvalds/linux | mem_write | fs/proc/base.c | 7f7ccc2ccc2e70c6054685f5e3522efa81556830 | 0 |
Analyze the following code function for security vulnerabilities | static size_t inet_get_link_af_size(const struct net_device *dev,
u32 ext_filter_mask)
{
struct in_device *in_dev = rcu_dereference_rtnl(dev->ip_ptr);
if (!in_dev)
return 0;
return nla_total_size(IPV4_DEVCONF_MAX * 4); /* IFLA_INET_CONF */
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inet_get_link_af_size
File: net/ipv4/devinet.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2016-3156 | LOW | 2.1 | torvalds/linux | inet_get_link_af_size | net/ipv4/devinet.c | fbd40ea0180a2d328c5adc61414dc8bab9335ce2 | 0 |
Analyze the following code function for security vulnerabilities | int
sql_trans_set_partition_table(sql_trans *tr, sql_table *t)
{
int res = LOG_OK;
sqlstore *store = tr->store;
if (t && (isRangePartitionTable(t) || isListPartitionTable(t))) {
sql_schema *syss = find_sql_schema(tr, isGlobal(t)?"sys":"tmp");
sql_table *partitions = find_sql_table(tr, syss, "table_partitions");... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sql_trans_set_partition_table
File: sql/storage/store.c
Repository: MonetDB
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-36366 | HIGH | 7.5 | MonetDB | sql_trans_set_partition_table | sql/storage/store.c | f50b4691a5bedf130ec486963e5b5bff83927ac6 | 0 |
Analyze the following code function for security vulnerabilities | content::ResourceContext*
ProfileImplIOData::Handle::GetResourceContext() const {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
LazyInitialize();
return GetResourceContextNoInit();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ProfileImplIOData::Handle::GetResourceContext
File: chrome/browser/profiles/profile_impl_io_data.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2011-3083 | MEDIUM | 5 | chromium | ProfileImplIOData::Handle::GetResourceContext | chrome/browser/profiles/profile_impl_io_data.cc | d6b061bf189e0661a3d94d89dbcb2e6f70b433da | 0 |
Analyze the following code function for security vulnerabilities | static int task_switch_32(struct x86_emulate_ctxt *ctxt,
u16 tss_selector, u16 old_tss_sel,
ulong old_tss_base, struct desc_struct *new_desc)
{
const struct x86_emulate_ops *ops = ctxt->ops;
struct tss_segment_32 tss_seg;
int ret;
u32 new_tss_base = get_desc_base(new_desc);
u32 eip_offset = offsetof(stru... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: task_switch_32
File: arch/x86/kvm/emulate.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2014-8481 | MEDIUM | 4.9 | torvalds/linux | task_switch_32 | arch/x86/kvm/emulate.c | a430c9166312e1aa3d80bce32374233bdbfeba32 | 0 |
Analyze the following code function for security vulnerabilities | static void
xfs_inode_buf_read_verify(
struct xfs_buf *bp)
{
xfs_inode_buf_verify(bp, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xfs_inode_buf_read_verify
File: fs/xfs/libxfs/xfs_inode_buf.c
Repository: xfs/xfs-linux
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2018-13095 | MEDIUM | 4.3 | xfs/xfs-linux | xfs_inode_buf_read_verify | fs/xfs/libxfs/xfs_inode_buf.c | 23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | 0 |
Analyze the following code function for security vulnerabilities | char *file_in_same_dir(const char *path, const char *filename) {
char *e, *r;
size_t k;
assert(path);
assert(filename);
/* This removes the last component of path and appends
* filename, unless the latter is absolute anyway or the
* former isn't */
if... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: file_in_same_dir
File: src/util.c
Repository: systemd
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2012-1174 | LOW | 3.3 | systemd | file_in_same_dir | src/util.c | 5ebff5337594d690b322078c512eb222d34aaa82 | 0 |
Analyze the following code function for security vulnerabilities | static void
mg_free_ex(void *memory, const char *file, unsigned line)
{
void *data = (void *)(((char *)memory) - 2 * sizeof(uintptr_t));
#if defined(MEMORY_DEBUGGING)
char mallocStr[256];
#else
(void)file;
(void)line;
#endif
if (memory) {
uintptr_t size = ((uintptr_t *)data)[0];
struct mg_memory_stat *mstat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mg_free_ex
File: src/civetweb.c
Repository: civetweb
The code follows secure coding practices. | [
"CWE-200",
"CWE-125"
] | CVE-2018-12684 | MEDIUM | 5.8 | civetweb | mg_free_ex | src/civetweb.c | 8fd069f6dedb064339f1091069ac96f3f8bdb552 | 0 |
Analyze the following code function for security vulnerabilities | static void read_sbr_extension(AACContext *ac, SpectralBandReplication *sbr,
GetBitContext *gb,
int bs_extension_id, int *num_bits_left)
{
switch (bs_extension_id) {
case EXTENSION_ID_PS:
if (!ac->oc[1].m4ac.ps) {
av_log(ac->avctx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read_sbr_extension
File: libavcodec/aacsbr.c
Repository: ffmpeg
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2015-6820 | HIGH | 7.5 | ffmpeg | read_sbr_extension | libavcodec/aacsbr.c | 79a98294da6cd85f8c86b34764c5e0c43b09eea3 | 0 |
Analyze the following code function for security vulnerabilities | GF_Err gf_odf_write_kw(GF_BitStream *bs, GF_KeyWord *kwd)
{
GF_Err e;
u32 size, i;
GF_KeyWordItem *tmp;
if (!kwd) return GF_BAD_PARAM;
e = gf_odf_size_descriptor((GF_Descriptor *)kwd, &size);
if (e) return e;
e = gf_odf_write_base_descriptor(bs, kwd->tag, size);
if (e) return e;
gf_bs_write_int(bs, kwd->lang... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gf_odf_write_kw
File: src/odf/odf_code.c
Repository: gpac
The code follows secure coding practices. | [
"CWE-125"
] | CVE-2020-19751 | MEDIUM | 6.4 | gpac | gf_odf_write_kw | src/odf/odf_code.c | c26b0aa605aaea1f0ebe8d21fe1398d94680adf7 | 0 |
Analyze the following code function for security vulnerabilities | static s32
brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg,
struct net_device *ndev,
const struct brcmf_event_msg *e, void *data)
{
struct wiphy *wiphy = cfg_to_wiphy(cfg);
static int generation;
u32 event = e->event_code;
u32 reason = e->reason;
struct station_info *sinfo;
brc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: brcmf_notify_connect_status_ap
File: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2019-9500 | HIGH | 7.9 | torvalds/linux | brcmf_notify_connect_status_ap | drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c | 1b5e2423164b3670e8bc9174e4762d297990deff | 0 |
Analyze the following code function for security vulnerabilities | iw_uint32 iwpvt_prng_rand(struct iw_prng *prng)
{
iw_uint64 x;
x = ((iw_uint64)0xfff0bf23) * prng->multiply + prng->carry;
prng->carry = (iw_uint32)(x>>32);
prng->multiply = 0xffffffff - (0xffffffff & x);
return prng->multiply;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: iwpvt_prng_rand
File: src/imagew-util.c
Repository: jsummers/imageworsener
The code follows secure coding practices. | [
"CWE-682"
] | CVE-2017-8326 | MEDIUM | 6.8 | jsummers/imageworsener | iwpvt_prng_rand | src/imagew-util.c | a00183107d4b84bc8a714290e824ca9c68dac738 | 0 |
Analyze the following code function for security vulnerabilities | static Editor::Command command(Document* document, const String& commandName, bool userInterface = false)
{
Frame* frame = document->frame();
if (!frame || frame->document() != document)
return Editor::Command();
document->updateStyleIfNeeded();
return frame->editor().command(commandName, userI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: command
File: third_party/WebKit/Source/core/dom/Document.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-399"
] | CVE-2013-6655 | HIGH | 7.5 | chromium | command | third_party/WebKit/Source/core/dom/Document.cpp | 5d37b543df5ddecfd6f1d89335f37f29dc86f80d | 0 |
Analyze the following code function for security vulnerabilities | static char * OVS_WARN_UNUSED_RESULT
parse_GOTO_TABLE(char *arg, struct ofpbuf *ofpacts,
enum ofputil_protocol *usable_protocols OVS_UNUSED)
{
struct ofpact_goto_table *ogt = ofpact_put_GOTO_TABLE(ofpacts);
char *table_s = strsep(&arg, ",");
if (!table_s || !table_s[0]) {
return xst... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parse_GOTO_TABLE
File: lib/ofp-actions.c
Repository: openvswitch/ovs
The code follows secure coding practices. | [
"CWE-125"
] | CVE-2018-17206 | MEDIUM | 4 | openvswitch/ovs | parse_GOTO_TABLE | lib/ofp-actions.c | 9237a63c47bd314b807cda0bd2216264e82edbe8 | 0 |
Analyze the following code function for security vulnerabilities | void mbed_stats_heap_get(mbed_stats_heap_t *stats)
{
#ifdef MBED_HEAP_STATS_ENABLED
extern uint32_t mbed_heap_size;
heap_stats.reserved_size = mbed_heap_size;
malloc_stats_mutex->lock();
memcpy(stats, &heap_stats, sizeof(mbed_stats_heap_t));
malloc_stats_mutex->unlock();
#else
memset(stats, 0, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mbed_stats_heap_get
File: platform/source/mbed_alloc_wrappers.cpp
Repository: ARMmbed/mbed-os
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2021-27433 | HIGH | 7.5 | ARMmbed/mbed-os | mbed_stats_heap_get | platform/source/mbed_alloc_wrappers.cpp | 151ebfcfc9f2383ee11ce3c771c3bf92900d6b43 | 0 |
Analyze the following code function for security vulnerabilities | static int fid_to_qid(V9fsPDU *pdu, V9fsFidState *fidp, V9fsQID *qidp)
{
struct stat stbuf;
int err;
err = v9fs_co_lstat(pdu, &fidp->path, &stbuf);
if (err < 0) {
return err;
}
stat_to_qid(&stbuf, qidp);
return 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fid_to_qid
File: hw/9pfs/9p.c
Repository: qemu
The code follows secure coding practices. | [
"CWE-772"
] | CVE-2016-8577 | LOW | 2.1 | qemu | fid_to_qid | hw/9pfs/9p.c | e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | 0 |
Analyze the following code function for security vulnerabilities | static pointer get_vector_object(scheme *sc, int len, pointer init)
{
pointer cells = get_consecutive_cells(sc,len/2+len%2+1);
if(sc->no_memory) { return sc->sink; }
/* Record it as a vector so that gc understands it. */
typeflag(cells) = (T_VECTOR | T_ATOM);
ivalue_unchecked(cells)=len;
set_num_integer(cel... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get_vector_object
File: plug-ins/script-fu/tinyscheme/scheme.c
Repository: GNOME/gimp
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2012-2763 | HIGH | 7.5 | GNOME/gimp | get_vector_object | plug-ins/script-fu/tinyscheme/scheme.c | 744f7a4a2b5acb8b531a6f5dd8744ebb95348fc2 | 0 |
Analyze the following code function for security vulnerabilities | static bool
gs_pattern2_uses_base_space(const gs_pattern_template_t *ptemp)
{
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gs_pattern2_uses_base_space
File: base/gsptype2.c
Repository: ArtifexSoftware/ghostpdl
The code follows secure coding practices. | [
"CWE-704"
] | CVE-2018-19134 | MEDIUM | 6.8 | ArtifexSoftware/ghostpdl | gs_pattern2_uses_base_space | base/gsptype2.c | 693baf02152119af6e6afd30bb8ec76d14f84bbf | 0 |
Analyze the following code function for security vulnerabilities | void XclImpSpinButtonObj::DoProcessControl( ScfPropertySet& rPropSet ) const
{
// Calc's "Border" property is not the 3D/flat style effect in Excel (#i34712#)
rPropSet.SetProperty( CREATE_OUSTRING( "Border" ), ::com::sun::star::awt::VisualEffect::NONE );
rPropSet.SetProperty< sal_Int32 >( CREATE_OUSTRING( "... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: XclImpSpinButtonObj::DoProcessControl
File: sc/source/filter/excel/xiescher.cxx
Repository: libreoffice/core
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2012-4233 | MEDIUM | 4.3 | libreoffice/core | XclImpSpinButtonObj::DoProcessControl | sc/source/filter/excel/xiescher.cxx | 6789ec4c1a9c6af84bd62e650a03226a46365d97 | 0 |
Analyze the following code function for security vulnerabilities | static bool path_connected(const struct path *path)
{
struct vfsmount *mnt = path->mnt;
/* Only bind mounts can have disconnected paths */
if (mnt->mnt_root == mnt->mnt_sb->s_root)
return true;
return is_subdir(path->dentry, mnt->mnt_root);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: path_connected
File: fs/namei.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2017-7533 | MEDIUM | 6.9 | torvalds/linux | path_connected | fs/namei.c | 49d31c2f389acfe83417083e1208422b4091cd9e | 0 |
Analyze the following code function for security vulnerabilities | static bool eapol_frame_watch_match_ifindex(const void *a, const void *b)
{
struct eapol_frame_watch *efw =
l_container_of(a, struct eapol_frame_watch, super);
return efw->ifindex == L_PTR_TO_UINT(b);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: eapol_frame_watch_match_ifindex
File: src/eapol.c
Repository: wireless/iwd
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-52161 | HIGH | 7.5 | wireless/iwd | eapol_frame_watch_match_ifindex | src/eapol.c | 6415420f1c92012f64063c131480ffcef58e60ca | 0 |
Analyze the following code function for security vulnerabilities | void kvm_free_pit(struct kvm *kvm)
{
struct hrtimer *timer;
if (kvm->arch.vpit) {
kvm_io_bus_unregister_dev(kvm, KVM_PIO_BUS, &kvm->arch.vpit->dev);
kvm_io_bus_unregister_dev(kvm, KVM_PIO_BUS,
&kvm->arch.vpit->speaker_dev);
kvm_unregister_irq_mask_notifier(kvm, 0,
&kvm->arch.vpit->mask_n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: kvm_free_pit
File: arch/x86/kvm/i8254.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2014-3611 | MEDIUM | 4.7 | torvalds/linux | kvm_free_pit | arch/x86/kvm/i8254.c | 2febc839133280d5a5e8e1179c94ea674489dae2 | 0 |
Analyze the following code function for security vulnerabilities | double
bif_double_arg (caddr_t * qst, state_slot_t ** args, int nth, const char *func)
{
caddr_t arg = bif_arg_unrdf (qst, args, nth, func);
dtp_t dtp = DV_TYPE_OF (arg);
if (dtp == DV_SHORT_INT || dtp == DV_LONG_INT)
return ((double) unbox (arg));
else if (dtp == DV_SINGLE_FLOAT)
return ((double) unbox_flo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bif_double_arg
File: libsrc/Wi/sqlbif.c
Repository: openlink/virtuoso-opensource
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-31616 | HIGH | 7.5 | openlink/virtuoso-opensource | bif_double_arg | libsrc/Wi/sqlbif.c | 25fff0eaa85898004bb14909e9f29d16b2918792 | 0 |
Analyze the following code function for security vulnerabilities | static void print_trailer(struct kmem_cache *s, struct page *page, u8 *p)
{
unsigned int off; /* Offset of last byte */
u8 *addr = page_address(page);
print_tracking(s, p);
print_page_info(page);
pr_err("INFO: Object 0x%p @offset=%tu fp=0x%p\n\n",
p, p - addr, get_freepointer(s, p));
if (s->flags & SL... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: print_trailer
File: mm/slub.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2020-29370 | MEDIUM | 4.4 | torvalds/linux | print_trailer | mm/slub.c | fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8 | 0 |
Analyze the following code function for security vulnerabilities | static int wait_consider_task(struct wait_opts *wo, int ptrace,
struct task_struct *p)
{
int ret = eligible_child(wo, p);
if (!ret)
return ret;
ret = security_task_wait(p);
if (unlikely(ret < 0)) {
/*
* If we have not yet seen any eligible child,
* then let this error code replace -ECHILD.
* A per... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wait_consider_task
File: kernel/exit.c
Repository: torvalds/linux
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2012-0879 | MEDIUM | 4.9 | torvalds/linux | wait_consider_task | kernel/exit.c | b69f2292063d2caf37ca9aec7d63ded203701bf3 | 0 |
Analyze the following code function for security vulnerabilities | static int sctp_auth_compare_vectors(struct sctp_auth_bytes *vector1,
struct sctp_auth_bytes *vector2)
{
int diff;
int i;
const __u8 *longer;
diff = vector1->len - vector2->len;
if (diff) {
longer = (diff > 0) ? vector1->data : vector2->data;
/* Check to see if the longer number is
* lead-zero pa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sctp_auth_compare_vectors
File: net/sctp/auth.c
Repository: kernel/git/netdev/net
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2010-3705 | HIGH | 8.3 | kernel/git/netdev/net | sctp_auth_compare_vectors | net/sctp/auth.c | 51e97a12bef19b7e43199fc153cf9bd5f2140362 | 0 |
Analyze the following code function for security vulnerabilities | static int
qemuProcessRefreshCPUMigratability(virQEMUDriverPtr driver,
virDomainObjPtr vm,
qemuDomainAsyncJob asyncJob)
{
qemuDomainObjPrivatePtr priv = vm->privateData;
virDomainDefPtr def = vm->def;
bool migratable;
int rc;
if ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: qemuProcessRefreshCPUMigratability
File: src/qemu/qemu_process.c
Repository: libvirt
The code follows secure coding practices. | [
"CWE-416"
] | CVE-2021-3975 | MEDIUM | 6.5 | libvirt | qemuProcessRefreshCPUMigratability | src/qemu/qemu_process.c | 1ac703a7d0789e46833f4013a3876c2e3af18ec7 | 0 |
Analyze the following code function for security vulnerabilities | std::set<RenderWidgetHostView*>
WebContentsImpl::GetRenderWidgetHostViewsInTree() {
std::set<RenderWidgetHostView*> set;
if (ShowingInterstitialPage()) {
set.insert(GetRenderWidgetHostView());
} else {
ForEachFrame(
base::Bind(&AddRenderWidgetHostViewToSet, base::Unretained(&set)));
}
return s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: WebContentsImpl::GetRenderWidgetHostViewsInTree
File: content/browser/web_contents/web_contents_impl.cc
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-7899 | MEDIUM | 5 | chromium | WebContentsImpl::GetRenderWidgetHostViewsInTree | content/browser/web_contents/web_contents_impl.cc | 5cfbddc9cc972f5133f26664dbf5810bb569cd04 | 0 |
Analyze the following code function for security vulnerabilities | static int php_pgsql_get_default_link(INTERNAL_FUNCTION_PARAMETERS)
{
if (PGG(default_link)==-1) { /* no link opened yet, implicitly open one */
ht = 0;
php_pgsql_do_connect(INTERNAL_FUNCTION_PARAM_PASSTHRU,0);
}
return PGG(default_link);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: php_pgsql_get_default_link
File: ext/pgsql/pgsql.c
Repository: php/php-src
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2015-1352 | MEDIUM | 5 | php/php-src | php_pgsql_get_default_link | ext/pgsql/pgsql.c | 124fb22a13fafa3648e4e15b4f207c7096d8155e | 0 |
Analyze the following code function for security vulnerabilities | void SVGDocumentExtensions::reportError(const String& message)
{
reportMessage(m_document, ErrorMessageLevel, "Error: " + message);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: SVGDocumentExtensions::reportError
File: third_party/WebKit/Source/core/svg/SVGDocumentExtensions.cpp
Repository: chromium
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-3168 | HIGH | 7.5 | chromium | SVGDocumentExtensions::reportError | third_party/WebKit/Source/core/svg/SVGDocumentExtensions.cpp | f592cf6a66b63decc7e7093b36501229a5de1f1d | 0 |
Analyze the following code function for security vulnerabilities | STATIC void
S_ssc_cp_and(pTHX_ regnode_ssc *ssc, const UV cp)
{
/* AND just the single code point 'cp' into the SSC 'ssc' */
SV* cp_list = _new_invlist(2);
PERL_ARGS_ASSERT_SSC_CP_AND;
assert(is_ANYOF_SYNTHETIC(ssc));
cp_list = add_cp_to_invlist(cp_list, cp);
ssc_intersection(ssc, cp_list,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: S_ssc_cp_and
File: regcomp.c
Repository: Perl/perl5
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2020-12723 | MEDIUM | 5 | Perl/perl5 | S_ssc_cp_and | regcomp.c | 3a1df45e827a79d14694d18dd0141c09a0abfe5c | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.