instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
int msPostGISLayerSetTimeFilter(layerObj *lp, const char *timestring, const char *timefield) { char **atimes, **aranges = NULL; int numtimes=0,i=0,numranges=0; size_t buffer_size = 512; char buffer[512], bufferTmp[512]; buffer[0] = '\0'; bufferTmp[0] = '\0'; if (!lp || !timestring || !timefield) ret...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2013-7262 - Severity: MEDIUM - CVSS Score: 6.8 Description: Fix potential SQL Injection with postgis TIME filters (#4834) Function: msPostGISLayerSetTimeFilter File: mappostgis.c Repository: MapServer Fixed Code: int msPostGISLayerSetTimeFilter(layerObj *lp, con...
[ "CWE-89" ]
CVE-2013-7262
MEDIUM
6.8
MapServer
msPostGISLayerSetTimeFilter
mappostgis.c
3a10f6b829297dae63492a8c63385044bc6953ed
1
Analyze the following code function for security vulnerabilities
Scope JointMatrixINTELType::getScope() const { return getImpl()->scope; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: JointMatrixINTELType::getScope File: mlir/lib/Dialect/SPIRV/IR/SPIRVTypes.cpp Repository: llvm/llvm-project The code follows secure coding practices.
[ "CWE-125" ]
CVE-2023-29942
MEDIUM
5.5
llvm/llvm-project
JointMatrixINTELType::getScope
mlir/lib/Dialect/SPIRV/IR/SPIRVTypes.cpp
30ca16ec87206294f4ad0e9688c88f32421b343e
0
Analyze the following code function for security vulnerabilities
static int f2fs_read_data_page(struct file *file, struct page *page) { struct inode *inode = page->mapping->host; int ret = -EAGAIN; trace_f2fs_readpage(page, DATA); /* If the file has inline data, try to read it directly */ if (f2fs_has_inline_data(inode)) ret = f2fs_read_inline_data(inode, page); if (ret ==...
Vulnerability Classification: - CWE: CWE-476 - CVE: CVE-2019-19815 - Severity: HIGH - CVSS Score: 7.1 Description: f2fs: support swap file w/ DIO Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org> Function: f2fs_read_data_page File: fs/f2fs/data.c Repository: torvalds/linux Fixed Code: static int f2fs_read_data_page(s...
[ "CWE-476" ]
CVE-2019-19815
HIGH
7.1
torvalds/linux
f2fs_read_data_page
fs/f2fs/data.c
4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
1
Analyze the following code function for security vulnerabilities
R_API inline int r_anal_bb_is_in_offset (RAnalBlock *bb, ut64 off) { return (off >= bb->addr && off < bb->addr + bb->size); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: r_anal_bb_is_in_offset File: libr/anal/bb.c Repository: radareorg/radare2 The code follows secure coding practices.
[ "CWE-416" ]
CVE-2018-12320
MEDIUM
6.8
radareorg/radare2
r_anal_bb_is_in_offset
libr/anal/bb.c
90b71c017a7fa9732fe45fd21b245ee051b1f548
0
Analyze the following code function for security vulnerabilities
pcap_dumper_t * dump_open(const char *dumpfile, ino_t* dump_inode) { capture_info_t *capinfo; if (vector_count(capture_cfg.sources) == 1) { capture_cfg.dumpfilename = dumpfile; capinfo = vector_first(capture_cfg.sources); FILE *fp = fopen(dumpfile,"wb+"); if (!fp) r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump_open File: src/capture.c Repository: irontec/sngrep The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-31981
HIGH
7.8
irontec/sngrep
dump_open
src/capture.c
038a65883551fdccc0bb86600309bb85d2251f98
0
Analyze the following code function for security vulnerabilities
Jsi_Value* Jsi_ValueMakeNumber(Jsi_Interp *interp, Jsi_Value **vPtr, Jsi_Number n) { Jsi_Value *v = (vPtr?*vPtr:NULL); if (!v) v = Jsi_ValueNew(interp); else Jsi_ValueReset(interp, vPtr); v->vt = JSI_VT_NUMBER; v->d.num = n; return v; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Jsi_ValueMakeNumber File: src/jsiValue.c Repository: pcmacdon/jsish The code follows secure coding practices.
[ "CWE-190" ]
CVE-2020-22874
HIGH
7.5
pcmacdon/jsish
Jsi_ValueMakeNumber
src/jsiValue.c
858da537bde4de9d8c92466d5a866505310bc328
0
Analyze the following code function for security vulnerabilities
int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { if (group->meth->group_set_curve == 0) { ECerr(EC_F_EC_GROUP_SET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } return group->meth->group_set_c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: EC_GROUP_set_curve_GFp File: crypto/ec/ec_lib.c Repository: openssl The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-1547
LOW
1.9
openssl
EC_GROUP_set_curve_GFp
crypto/ec/ec_lib.c
21c856b75d81eff61aa63b4f036bb64a85bf6d46
0
Analyze the following code function for security vulnerabilities
Handle<JSArray> Factory::NewJSArray(ElementsKind elements_kind, int length, int capacity, ArrayStorageAllocationMode mode, PretenureFlag pretenure) { Handle<JSArray> array = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Factory::NewJSArray File: src/factory.cc Repository: chromium The code follows secure coding practices.
[ "CWE-17" ]
CVE-2014-7931
HIGH
7.5
chromium
Factory::NewJSArray
src/factory.cc
377de64246b3c1449f4e2090622ae1e1691e51ae
0
Analyze the following code function for security vulnerabilities
void NppParameters::setFontList(HWND hWnd) { //---------------// // Sys font list // //---------------// LOGFONT lf; _fontlist.clear(); _fontlist.reserve(64); // arbitrary _fontlist.push_back(generic_string()); lf.lfCharSet = DEFAULT_CHARSET; lf.lfFaceName[0]='\0'; lf.lfPitchAndFamily = 0; HDC hDC = ::GetDC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: NppParameters::setFontList File: PowerEditor/src/Parameters.cpp Repository: notepad-plus-plus The code follows secure coding practices.
[ "CWE-427" ]
CVE-2022-32168
HIGH
7.8
notepad-plus-plus
NppParameters::setFontList
PowerEditor/src/Parameters.cpp
85d7215d9b3e0d5a8433fc31aec4f2966821051e
0
Analyze the following code function for security vulnerabilities
gboolean janus_av1_is_keyframe(const char *buffer, int len) { if(!buffer || len < 3) return FALSE; /* Read the aggregation header */ uint8_t aggrh = *buffer; uint8_t zbit = (aggrh & 0x80) >> 7; uint8_t nbit = (aggrh & 0x08) >> 3; /* FIXME Ugly hack: we consider a packet with Z=0 and N=1 a keyframe */ return (!...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: janus_av1_is_keyframe File: utils.c Repository: meetecho/janus-gateway The code follows secure coding practices.
[ "CWE-120" ]
CVE-2020-14033
HIGH
7.5
meetecho/janus-gateway
janus_av1_is_keyframe
utils.c
fb85040405495748dbc7c4850b97da9b67b7b47b
0
Analyze the following code function for security vulnerabilities
void js_dup2(js_State *J) { CHECKSTACK(2); STACK[TOP] = STACK[TOP-2]; STACK[TOP+1] = STACK[TOP-1]; TOP += 2; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: js_dup2 File: jsrun.c Repository: ArtifexSoftware/mujs The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-10133
HIGH
7.5
ArtifexSoftware/mujs
js_dup2
jsrun.c
77ab465f1c394bb77f00966cd950650f3f53cb24
0
Analyze the following code function for security vulnerabilities
static int ext4_htree_next_block(struct inode *dir, __u32 hash, struct dx_frame *frame, struct dx_frame *frames, __u32 *start_hash) { struct dx_frame *p; struct buffer_head *bh; int err, num_frames = 0; __u32 bhash; p = frame; /* * Find the next leaf page by incrementing the frame pointer. * I...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ext4_htree_next_block File: fs/ext4/namei.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-20" ]
CVE-2009-0746
MEDIUM
4.9
torvalds/linux
ext4_htree_next_block
fs/ext4/namei.c
e6b8bc09ba2075cd91fbffefcd2778b1a00bd76f
0
Analyze the following code function for security vulnerabilities
void CompactProtocolReader::readBool(bool& value) { if (boolValue_.hasBoolValue == true) { value = boolValue_.boolValue; boolValue_.hasBoolValue = false; } else { int8_t val; readByte(val); value = (val == detail::compact::CT_BOOLEAN_TRUE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: CompactProtocolReader::readBool File: thrift/lib/cpp2/protocol/CompactProtocol-inl.h Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-3553
MEDIUM
5
facebook/fbthrift
CompactProtocolReader::readBool
thrift/lib/cpp2/protocol/CompactProtocol-inl.h
c9a903e5902834e95bbd4ab0e9fa53ba0189f351
0
Analyze the following code function for security vulnerabilities
static void dispatchSIM_APDU (Parcel &p, RequestInfo *pRI) { int32_t t; status_t status; RIL_SIM_APDU apdu; #if VDBG RLOGD("dispatchSIM_APDU"); #endif memset (&apdu, 0, sizeof(RIL_SIM_APDU)); // Note we only check status at the end. Any single failure leads to // subsequent reads filing. ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchSIM_APDU File: libril/ril.cpp Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-0823
MEDIUM
5
android
dispatchSIM_APDU
libril/ril.cpp
cd5f15f588a5d27e99ba12f057245bfe507f8c42
0
Analyze the following code function for security vulnerabilities
void GfxSubpath::lineTo(double x1, double y1) { if (n >= size) { size += 16; x = (double *)greallocn(x, size, sizeof(double)); y = (double *)greallocn(y, size, sizeof(double)); curve = (GBool *)greallocn(curve, size, sizeof(GBool)); } x[n] = x1; y[n] = y1; curve[n] = gFalse; ++n; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: GfxSubpath::lineTo File: poppler/GfxState.cc Repository: poppler The code follows secure coding practices.
[ "CWE-189" ]
CVE-2009-3606
HIGH
9.3
poppler
GfxSubpath::lineTo
poppler/GfxState.cc
7b2d314a61fd0e12f47c62996cb49ec0d1ba747a
0
Analyze the following code function for security vulnerabilities
static void *htab_lru_map_lookup_elem_sys(struct bpf_map *map, void *key) { return __htab_lru_map_lookup_elem(map, key, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: htab_lru_map_lookup_elem_sys File: kernel/bpf/hashtab.c Repository: kernel/git/bpf/bpf The code follows secure coding practices.
[ "CWE-190", "CWE-787" ]
CVE-2021-38166
MEDIUM
4.6
kernel/git/bpf/bpf
htab_lru_map_lookup_elem_sys
kernel/bpf/hashtab.c
c4eb1f403243fc7bbb7de644db8587c03de36da6
0
Analyze the following code function for security vulnerabilities
PJ_DEF(pjsip_transport_type_e) pjsip_transport_get_type_from_name(const pj_str_t *name) { unsigned i; if (name->slen == 0) return PJSIP_TRANSPORT_UNSPECIFIED; /* Get transport type from name. */ for (i=0; i<PJ_ARRAY_SIZE(transport_names); ++i) { if (pj_stricmp(name, &transport_names[i].name) == 0) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pjsip_transport_get_type_from_name File: pjsip/src/pjsip/sip_transport.c Repository: pjsip/pjproject The code follows secure coding practices.
[ "CWE-295" ]
CVE-2020-15260
MEDIUM
4.3
pjsip/pjproject
pjsip_transport_get_type_from_name
pjsip/src/pjsip/sip_transport.c
67e46c1ac45ad784db5b9080f5ed8b133c122872
0
Analyze the following code function for security vulnerabilities
int js_isobject(js_State *J, int idx) { return stackidx(J, idx)->type == JS_TOBJECT; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: js_isobject File: jsrun.c Repository: ArtifexSoftware/mujs The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-10133
HIGH
7.5
ArtifexSoftware/mujs
js_isobject
jsrun.c
77ab465f1c394bb77f00966cd950650f3f53cb24
0
Analyze the following code function for security vulnerabilities
static void tun_put(struct tun_struct *tun) { dev_put(tun->dev); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tun_put File: drivers/net/tun.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-843" ]
CVE-2023-1076
MEDIUM
5.5
torvalds/linux
tun_put
drivers/net/tun.c
a096ccca6e503a5c575717ff8a36ace27510ab0a
0
Analyze the following code function for security vulnerabilities
static void OnRejoin1CycleTimerEvent( void* context ) { TimerStop( &MacCtx.Rejoin1CycleTimer ); ConvertRejoinCycleTime( Nvm.MacGroup2.Rejoin1CycleInSec, &MacCtx.Rejoin1CycleTime ); if( ( MacCtx.MacCallbacks != NULL ) && ( MacCtx.MacCallbacks->MacProcessNotify != NULL ) ) { MacCtx.MacCallbacks->...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: OnRejoin1CycleTimerEvent File: src/mac/LoRaMac.c Repository: Lora-net/LoRaMac-node The code follows secure coding practices.
[ "CWE-193" ]
CVE-2022-39274
CRITICAL
9.8
Lora-net/LoRaMac-node
OnRejoin1CycleTimerEvent
src/mac/LoRaMac.c
e851b079c82ba1bcf3f4d291ab69a571b0bf458a
0
Analyze the following code function for security vulnerabilities
int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) { int init_ret; int ret; int calc_ret; X509_POLICY_TREE *tree = NULL; STACK_OF(X509_POLICY_NODE) *nodes, *...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: X509_policy_check File: crypto/x509v3/pcy_tree.c Repository: openssl The code follows secure coding practices.
[ "CWE-295" ]
CVE-2023-0464
HIGH
7.5
openssl
X509_policy_check
crypto/x509v3/pcy_tree.c
879f7080d7e141f415c79eaa3a8ac4a3dad0348b
0
Analyze the following code function for security vulnerabilities
static VncRectStat *vnc_stat_rect(VncDisplay *vd, int x, int y) { struct VncSurface *vs = &vd->guest; return &vs->stats[y / VNC_STAT_RECT][x / VNC_STAT_RECT]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: vnc_stat_rect File: ui/vnc.c Repository: qemu-project/qemu The code follows secure coding practices.
[ "CWE-191" ]
CVE-2022-3165
MEDIUM
6.5
qemu-project/qemu
vnc_stat_rect
ui/vnc.c
d307040b18
0
Analyze the following code function for security vulnerabilities
void PropertiesWidget::loadTorrentInfos(BitTorrent::TorrentHandle *const torrent) { clear(); m_torrent = torrent; downloaded_pieces->setTorrent(m_torrent); pieces_availability->setTorrent(m_torrent); if (!m_torrent) return; // Save path updateSavePath(m_torrent); // Hash hash_lbl->s...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2017-6503 - Severity: MEDIUM - CVSS Score: 4.3 Description: Add Utils::String::toHtmlEscaped Function: PropertiesWidget::loadTorrentInfos File: src/gui/properties/propertieswidget.cpp Repository: qbittorrent/qBittorrent Fixed Code: void PropertiesWidget::loadTor...
[ "CWE-79" ]
CVE-2017-6503
MEDIUM
4.3
qbittorrent/qBittorrent
PropertiesWidget::loadTorrentInfos
src/gui/properties/propertieswidget.cpp
6ca3e4f094da0a0017cb2d483ec1db6176bb0b16
1
Analyze the following code function for security vulnerabilities
void Instance::CreateToolbar(const ToolbarButtonInfo* tb_info, size_t size) { toolbar_.reset(new FadingControls()); DCHECK(tb_info); DCHECK(size >= 0); // Remember the current toolbar information in case we need to recreate the // images later. current_tb_info_ = tb_info; current_tb_info_size_ = size; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Instance::CreateToolbar File: pdf/instance.cc Repository: chromium The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-3198
MEDIUM
5
chromium
Instance::CreateToolbar
pdf/instance.cc
9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f
0
Analyze the following code function for security vulnerabilities
GF_Err aom_av1_parse_temporal_unit_from_annexb(GF_BitStream *bs, AV1State *state) { GF_Err e = GF_OK; u64 sz = read_leb128(bs, NULL); if (!bs || !state) return GF_BAD_PARAM; GF_LOG(GF_LOG_DEBUG, GF_LOG_CONTAINER, ("[AV1] Annex B temporal unit detected (size "LLU") ***** \n", sz)); while (sz > 0) { u8 Leb128Byte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aom_av1_parse_temporal_unit_from_annexb File: src/media_tools/av_parsers.c Repository: gpac The code follows secure coding practices.
[ "CWE-787" ]
CVE-2019-20160
MEDIUM
4.3
gpac
aom_av1_parse_temporal_unit_from_annexb
src/media_tools/av_parsers.c
bcfcb3e90476692fe0d2bb532ea8deeb2a77580e
0
Analyze the following code function for security vulnerabilities
static int dissect_lte_rrc_SPS_Config_v1430(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index, ett_lte_rrc_SPS_Config_v1430, SPS_Config_v1430_sequence); return offset;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_lte_rrc_SPS_Config_v1430 File: epan/dissectors/packet-lte-rrc.c Repository: wireshark The code follows secure coding practices.
[ "CWE-401" ]
CVE-2020-9431
MEDIUM
5
wireshark
dissect_lte_rrc_SPS_Config_v1430
epan/dissectors/packet-lte-rrc.c
086003c9d616906e08bbeeab9c17b3aa4c6ff850
0
Analyze the following code function for security vulnerabilities
uint32_t Hash() override { return hash_; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Hash File: src/objects.cc Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5128
MEDIUM
6.8
chromium
Hash
src/objects.cc
2c8ca9ad09281d4138ae363566051e45afd0838c
0
Analyze the following code function for security vulnerabilities
static void svm_vmexit_ud_intercept(struct cpu_user_regs *regs) { struct hvm_emulate_ctxt ctxt; int rc; if ( opt_hvm_fep ) { char sig[5]; /* ud2; .ascii "xen" */ if ( (hvm_fetch_from_guest_virt_nofault( sig, regs->eip, sizeof(sig), 0) == HVMCOPY_okay) && ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: svm_vmexit_ud_intercept File: xen/arch/x86/hvm/svm/svm.c Repository: xen-project/xen The code follows secure coding practices.
[ "CWE-399" ]
CVE-2015-5307
MEDIUM
4.9
xen-project/xen
svm_vmexit_ud_intercept
xen/arch/x86/hvm/svm/svm.c
bd2239d9fa975a1ee5bcd27c218ae042cd0a57bc
0
Analyze the following code function for security vulnerabilities
int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d, XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl) { int ret; struct dt_device_node *dev; switch ( domctl->cmd ) { case XEN_DOMCTL_assign_device: ASSERT(d); /* fall through */ case XEN_DOMCTL_...
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2019-18424 - Severity: MEDIUM - CVSS Score: 6.9 Description: passthrough: quarantine PCI devices When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protec...
[ "CWE-78" ]
CVE-2019-18424
MEDIUM
6.9
xen-project/xen
iommu_do_dt_domctl
xen/drivers/passthrough/device_tree.c
319f9a0ba94c7db505cd5dd9cb0b037ab1aa8e12
1
Analyze the following code function for security vulnerabilities
static int dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_enumerated(tvb, offset, actx, tree, hf_index, 1, NULL, FALSE, 0, NULL); return offset; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13 File: epan/dissectors/packet-lte-rrc.c Repository: wireshark The code follows secure coding practices.
[ "CWE-401" ]
CVE-2020-9431
MEDIUM
5
wireshark
dissect_lte_rrc_T_csi_RS_DRS_RRM_MeasurementsLAA_r13
epan/dissectors/packet-lte-rrc.c
086003c9d616906e08bbeeab9c17b3aa4c6ff850
0
Analyze the following code function for security vulnerabilities
static void tcp_sequence_number_analysis_print_bytes_in_flight(packet_info * pinfo _U_, tvbuff_t * tvb, proto_tree * flags_tree, struct tcp_acked *ta ) { proto_item * flags_item; if (tcp_track_bytes_in_flight)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tcp_sequence_number_analysis_print_bytes_in_flight File: epan/dissectors/packet-tcp.c Repository: wireshark The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9258
MEDIUM
5
wireshark
tcp_sequence_number_analysis_print_bytes_in_flight
epan/dissectors/packet-tcp.c
2d4695de1477df60b0188fd581c0c279db601978
0
Analyze the following code function for security vulnerabilities
static int add_def_function(ufunc_T *ufunc) { dfunc_T *dfunc; if (def_functions.ga_len == 0) { // The first position is not used, so that a zero uf_dfunc_idx means it // wasn't set. if (GA_GROW_FAILS(&def_functions, 1)) return FAIL; ++def_functions.ga_len; } // Add the function to "def_fu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: add_def_function File: src/vim9compile.c Repository: vim The code follows secure coding practices.
[ "CWE-416" ]
CVE-2021-4173
MEDIUM
6.8
vim
add_def_function
src/vim9compile.c
9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
0
Analyze the following code function for security vulnerabilities
static inline int timer_delete_hook(struct k_itimer *timer) { return CLOCK_DISPATCH(timer->it_clock, timer_del, (timer)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: timer_delete_hook File: kernel/posix-timers.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2009-2767
HIGH
7.2
torvalds/linux
timer_delete_hook
kernel/posix-timers.c
70d715fd0597f18528f389b5ac59102263067744
0
Analyze the following code function for security vulnerabilities
int main(int argc, char **argv) { const char *source_path = NULL; const char *label = NULL; uid_t uid = 0; gid_t gid = 0; userid_t userid = 0; bool multi_user = false; bool full_write = false; int i; struct rlimit rlim; int fs_version; int opt; while ((opt = getopt(argc,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: main File: sdcard/sdcard.c Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2494
HIGH
9.3
android
main
sdcard/sdcard.c
864e2e22fcd0cba3f5e67680ccabd0302dfda45d
0
Analyze the following code function for security vulnerabilities
int _yr_process_detach(YR_PROC_ITERATOR_CTX* context) { YR_PROC_INFO* proc_info = (YR_PROC_INFO*) context->proc_info; CloseHandle(proc_info->hProcess); return ERROR_SUCCESS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _yr_process_detach File: libyara/proc/windows.c Repository: VirusTotal/yara The code follows secure coding practices.
[ "CWE-120" ]
CVE-2021-45429
MEDIUM
4.3
VirusTotal/yara
_yr_process_detach
libyara/proc/windows.c
b34b7e74c862c129b801832b6b85401fbada2b01
0
Analyze the following code function for security vulnerabilities
static inline void dump_sessionid(const char *fn, struct nfs4_sessionid *sessionid) { u32 *ptr = (u32 *)(&sessionid->data[0]); dprintk("%s: %u:%u:%u:%u\n", fn, ptr[0], ptr[1], ptr[2], ptr[3]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump_sessionid File: fs/nfsd/nfs4state.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-287" ]
CVE-2009-3623
HIGH
7.8
torvalds/linux
dump_sessionid
fs/nfsd/nfs4state.c
80fc015bdfe1f5b870c1e1ee02d78e709523fee7
0
Analyze the following code function for security vulnerabilities
static void base_unsigned_one_tenth_unitless(gchar *buf, guint32 value) { g_snprintf(buf, ITEM_LABEL_LENGTH, "%u.%u", value / 10, value % 10); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: base_unsigned_one_tenth_unitless File: epan/dissectors/packet-btatt.c Repository: wireshark The code follows secure coding practices.
[ "CWE-476" ]
CVE-2020-7045
LOW
3.3
wireshark
base_unsigned_one_tenth_unitless
epan/dissectors/packet-btatt.c
01f261de41f4dd3233ef578e5c0ffb9c25c7d14d
0
Analyze the following code function for security vulnerabilities
void gdImageColorDeallocate (gdImagePtr im, int color) { if (im->trueColor) { return; } /* Mark it open. */ im->open[color] = 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gdImageColorDeallocate File: ext/gd/libgd/gd.c Repository: php/php-src The code follows secure coding practices.
[ "CWE-190" ]
CVE-2016-5767
MEDIUM
6.8
php/php-src
gdImageColorDeallocate
ext/gd/libgd/gd.c
c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6
0
Analyze the following code function for security vulnerabilities
void jsi_ObjInsertObjCheck(Jsi_Interp *interp, Jsi_Obj *obj, Jsi_Value *value, bool add) { if (!add) return; if (obj == value->d.obj && !interp->memLeakCnt++) Jsi_LogWarn("recursive add of object will leak memory"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsi_ObjInsertObjCheck File: src/jsiObj.c Repository: pcmacdon/jsish The code follows secure coding practices.
[ "CWE-416" ]
CVE-2021-46499
MEDIUM
4.3
pcmacdon/jsish
jsi_ObjInsertObjCheck
src/jsiObj.c
9c9dbe59760a660e21d69d5cf6007c9ccbb5c9a3
0
Analyze the following code function for security vulnerabilities
BITCODE_BS dwg_ent_spline_get_scenario(const dwg_ent_spline *restrict spline, int *restrict error) { if (spline) { *error = 0; return spline->scenario; } else { *error = 1; LOG_ERROR("%s: empty arg", __FUNCTION__) return 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dwg_ent_spline_get_scenario File: src/dwg_api.c Repository: LibreDWG/libredwg The code follows secure coding practices.
[ "CWE-476" ]
CVE-2018-14471
MEDIUM
4.3
LibreDWG/libredwg
dwg_ent_spline_get_scenario
src/dwg_api.c
b03ab41c86375351925921f3dccb810007c4425d
0
Analyze the following code function for security vulnerabilities
void DocumentLoader::stopLoading() { RefPtrWillBeRawPtr<LocalFrame> protectFrame(m_frame.get()); RefPtrWillBeRawPtr<DocumentLoader> protectLoader(this); if (isLoading()) cancelMainResourceLoad(ResourceError::cancelledError(m_request.url())); m_fetcher->stopFetching(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: DocumentLoader::stopLoading File: third_party/WebKit/Source/core/loader/DocumentLoader.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2016-1655
MEDIUM
6.8
chromium
DocumentLoader::stopLoading
third_party/WebKit/Source/core/loader/DocumentLoader.cpp
43ea0649d4b70fdcf3e9fa5c03aee1bbba0b04bb
0
Analyze the following code function for security vulnerabilities
struct dentry *d_lookup(const struct dentry *parent, const struct qstr *name) { struct dentry *dentry; unsigned seq; do { seq = read_seqbegin(&rename_lock); dentry = __d_lookup(parent, name); if (dentry) break; } while (read_seqretry(&rename_lock, seq)); return dentry; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: d_lookup File: fs/dcache.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-254" ]
CVE-2015-2925
MEDIUM
6.9
torvalds/linux
d_lookup
fs/dcache.c
cde93be45a8a90d8c264c776fab63487b5038a65
0
Analyze the following code function for security vulnerabilities
char * cdf_u16tos8(char *buf, size_t len, const uint16_t *p) { size_t i; for (i = 0; i < len && p[i]; i++) buf[i] = (char)p[i]; buf[i] = '\0'; return buf; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cdf_u16tos8 File: src/cdf.c Repository: file The code follows secure coding practices.
[ "CWE-189" ]
CVE-2014-3587
MEDIUM
4.3
file
cdf_u16tos8
src/cdf.c
0641e56be1af003aa02c7c6b0184466540637233
0
Analyze the following code function for security vulnerabilities
void DecimalQuantity::_setToInt(int32_t n) { if (n == INT32_MIN) { readLongToBcd(-static_cast<int64_t>(n)); } else { readIntToBcd(n); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: DecimalQuantity::_setToInt File: icu4c/source/i18n/number_decimalquantity.cpp Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
DecimalQuantity::_setToInt
icu4c/source/i18n/number_decimalquantity.cpp
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
static int hci_uart_tty_ioctl(struct tty_struct *tty, struct file *file, unsigned int cmd, unsigned long arg) { struct hci_uart *hu = tty->disc_data; int err = 0; BT_DBG(""); /* Verify the status of the device */ if (!hu) return -EBADF; switch (cmd) { case HCIUARTSETPROTO: if (!test_and_set_bit(H...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hci_uart_tty_ioctl File: drivers/bluetooth/hci_ldisc.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2019-15917
MEDIUM
6.9
torvalds/linux
hci_uart_tty_ioctl
drivers/bluetooth/hci_ldisc.c
56897b217a1d0a91c9920cb418d6b3fe922f590a
0
Analyze the following code function for security vulnerabilities
static float angle_between(const fz_point u, const fz_point v) { float det = u.x * v.y - u.y * v.x; float sign = (det < 0 ? -1 : 1); float magu = u.x * u.x + u.y * u.y; float magv = v.x * v.x + v.y * v.y; float udotv = u.x * v.x + u.y * v.y; float t = udotv / (magu * magv); /* guard against rounding errors when ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: angle_between File: source/xps/xps-path.c Repository: ArtifexSoftware/mupdf The code follows secure coding practices.
[ "CWE-119" ]
CVE-2017-14687
MEDIUM
6.8
ArtifexSoftware/mupdf
angle_between
source/xps/xps-path.c
2b16dbd8f73269cb15ca61ece75cf8d2d196ed28
0
Analyze the following code function for security vulnerabilities
long __sched sleep_on_timeout(wait_queue_head_t *q, long timeout) { return sleep_on_common(q, TASK_UNINTERRUPTIBLE, timeout); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sleep_on_timeout File: kernel/sched.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-835" ]
CVE-2011-4621
MEDIUM
4.9
torvalds/linux
sleep_on_timeout
kernel/sched.c
f26f9aff6aaf67e9a430d16c266f91b13a5bff64
0
Analyze the following code function for security vulnerabilities
static void bdrv_co_em_bh(void *opaque) { BlockDriverAIOCBCoroutine *acb = opaque; acb->common.cb(acb->common.opaque, acb->req.error); qemu_bh_delete(acb->bh); qemu_aio_release(acb); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bdrv_co_em_bh File: block.c Repository: kvm/qemu-kvm The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2012-2652
MEDIUM
4.4
kvm/qemu-kvm
bdrv_co_em_bh
block.c
eba25057b9a5e19d10ace2bc7716667a31297169
0
Analyze the following code function for security vulnerabilities
void jbd2_journal_set_triggers(struct buffer_head *bh, struct jbd2_buffer_trigger_type *type) { struct journal_head *jh = bh2jh(bh); jh->b_triggers = type; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jbd2_journal_set_triggers File: fs/jbd2/transaction.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2011-4086
MEDIUM
4.9
torvalds/linux
jbd2_journal_set_triggers
fs/jbd2/transaction.c
15291164b22a357cb211b618adfef4fa82fc0de3
0
Analyze the following code function for security vulnerabilities
char * elfcore_write_ppc_ebb (bfd *abfd, char *buf, int *bufsiz, const void *ppc_ebb, int size) { char *note_name = "LINUX"; return elfcore_write_note (abfd, buf, bufsiz, note_name, NT_PPC_EBB, p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elfcore_write_ppc_ebb File: bfd/elf.c Repository: binutils-gdb The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-19932
MEDIUM
4.3
binutils-gdb
elfcore_write_ppc_ebb
bfd/elf.c
beab453223769279cc1cef68a1622ab8978641f7
0
Analyze the following code function for security vulnerabilities
bool rec_parser_seek (rec_parser_t parser, size_t line_number, size_t position) { if (parser->in_file) { if (fseek (parser->in_file, position, SEEK_SET)) return false; } else if (parser->in_buffer) { if (position > parser->in_size) return fal...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rec_parser_seek File: src/rec-parser.c Repository: gnu-mirror-unofficial/recutils The code follows secure coding practices.
[ "CWE-416", "CWE-476" ]
CVE-2021-46019
MEDIUM
4.3
gnu-mirror-unofficial/recutils
rec_parser_seek
src/rec-parser.c
34b75ed7ad492c8e38b669ebafe0176f1f9992d2
0
Analyze the following code function for security vulnerabilities
void skb_condense(struct sk_buff *skb) { if (skb->data_len) { if (skb->data_len > skb->end - skb->tail || skb_cloned(skb)) return; /* Nice, we can free page frag(s) right now */ __pskb_pull_tail(skb, skb->data_len); } /* At this point, skb->truesize might be over estimated, * because skb had a frag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: skb_condense File: net/core/skbuff.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-125" ]
CVE-2017-7277
MEDIUM
6.6
torvalds/linux
skb_condense
net/core/skbuff.c
4ef1b2869447411ad3ef91ad7d4891a83c1a509a
0
Analyze the following code function for security vulnerabilities
static int mailimf_resent_msg_id_parse(const char * message, size_t length, size_t * indx, struct mailimf_message_id ** result) { char * value; size_t cur_token; struct mailimf_message_id * message_id; int r; int res; cur_token = * indx; r = mailimf_token_case_insensitive_parse(message, le...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mailimf_resent_msg_id_parse File: src/low-level/imf/mailimf.c Repository: dinhvh/libetpan The code follows secure coding practices.
[ "CWE-476" ]
CVE-2017-8825
MEDIUM
5
dinhvh/libetpan
mailimf_resent_msg_id_parse
src/low-level/imf/mailimf.c
1fe8fbc032ccda1db9af66d93016b49c16c1f22d
0
Analyze the following code function for security vulnerabilities
static int dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index, ett_lte_rrc_UE_EUTRA_Capability_v10f0_IEs, UE_EUTRA_Capability...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs File: epan/dissectors/packet-lte-rrc.c Repository: wireshark The code follows secure coding practices.
[ "CWE-401" ]
CVE-2020-9431
MEDIUM
5
wireshark
dissect_lte_rrc_UE_EUTRA_Capability_v10f0_IEs
epan/dissectors/packet-lte-rrc.c
086003c9d616906e08bbeeab9c17b3aa4c6ff850
0
Analyze the following code function for security vulnerabilities
caddr_t bif_lisp_read (caddr_t * qst, caddr_t * err_ret, state_slot_t ** args) { caddr_t str = bif_string_arg (qst, args, 0, "lisp_read"); lisp_stream_t st; volatile caddr_t res = NULL; lisp_stream_init (&st, str); CATCH (CATCH_LISP_ERROR) { res = lisp_read (&st); } END_CATCH; return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bif_lisp_read File: libsrc/Wi/sqlbif.c Repository: openlink/virtuoso-opensource The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-31616
HIGH
7.5
openlink/virtuoso-opensource
bif_lisp_read
libsrc/Wi/sqlbif.c
25fff0eaa85898004bb14909e9f29d16b2918792
0
Analyze the following code function for security vulnerabilities
CRPCTable::CRPCTable() { unsigned int vcidx; for (vcidx = 0; vcidx < (sizeof(vRPCCommands) / sizeof(vRPCCommands[0])); vcidx++) { const CRPCCommand *pcmd; pcmd = &vRPCCommands[vcidx]; mapCommands[pcmd->name] = pcmd; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: CRPCTable::CRPCTable File: src/bitcoinrpc.cpp Repository: Ziftr/primecoin The code follows secure coding practices.
[ "CWE-208" ]
CVE-2013-10006
LOW
1.4
Ziftr/primecoin
CRPCTable::CRPCTable
src/bitcoinrpc.cpp
cdb3441b5cd2c1bae49fae671dc4a496f7c96322
0
Analyze the following code function for security vulnerabilities
static void pmcraid_internal_done(struct pmcraid_cmd *cmd) { pmcraid_info("response internal cmd CDB[0] = %x ioasc = %x\n", cmd->ioa_cb->ioarcb.cdb[0], le32_to_cpu(cmd->ioa_cb->ioasa.ioasc)); /* Some of the internal commands are sent with callers blocking for the * response. Same will be indicated as...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pmcraid_internal_done File: drivers/scsi/pmcraid.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-400" ]
CVE-2011-2906
MEDIUM
4.7
torvalds/linux
pmcraid_internal_done
drivers/scsi/pmcraid.c
b5b515445f4f5a905c5dd27e6e682868ccd6c09d
0
Analyze the following code function for security vulnerabilities
void setprocessname(const char * const title) { #ifndef NO_PROCNAME_CHANGE # ifdef HAVE_SETPROCTITLE setproctitle("-%s", title); # elif defined(__linux__) if (argv0 != NULL && argv_lth > strlen(title) - 2) { memset(argv0[0], 0, argv_lth); strncpy(argv0[0], title, argv_lth - 2); argv0[1] ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setprocessname File: src/ftpd.c Repository: jedisct1/pure-ftpd The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-40524
MEDIUM
5
jedisct1/pure-ftpd
setprocessname
src/ftpd.c
37ad222868e52271905b94afea4fc780d83294b4
0
Analyze the following code function for security vulnerabilities
static inline void tlb_remove_page(struct mmu_gather *tlb, struct page *page) { free_page_and_swap_cache(page); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tlb_remove_page File: include/asm-s390/tlb.h Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2143
MEDIUM
6.9
torvalds/linux
tlb_remove_page
include/asm-s390/tlb.h
6252d702c5311ce916caf75ed82e5c8245171c92
0
Analyze the following code function for security vulnerabilities
static int iscsi_get_host_stats(struct iscsi_transport *transport, struct nlmsghdr *nlh) { struct iscsi_uevent *ev = nlmsg_data(nlh); struct Scsi_Host *shost = NULL; struct iscsi_internal *priv; struct sk_buff *skbhost_stats; struct nlmsghdr *nlhhost_stats; struct iscsi_uevent *evhost_stats; int host_stats_size ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: iscsi_get_host_stats File: drivers/scsi/scsi_transport_iscsi.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other", "CWE-125" ]
CVE-2021-27363
LOW
3.6
torvalds/linux
iscsi_get_host_stats
drivers/scsi/scsi_transport_iscsi.c
688e8128b7a92df982709a4137ea4588d16f24aa
0
Analyze the following code function for security vulnerabilities
xmlElementTablePtr xmlCopyElementTable(xmlElementTablePtr table) { return((xmlElementTablePtr) xmlHashCopy(table, xmlCopyElement)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xmlCopyElementTable File: valid.c Repository: GNOME/libxml2 The code follows secure coding practices.
[ "CWE-416" ]
CVE-2022-23308
MEDIUM
4.3
GNOME/libxml2
xmlCopyElementTable
valid.c
652dd12a858989b14eed4e84e453059cd3ba340e
0
Analyze the following code function for security vulnerabilities
static void ene_rx_reset(struct ene_device *dev) { ene_clear_reg_mask(dev, ENE_CIRCFG, ENE_CIRCFG_RX_EN); ene_set_reg_mask(dev, ENE_CIRCFG, ENE_CIRCFG_RX_EN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ene_rx_reset File: drivers/media/rc/ene_ir.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2023-1118
HIGH
7.8
torvalds/linux
ene_rx_reset
drivers/media/rc/ene_ir.c
29b0589a865b6f66d141d79b2dd1373e4e50fe17
0
Analyze the following code function for security vulnerabilities
int wc_RsaSSL_VerifyInline(byte* in, word32 inLen, byte** out, RsaKey* key) { WC_RNG* rng; #ifdef WC_RSA_BLINDING rng = key->rng; #else rng = NULL; #endif return RsaPrivateDecryptEx(in, inLen, in, inLen, out, key, RSA_PUBLIC_DECRYPT, RSA_BLOCK_TYPE_1, WC_RSA_PKCSV15_PAD, WC_HASH_TYPE_NON...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wc_RsaSSL_VerifyInline File: wolfcrypt/src/rsa.c Repository: wolfSSL/wolfssl The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-36177
HIGH
10
wolfSSL/wolfssl
wc_RsaSSL_VerifyInline
wolfcrypt/src/rsa.c
fb2288c46dd4c864b78f00a47a364b96a09a5c0f
0
Analyze the following code function for security vulnerabilities
void kvm_ioapic_destroy(struct kvm *kvm) { struct kvm_ioapic *ioapic = kvm->arch.vioapic; if (!ioapic) return; cancel_delayed_work_sync(&ioapic->eoi_inject); mutex_lock(&kvm->slots_lock); kvm_io_bus_unregister_dev(kvm, KVM_MMIO_BUS, &ioapic->dev); mutex_unlock(&kvm->slots_lock); kvm->arch.vioapic = NULL; kf...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: kvm_ioapic_destroy File: arch/x86/kvm/ioapic.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-835" ]
CVE-2020-27152
LOW
2.1
torvalds/linux
kvm_ioapic_destroy
arch/x86/kvm/ioapic.c
77377064c3a94911339f13ce113b3abf265e06da
0
Analyze the following code function for security vulnerabilities
static void dissect_rsvp_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gboolean e2ei) { guint8 message_type; int session_off, tempfilt_off; rsvp_conversation_info *rsvph; conversation_t *conversation; struct rsvp_request_key request_key, *new_request_key; struct rsvp...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2015-8727 - Severity: MEDIUM - CVSS Score: 4.3 Description: RSVP: copy all rsvp_request_key info in file scope This is needed as it is later used for comparisons in the request hash table Bug: 11793 Change-Id: I5fce82f77c27cf728c61676ef937fbbcd0833fd9 Reviewed-o...
[ "CWE-20" ]
CVE-2015-8727
MEDIUM
4.3
wireshark
dissect_rsvp_common
epan/dissectors/packet-rsvp.c
56baca60271379cb97f6a4a6bf72eb526e8b52d0
1
Analyze the following code function for security vulnerabilities
static int copy_vm86_regs_to_user(struct vm86_regs __user *user, const struct kernel_vm86_regs *regs) { int ret = 0; /* * kernel_vm86_regs is missing gs, so copy everything up to * (but not including) orig_eax, and then rest including orig_eax. */ ret += copy_to_user(user, regs, offsetof(struct kernel_v...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy_vm86_regs_to_user File: arch/x86/kernel/vm86_32.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-264" ]
CVE-2012-1179
MEDIUM
5.2
torvalds/linux
copy_vm86_regs_to_user
arch/x86/kernel/vm86_32.c
4a1d704194a441bf83c636004a479e01360ec850
0
Analyze the following code function for security vulnerabilities
static void classdump_java(RCore *r, RBinClass *c) { RBinField *f; RListIter *iter2, *iter3; RBinSymbol *sym; char *pn = strdup (c->name); char *cn = (char *)r_str_rchr (pn, NULL, '/'); if (cn) { *cn = 0; cn++; r_str_replace_char (pn, '/', '.'); } r_cons_printf ("package %s;\n\n", pn); r_cons_printf ("pu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: classdump_java File: libr/core/cbin.c Repository: radareorg/radare2 The code follows secure coding practices.
[ "CWE-77" ]
CVE-2019-14745
MEDIUM
6.8
radareorg/radare2
classdump_java
libr/core/cbin.c
f0c6dfa7a3eaad6a4a684ebfac0b2d282266adf9
0
Analyze the following code function for security vulnerabilities
XRef *XRef::copy() const { XRef *xref = new XRef(); xref->str = str->copy(); xref->strOwner = true; xref->encrypted = encrypted; xref->permFlags = permFlags; xref->ownerPasswordOk = ownerPasswordOk; xref->rootGen = rootGen; xref->rootNum = rootNum; xref->start = start; xref->pre...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: XRef::copy File: poppler/XRef.cc Repository: poppler The code follows secure coding practices.
[ "CWE-617" ]
CVE-2022-37052
MEDIUM
6.5
poppler
XRef::copy
poppler/XRef.cc
8677500399fc2548fa816b619580c2c07915a98c
0
Analyze the following code function for security vulnerabilities
static void __ref show_saved_mc(void) { int i, j; unsigned int sig, pf, rev, total_size, data_size, date; struct ucode_cpu_info uci; if (mc_saved_data.mc_saved_count == 0) { pr_debug("no microcode data saved.\n"); return; } pr_debug("Total microcode saved: %d\n", mc_saved_data.mc_saved_count); collect_cpu_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: show_saved_mc File: arch/x86/kernel/cpu/microcode/intel_early.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2015-2666
MEDIUM
6.9
torvalds/linux
show_saved_mc
arch/x86/kernel/cpu/microcode/intel_early.c
f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4
0
Analyze the following code function for security vulnerabilities
static ssize_t mem_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { return mem_rw(file, (char __user*)buf, count, ppos, 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mem_write File: fs/proc/base.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2018-1120
LOW
3.5
torvalds/linux
mem_write
fs/proc/base.c
7f7ccc2ccc2e70c6054685f5e3522efa81556830
0
Analyze the following code function for security vulnerabilities
static size_t inet_get_link_af_size(const struct net_device *dev, u32 ext_filter_mask) { struct in_device *in_dev = rcu_dereference_rtnl(dev->ip_ptr); if (!in_dev) return 0; return nla_total_size(IPV4_DEVCONF_MAX * 4); /* IFLA_INET_CONF */ }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inet_get_link_af_size File: net/ipv4/devinet.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-399" ]
CVE-2016-3156
LOW
2.1
torvalds/linux
inet_get_link_af_size
net/ipv4/devinet.c
fbd40ea0180a2d328c5adc61414dc8bab9335ce2
0
Analyze the following code function for security vulnerabilities
int sql_trans_set_partition_table(sql_trans *tr, sql_table *t) { int res = LOG_OK; sqlstore *store = tr->store; if (t && (isRangePartitionTable(t) || isListPartitionTable(t))) { sql_schema *syss = find_sql_schema(tr, isGlobal(t)?"sys":"tmp"); sql_table *partitions = find_sql_table(tr, syss, "table_partitions");...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sql_trans_set_partition_table File: sql/storage/store.c Repository: MonetDB The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-36366
HIGH
7.5
MonetDB
sql_trans_set_partition_table
sql/storage/store.c
f50b4691a5bedf130ec486963e5b5bff83927ac6
0
Analyze the following code function for security vulnerabilities
content::ResourceContext* ProfileImplIOData::Handle::GetResourceContext() const { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); LazyInitialize(); return GetResourceContextNoInit(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ProfileImplIOData::Handle::GetResourceContext File: chrome/browser/profiles/profile_impl_io_data.cc Repository: chromium The code follows secure coding practices.
[ "CWE-119" ]
CVE-2011-3083
MEDIUM
5
chromium
ProfileImplIOData::Handle::GetResourceContext
chrome/browser/profiles/profile_impl_io_data.cc
d6b061bf189e0661a3d94d89dbcb2e6f70b433da
0
Analyze the following code function for security vulnerabilities
static int task_switch_32(struct x86_emulate_ctxt *ctxt, u16 tss_selector, u16 old_tss_sel, ulong old_tss_base, struct desc_struct *new_desc) { const struct x86_emulate_ops *ops = ctxt->ops; struct tss_segment_32 tss_seg; int ret; u32 new_tss_base = get_desc_base(new_desc); u32 eip_offset = offsetof(stru...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: task_switch_32 File: arch/x86/kvm/emulate.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-399" ]
CVE-2014-8481
MEDIUM
4.9
torvalds/linux
task_switch_32
arch/x86/kvm/emulate.c
a430c9166312e1aa3d80bce32374233bdbfeba32
0
Analyze the following code function for security vulnerabilities
static void xfs_inode_buf_read_verify( struct xfs_buf *bp) { xfs_inode_buf_verify(bp, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xfs_inode_buf_read_verify File: fs/xfs/libxfs/xfs_inode_buf.c Repository: xfs/xfs-linux The code follows secure coding practices.
[ "CWE-787" ]
CVE-2018-13095
MEDIUM
4.3
xfs/xfs-linux
xfs_inode_buf_read_verify
fs/xfs/libxfs/xfs_inode_buf.c
23fcb3340d033d9f081e21e6c12c2db7eaa541d3
0
Analyze the following code function for security vulnerabilities
char *file_in_same_dir(const char *path, const char *filename) { char *e, *r; size_t k; assert(path); assert(filename); /* This removes the last component of path and appends * filename, unless the latter is absolute anyway or the * former isn't */ if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: file_in_same_dir File: src/util.c Repository: systemd The code follows secure coding practices.
[ "CWE-362" ]
CVE-2012-1174
LOW
3.3
systemd
file_in_same_dir
src/util.c
5ebff5337594d690b322078c512eb222d34aaa82
0
Analyze the following code function for security vulnerabilities
static void mg_free_ex(void *memory, const char *file, unsigned line) { void *data = (void *)(((char *)memory) - 2 * sizeof(uintptr_t)); #if defined(MEMORY_DEBUGGING) char mallocStr[256]; #else (void)file; (void)line; #endif if (memory) { uintptr_t size = ((uintptr_t *)data)[0]; struct mg_memory_stat *mstat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mg_free_ex File: src/civetweb.c Repository: civetweb The code follows secure coding practices.
[ "CWE-200", "CWE-125" ]
CVE-2018-12684
MEDIUM
5.8
civetweb
mg_free_ex
src/civetweb.c
8fd069f6dedb064339f1091069ac96f3f8bdb552
0
Analyze the following code function for security vulnerabilities
static void read_sbr_extension(AACContext *ac, SpectralBandReplication *sbr, GetBitContext *gb, int bs_extension_id, int *num_bits_left) { switch (bs_extension_id) { case EXTENSION_ID_PS: if (!ac->oc[1].m4ac.ps) { av_log(ac->avctx...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read_sbr_extension File: libavcodec/aacsbr.c Repository: ffmpeg The code follows secure coding practices.
[ "CWE-119" ]
CVE-2015-6820
HIGH
7.5
ffmpeg
read_sbr_extension
libavcodec/aacsbr.c
79a98294da6cd85f8c86b34764c5e0c43b09eea3
0
Analyze the following code function for security vulnerabilities
GF_Err gf_odf_write_kw(GF_BitStream *bs, GF_KeyWord *kwd) { GF_Err e; u32 size, i; GF_KeyWordItem *tmp; if (!kwd) return GF_BAD_PARAM; e = gf_odf_size_descriptor((GF_Descriptor *)kwd, &size); if (e) return e; e = gf_odf_write_base_descriptor(bs, kwd->tag, size); if (e) return e; gf_bs_write_int(bs, kwd->lang...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gf_odf_write_kw File: src/odf/odf_code.c Repository: gpac The code follows secure coding practices.
[ "CWE-125" ]
CVE-2020-19751
MEDIUM
6.4
gpac
gf_odf_write_kw
src/odf/odf_code.c
c26b0aa605aaea1f0ebe8d21fe1398d94680adf7
0
Analyze the following code function for security vulnerabilities
static s32 brcmf_notify_connect_status_ap(struct brcmf_cfg80211_info *cfg, struct net_device *ndev, const struct brcmf_event_msg *e, void *data) { struct wiphy *wiphy = cfg_to_wiphy(cfg); static int generation; u32 event = e->event_code; u32 reason = e->reason; struct station_info *sinfo; brc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: brcmf_notify_connect_status_ap File: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-787" ]
CVE-2019-9500
HIGH
7.9
torvalds/linux
brcmf_notify_connect_status_ap
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
1b5e2423164b3670e8bc9174e4762d297990deff
0
Analyze the following code function for security vulnerabilities
iw_uint32 iwpvt_prng_rand(struct iw_prng *prng) { iw_uint64 x; x = ((iw_uint64)0xfff0bf23) * prng->multiply + prng->carry; prng->carry = (iw_uint32)(x>>32); prng->multiply = 0xffffffff - (0xffffffff & x); return prng->multiply; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: iwpvt_prng_rand File: src/imagew-util.c Repository: jsummers/imageworsener The code follows secure coding practices.
[ "CWE-682" ]
CVE-2017-8326
MEDIUM
6.8
jsummers/imageworsener
iwpvt_prng_rand
src/imagew-util.c
a00183107d4b84bc8a714290e824ca9c68dac738
0
Analyze the following code function for security vulnerabilities
static Editor::Command command(Document* document, const String& commandName, bool userInterface = false) { Frame* frame = document->frame(); if (!frame || frame->document() != document) return Editor::Command(); document->updateStyleIfNeeded(); return frame->editor().command(commandName, userI...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: command File: third_party/WebKit/Source/core/dom/Document.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-399" ]
CVE-2013-6655
HIGH
7.5
chromium
command
third_party/WebKit/Source/core/dom/Document.cpp
5d37b543df5ddecfd6f1d89335f37f29dc86f80d
0
Analyze the following code function for security vulnerabilities
static char * OVS_WARN_UNUSED_RESULT parse_GOTO_TABLE(char *arg, struct ofpbuf *ofpacts, enum ofputil_protocol *usable_protocols OVS_UNUSED) { struct ofpact_goto_table *ogt = ofpact_put_GOTO_TABLE(ofpacts); char *table_s = strsep(&arg, ","); if (!table_s || !table_s[0]) { return xst...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parse_GOTO_TABLE File: lib/ofp-actions.c Repository: openvswitch/ovs The code follows secure coding practices.
[ "CWE-125" ]
CVE-2018-17206
MEDIUM
4
openvswitch/ovs
parse_GOTO_TABLE
lib/ofp-actions.c
9237a63c47bd314b807cda0bd2216264e82edbe8
0
Analyze the following code function for security vulnerabilities
void mbed_stats_heap_get(mbed_stats_heap_t *stats) { #ifdef MBED_HEAP_STATS_ENABLED extern uint32_t mbed_heap_size; heap_stats.reserved_size = mbed_heap_size; malloc_stats_mutex->lock(); memcpy(stats, &heap_stats, sizeof(mbed_stats_heap_t)); malloc_stats_mutex->unlock(); #else memset(stats, 0, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mbed_stats_heap_get File: platform/source/mbed_alloc_wrappers.cpp Repository: ARMmbed/mbed-os The code follows secure coding practices.
[ "CWE-190" ]
CVE-2021-27433
HIGH
7.5
ARMmbed/mbed-os
mbed_stats_heap_get
platform/source/mbed_alloc_wrappers.cpp
151ebfcfc9f2383ee11ce3c771c3bf92900d6b43
0
Analyze the following code function for security vulnerabilities
static int fid_to_qid(V9fsPDU *pdu, V9fsFidState *fidp, V9fsQID *qidp) { struct stat stbuf; int err; err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); if (err < 0) { return err; } stat_to_qid(&stbuf, qidp); return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fid_to_qid File: hw/9pfs/9p.c Repository: qemu The code follows secure coding practices.
[ "CWE-772" ]
CVE-2016-8577
LOW
2.1
qemu
fid_to_qid
hw/9pfs/9p.c
e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
0
Analyze the following code function for security vulnerabilities
static pointer get_vector_object(scheme *sc, int len, pointer init) { pointer cells = get_consecutive_cells(sc,len/2+len%2+1); if(sc->no_memory) { return sc->sink; } /* Record it as a vector so that gc understands it. */ typeflag(cells) = (T_VECTOR | T_ATOM); ivalue_unchecked(cells)=len; set_num_integer(cel...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get_vector_object File: plug-ins/script-fu/tinyscheme/scheme.c Repository: GNOME/gimp The code follows secure coding practices.
[ "CWE-120" ]
CVE-2012-2763
HIGH
7.5
GNOME/gimp
get_vector_object
plug-ins/script-fu/tinyscheme/scheme.c
744f7a4a2b5acb8b531a6f5dd8744ebb95348fc2
0
Analyze the following code function for security vulnerabilities
static bool gs_pattern2_uses_base_space(const gs_pattern_template_t *ptemp) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gs_pattern2_uses_base_space File: base/gsptype2.c Repository: ArtifexSoftware/ghostpdl The code follows secure coding practices.
[ "CWE-704" ]
CVE-2018-19134
MEDIUM
6.8
ArtifexSoftware/ghostpdl
gs_pattern2_uses_base_space
base/gsptype2.c
693baf02152119af6e6afd30bb8ec76d14f84bbf
0
Analyze the following code function for security vulnerabilities
void XclImpSpinButtonObj::DoProcessControl( ScfPropertySet& rPropSet ) const { // Calc's "Border" property is not the 3D/flat style effect in Excel (#i34712#) rPropSet.SetProperty( CREATE_OUSTRING( "Border" ), ::com::sun::star::awt::VisualEffect::NONE ); rPropSet.SetProperty< sal_Int32 >( CREATE_OUSTRING( "...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: XclImpSpinButtonObj::DoProcessControl File: sc/source/filter/excel/xiescher.cxx Repository: libreoffice/core The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2012-4233
MEDIUM
4.3
libreoffice/core
XclImpSpinButtonObj::DoProcessControl
sc/source/filter/excel/xiescher.cxx
6789ec4c1a9c6af84bd62e650a03226a46365d97
0
Analyze the following code function for security vulnerabilities
static bool path_connected(const struct path *path) { struct vfsmount *mnt = path->mnt; /* Only bind mounts can have disconnected paths */ if (mnt->mnt_root == mnt->mnt_sb->s_root) return true; return is_subdir(path->dentry, mnt->mnt_root); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: path_connected File: fs/namei.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362" ]
CVE-2017-7533
MEDIUM
6.9
torvalds/linux
path_connected
fs/namei.c
49d31c2f389acfe83417083e1208422b4091cd9e
0
Analyze the following code function for security vulnerabilities
static bool eapol_frame_watch_match_ifindex(const void *a, const void *b) { struct eapol_frame_watch *efw = l_container_of(a, struct eapol_frame_watch, super); return efw->ifindex == L_PTR_TO_UINT(b); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: eapol_frame_watch_match_ifindex File: src/eapol.c Repository: wireless/iwd The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-52161
HIGH
7.5
wireless/iwd
eapol_frame_watch_match_ifindex
src/eapol.c
6415420f1c92012f64063c131480ffcef58e60ca
0
Analyze the following code function for security vulnerabilities
void kvm_free_pit(struct kvm *kvm) { struct hrtimer *timer; if (kvm->arch.vpit) { kvm_io_bus_unregister_dev(kvm, KVM_PIO_BUS, &kvm->arch.vpit->dev); kvm_io_bus_unregister_dev(kvm, KVM_PIO_BUS, &kvm->arch.vpit->speaker_dev); kvm_unregister_irq_mask_notifier(kvm, 0, &kvm->arch.vpit->mask_n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: kvm_free_pit File: arch/x86/kvm/i8254.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-3611
MEDIUM
4.7
torvalds/linux
kvm_free_pit
arch/x86/kvm/i8254.c
2febc839133280d5a5e8e1179c94ea674489dae2
0
Analyze the following code function for security vulnerabilities
double bif_double_arg (caddr_t * qst, state_slot_t ** args, int nth, const char *func) { caddr_t arg = bif_arg_unrdf (qst, args, nth, func); dtp_t dtp = DV_TYPE_OF (arg); if (dtp == DV_SHORT_INT || dtp == DV_LONG_INT) return ((double) unbox (arg)); else if (dtp == DV_SINGLE_FLOAT) return ((double) unbox_flo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bif_double_arg File: libsrc/Wi/sqlbif.c Repository: openlink/virtuoso-opensource The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-31616
HIGH
7.5
openlink/virtuoso-opensource
bif_double_arg
libsrc/Wi/sqlbif.c
25fff0eaa85898004bb14909e9f29d16b2918792
0
Analyze the following code function for security vulnerabilities
static void print_trailer(struct kmem_cache *s, struct page *page, u8 *p) { unsigned int off; /* Offset of last byte */ u8 *addr = page_address(page); print_tracking(s, p); print_page_info(page); pr_err("INFO: Object 0x%p @offset=%tu fp=0x%p\n\n", p, p - addr, get_freepointer(s, p)); if (s->flags & SL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: print_trailer File: mm/slub.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362" ]
CVE-2020-29370
MEDIUM
4.4
torvalds/linux
print_trailer
mm/slub.c
fd4d9c7d0c71866ec0c2825189ebd2ce35bd95b8
0
Analyze the following code function for security vulnerabilities
static int wait_consider_task(struct wait_opts *wo, int ptrace, struct task_struct *p) { int ret = eligible_child(wo, p); if (!ret) return ret; ret = security_task_wait(p); if (unlikely(ret < 0)) { /* * If we have not yet seen any eligible child, * then let this error code replace -ECHILD. * A per...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wait_consider_task File: kernel/exit.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-400" ]
CVE-2012-0879
MEDIUM
4.9
torvalds/linux
wait_consider_task
kernel/exit.c
b69f2292063d2caf37ca9aec7d63ded203701bf3
0
Analyze the following code function for security vulnerabilities
static int sctp_auth_compare_vectors(struct sctp_auth_bytes *vector1, struct sctp_auth_bytes *vector2) { int diff; int i; const __u8 *longer; diff = vector1->len - vector2->len; if (diff) { longer = (diff > 0) ? vector1->data : vector2->data; /* Check to see if the longer number is * lead-zero pa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sctp_auth_compare_vectors File: net/sctp/auth.c Repository: kernel/git/netdev/net The code follows secure coding practices.
[ "CWE-400" ]
CVE-2010-3705
HIGH
8.3
kernel/git/netdev/net
sctp_auth_compare_vectors
net/sctp/auth.c
51e97a12bef19b7e43199fc153cf9bd5f2140362
0
Analyze the following code function for security vulnerabilities
static int qemuProcessRefreshCPUMigratability(virQEMUDriverPtr driver, virDomainObjPtr vm, qemuDomainAsyncJob asyncJob) { qemuDomainObjPrivatePtr priv = vm->privateData; virDomainDefPtr def = vm->def; bool migratable; int rc; if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: qemuProcessRefreshCPUMigratability File: src/qemu/qemu_process.c Repository: libvirt The code follows secure coding practices.
[ "CWE-416" ]
CVE-2021-3975
MEDIUM
6.5
libvirt
qemuProcessRefreshCPUMigratability
src/qemu/qemu_process.c
1ac703a7d0789e46833f4013a3876c2e3af18ec7
0
Analyze the following code function for security vulnerabilities
std::set<RenderWidgetHostView*> WebContentsImpl::GetRenderWidgetHostViewsInTree() { std::set<RenderWidgetHostView*> set; if (ShowingInterstitialPage()) { set.insert(GetRenderWidgetHostView()); } else { ForEachFrame( base::Bind(&AddRenderWidgetHostViewToSet, base::Unretained(&set))); } return s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: WebContentsImpl::GetRenderWidgetHostViewsInTree File: content/browser/web_contents/web_contents_impl.cc Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-7899
MEDIUM
5
chromium
WebContentsImpl::GetRenderWidgetHostViewsInTree
content/browser/web_contents/web_contents_impl.cc
5cfbddc9cc972f5133f26664dbf5810bb569cd04
0
Analyze the following code function for security vulnerabilities
static int php_pgsql_get_default_link(INTERNAL_FUNCTION_PARAMETERS) { if (PGG(default_link)==-1) { /* no link opened yet, implicitly open one */ ht = 0; php_pgsql_do_connect(INTERNAL_FUNCTION_PARAM_PASSTHRU,0); } return PGG(default_link); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: php_pgsql_get_default_link File: ext/pgsql/pgsql.c Repository: php/php-src The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2015-1352
MEDIUM
5
php/php-src
php_pgsql_get_default_link
ext/pgsql/pgsql.c
124fb22a13fafa3648e4e15b4f207c7096d8155e
0
Analyze the following code function for security vulnerabilities
void SVGDocumentExtensions::reportError(const String& message) { reportMessage(m_document, ErrorMessageLevel, "Error: " + message); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: SVGDocumentExtensions::reportError File: third_party/WebKit/Source/core/svg/SVGDocumentExtensions.cpp Repository: chromium The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-3168
HIGH
7.5
chromium
SVGDocumentExtensions::reportError
third_party/WebKit/Source/core/svg/SVGDocumentExtensions.cpp
f592cf6a66b63decc7e7093b36501229a5de1f1d
0
Analyze the following code function for security vulnerabilities
STATIC void S_ssc_cp_and(pTHX_ regnode_ssc *ssc, const UV cp) { /* AND just the single code point 'cp' into the SSC 'ssc' */ SV* cp_list = _new_invlist(2); PERL_ARGS_ASSERT_SSC_CP_AND; assert(is_ANYOF_SYNTHETIC(ssc)); cp_list = add_cp_to_invlist(cp_list, cp); ssc_intersection(ssc, cp_list, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: S_ssc_cp_and File: regcomp.c Repository: Perl/perl5 The code follows secure coding practices.
[ "CWE-120" ]
CVE-2020-12723
MEDIUM
5
Perl/perl5
S_ssc_cp_and
regcomp.c
3a1df45e827a79d14694d18dd0141c09a0abfe5c
0