instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
inline void Softmax(const SoftmaxParams& params, const RuntimeShape& input_shape, const In* input_data, const RuntimeShape& output_shape, Out* output_data) { const int trailing_dim = input_shape.DimensionsCount() - 1; const int excluding_last_dim = MatchingFlatSizeSkipD...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Softmax File: tensorflow/lite/kernels/internal/optimized/optimized_ops.h Repository: tensorflow The code follows secure coding practices.
[ "CWE-476" ]
CVE-2021-37688
LOW
2.1
tensorflow
Softmax
tensorflow/lite/kernels/internal/optimized/optimized_ops.h
15691e456c7dc9bd6be203b09765b063bf4a380c
0
Analyze the following code function for security vulnerabilities
void imap_mbox_handle_set_state(ImapMboxHandle *h, ImapConnectionState newstate) { h->state = newstate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: imap_mbox_handle_set_state File: libbalsa/imap/imap-handle.c Repository: GNOME/balsa The code follows secure coding practices.
[ "CWE-476" ]
CVE-2020-16118
MEDIUM
5
GNOME/balsa
imap_mbox_handle_set_state
libbalsa/imap/imap-handle.c
4e245d758e1c826a01080d40c22ca8706f0339e5
0
Analyze the following code function for security vulnerabilities
static bool hci_sock_gen_cookie(struct sock *sk) { int id = hci_pi(sk)->cookie; if (!id) { id = ida_simple_get(&sock_cookie_ida, 1, 0, GFP_KERNEL); if (id < 0) id = 0xffffffff; hci_pi(sk)->cookie = id; get_task_comm(hci_pi(sk)->comm, current); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hci_sock_gen_cookie File: net/bluetooth/hci_sock.c Repository: kernel/git/bluetooth/bluetooth The code follows secure coding practices.
[ "CWE-362" ]
CVE-2021-3573
MEDIUM
6.9
kernel/git/bluetooth/bluetooth
hci_sock_gen_cookie
net/bluetooth/hci_sock.c
e305509e678b3a4af2b3cfd410f409f7cdaabb52
0
Analyze the following code function for security vulnerabilities
static bool ide_tray_state_needed(void *opaque) { IDEState *s = opaque; return s->tray_open || s->tray_locked; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ide_tray_state_needed File: hw/ide/core.c Repository: qemu The code follows secure coding practices.
[ "CWE-476" ]
CVE-2019-12067
LOW
2.1
qemu
ide_tray_state_needed
hw/ide/core.c
659142ecf71a0da240ab0ff7cf929ee25c32b9bc
0