instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | inline void Softmax(const SoftmaxParams& params,
const RuntimeShape& input_shape, const In* input_data,
const RuntimeShape& output_shape, Out* output_data) {
const int trailing_dim = input_shape.DimensionsCount() - 1;
const int excluding_last_dim =
MatchingFlatSizeSkipD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: Softmax
File: tensorflow/lite/kernels/internal/optimized/optimized_ops.h
Repository: tensorflow
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2021-37688 | LOW | 2.1 | tensorflow | Softmax | tensorflow/lite/kernels/internal/optimized/optimized_ops.h | 15691e456c7dc9bd6be203b09765b063bf4a380c | 0 |
Analyze the following code function for security vulnerabilities | void
imap_mbox_handle_set_state(ImapMboxHandle *h, ImapConnectionState newstate)
{
h->state = newstate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: imap_mbox_handle_set_state
File: libbalsa/imap/imap-handle.c
Repository: GNOME/balsa
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2020-16118 | MEDIUM | 5 | GNOME/balsa | imap_mbox_handle_set_state | libbalsa/imap/imap-handle.c | 4e245d758e1c826a01080d40c22ca8706f0339e5 | 0 |
Analyze the following code function for security vulnerabilities | static bool hci_sock_gen_cookie(struct sock *sk)
{
int id = hci_pi(sk)->cookie;
if (!id) {
id = ida_simple_get(&sock_cookie_ida, 1, 0, GFP_KERNEL);
if (id < 0)
id = 0xffffffff;
hci_pi(sk)->cookie = id;
get_task_comm(hci_pi(sk)->comm, current);
return true;
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hci_sock_gen_cookie
File: net/bluetooth/hci_sock.c
Repository: kernel/git/bluetooth/bluetooth
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2021-3573 | MEDIUM | 6.9 | kernel/git/bluetooth/bluetooth | hci_sock_gen_cookie | net/bluetooth/hci_sock.c | e305509e678b3a4af2b3cfd410f409f7cdaabb52 | 0 |
Analyze the following code function for security vulnerabilities | static bool ide_tray_state_needed(void *opaque)
{
IDEState *s = opaque;
return s->tray_open || s->tray_locked;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ide_tray_state_needed
File: hw/ide/core.c
Repository: qemu
The code follows secure coding practices. | [
"CWE-476"
] | CVE-2019-12067 | LOW | 2.1 | qemu | ide_tray_state_needed | hw/ide/core.c | 659142ecf71a0da240ab0ff7cf929ee25c32b9bc | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.