Dataset Viewer
Auto-converted to Parquet Duplicate
instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
void SkPath::dump(SkWStream* wStream, bool forceClose, bool dumpAsHex) const { SkScalarAsStringType asType = dumpAsHex ? kHex_SkScalarAsStringType : kDec_SkScalarAsStringType; Iter iter(*this, forceClose); SkPoint pts[4]; Verb verb; if (!wStream) { SkDebugf("path: forceClose=%s\n", fo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: SkPath::dump File: src/core/SkPath.cpp Repository: skia The code follows secure coding practices.
[ "CWE-19" ]
CVE-2016-7395
MEDIUM
6.8
skia
SkPath::dump
src/core/SkPath.cpp
276e63361c73fed6c6528b322400ece81fd1d067
0
Analyze the following code function for security vulnerabilities
BOOL license_read_license_request_packet(rdpLicense* license, wStream* s) { /* ServerRandom (32 bytes) */ if (Stream_GetRemainingLength(s) < 32) return FALSE; Stream_Read(s, license->ServerRandom, 32); /* ProductInfo */ if (!license_read_product_info(s, license->ProductInfo)) return FALSE; /* KeyExchangeLi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: license_read_license_request_packet File: libfreerdp/core/license.c Repository: FreeRDP The code follows secure coding practices.
[ "CWE-189" ]
CVE-2014-0791
MEDIUM
6.8
FreeRDP
license_read_license_request_packet
libfreerdp/core/license.c
e2745807c4c3e0a590c0f69a9b655dc74ebaa03e
0
Analyze the following code function for security vulnerabilities
void PackVmlinuxARMEB::buildLoader(const Filter *ft) { // prepare loader initLoader(stub_armeb_v5a_linux_kernel_vmlinux, sizeof(stub_armeb_v5a_linux_kernel_vmlinux)); addLoader("LINUX000", NULL); if (ft->id) { assert(ft->calls > 0); addLoader("LINUX010", NULL); } addLoader("LINUX...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: PackVmlinuxARMEB::buildLoader File: src/p_vmlinx.cpp Repository: upx The code follows secure coding practices.
[ "CWE-190" ]
CVE-2019-14295
MEDIUM
4.3
upx
PackVmlinuxARMEB::buildLoader
src/p_vmlinx.cpp
6a53c0b3d499d62346a5c51034db543a4ef78ea3
0
Analyze the following code function for security vulnerabilities
explicit HitCollector_c ( SnippetsDocIndex_c & tContainer, ISphTokenizer * pTokenizer, CSphDict * pDict, const ExcerptQuery_t & tQuery, const CSphIndexSettings & tSettingsIndex, const char * sDoc, int iDocLen, CacheStreamer_c & tTokenContainer ) : TokenFunctorTraits_c ( tContainer, pTokenizer, pDict, tQuery, tSet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: HitCollector_c File: src/sphinxexcerpt.cpp Repository: manticoresoftware/manticoresearch The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-29050
MEDIUM
5
manticoresoftware/manticoresearch
HitCollector_c
src/sphinxexcerpt.cpp
6e597ff61e1e910559f6ed541ff32520085af6aa
0
Analyze the following code function for security vulnerabilities
void CLASS processNikonLensData (uchar *LensData, unsigned len) { ushort i; if (!(imgdata.lens.nikon.NikonLensType & 0x01)) { imgdata.lens.makernotes.LensFeatures_pre[0] = 'A'; imgdata.lens.makernotes.LensFeatures_pre[1] = 'F'; } else { imgdata.lens.makernotes.LensFeatures_pre[0] = '...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processNikonLensData File: internal/dcraw_common.cpp Repository: LibRaw The code follows secure coding practices.
[ "CWE-125" ]
CVE-2017-14608
MEDIUM
6.4
LibRaw
processNikonLensData
internal/dcraw_common.cpp
d13e8f6d1e987b7491182040a188c16a395f1d21
0
Analyze the following code function for security vulnerabilities
TSReturnCode TSMimeHdrFieldValueStringSet(TSMBuffer bufp, TSMLoc hdr, TSMLoc field, int idx, const char *value, int length) { // Allow to modify the buffer only // if bufp is modifiable. If bufp is not modifiable return // TS_ERROR. If allowed, return TS_SUCCESS. Changed the // return value of function from voi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: TSMimeHdrFieldValueStringSet File: proxy/InkAPI.cc Repository: apache/trafficserver The code follows secure coding practices.
[ "CWE-400" ]
CVE-2018-8005
MEDIUM
5
apache/trafficserver
TSMimeHdrFieldValueStringSet
proxy/InkAPI.cc
6d248026b04d69e5c5049709c17ea671328ea4ea
0
Analyze the following code function for security vulnerabilities
CallResult<HermesValue> typedArrayPrototypeLength(void *, Runtime &runtime, NativeArgs args) { if (JSTypedArrayBase::validateTypedArray( runtime, args.getThisHandle(), false) == ExecutionStatus::EXCEPTION) { return ExecutionStatus::EXCEPTION; } auto self = args.vmcastThis<JSTypedArrayBase>(); retu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: typedArrayPrototypeLength File: lib/VM/JSLib/TypedArray.cpp Repository: facebook/hermes The code follows secure coding practices.
[ "CWE-416", "CWE-843" ]
CVE-2023-25933
CRITICAL
9.8
facebook/hermes
typedArrayPrototypeLength
lib/VM/JSLib/TypedArray.cpp
e6ed9c1a4b02dc219de1648f44cd808a56171b81
0
Analyze the following code function for security vulnerabilities
static int decode_gtp_mbms_time_to_data_tr(tvbuff_t * tvb, int offset, packet_info * pinfo _U_, proto_tree * tree) { guint16 length; proto_tree *ext_tree; proto_item *te; guint8 time_2_dta_tr; length = tvb_get_ntohs(tvb, offset + 1); te = proto_tree_add_text(tree, tvb, offset, 3 + len...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: decode_gtp_mbms_time_to_data_tr File: epan/dissectors/packet-gtp.c Repository: wireshark The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-5163
MEDIUM
5
wireshark
decode_gtp_mbms_time_to_data_tr
epan/dissectors/packet-gtp.c
3fc441e7a5008640c68ec985e669d5092414a519
0
Analyze the following code function for security vulnerabilities
double yr_object_get_float( YR_OBJECT* object, const char* field, ...) { YR_OBJECT* double_obj; va_list args; va_start(args, field); if (field != NULL) double_obj = _yr_object_lookup(object, 0, field, args); else double_obj = object; va_end(args); if (double_obj == NULL) return...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: yr_object_get_float File: libyara/object.c Repository: VirusTotal/yara The code follows secure coding practices.
[ "CWE-416" ]
CVE-2017-8929
MEDIUM
5
VirusTotal/yara
yr_object_get_float
libyara/object.c
053e67e3ec81cc9268ce30eaf0d6663d8639ed1e
0
Analyze the following code function for security vulnerabilities
void io_msg_ring_cleanup(struct io_kiocb *req) { struct io_msg *msg = io_kiocb_to_cmd(req, struct io_msg); if (WARN_ON_ONCE(!msg->src_file)) return; fput(msg->src_file); msg->src_file = NULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: io_msg_ring_cleanup File: io_uring/msg_ring.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-667" ]
CVE-2023-2430
MEDIUM
5.5
torvalds/linux
io_msg_ring_cleanup
io_uring/msg_ring.c
e12d7a46f65ae4b7d58a5e0c1cbfa825cf8d830d
0
Analyze the following code function for security vulnerabilities
void DffPropSet::Merge( DffPropSet& rMaster ) const { for ( void* pDummy = rMaster.First(); pDummy; pDummy = rMaster.Next() ) { sal_uInt32 nRecType = rMaster.GetCurKey(); if ( ( nRecType & 0x3f ) == 0x3f ) // this is something called FLAGS { sal_uInt32 nCurrentFlags = mp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: DffPropSet::Merge File: filter/source/msfilter/msdffimp.cxx Repository: libreoffice/core The code follows secure coding practices.
[ "CWE-189" ]
CVE-2012-2334
MEDIUM
6.8
libreoffice/core
DffPropSet::Merge
filter/source/msfilter/msdffimp.cxx
28a6558f9d3ca2dda3191f8b5b3f2378ee2533da
0
Analyze the following code function for security vulnerabilities
static void svm_cpu_dead(unsigned int cpu) { paddr_t *this_hsa = &per_cpu(hsa, cpu); paddr_t *this_vmcb = &per_cpu(host_vmcb, cpu); if ( *this_hsa ) { free_domheap_page(maddr_to_page(*this_hsa)); *this_hsa = 0; } #ifdef CONFIG_PV if ( per_cpu(host_vmcb_va, cpu) ) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: svm_cpu_dead File: xen/arch/x86/hvm/svm/svm.c Repository: xen-project/xen The code follows secure coding practices.
[ "CWE-20" ]
CVE-2019-17347
MEDIUM
4.6
xen-project/xen
svm_cpu_dead
xen/arch/x86/hvm/svm/svm.c
eccc170053e46b4ab1d9e7485c09e210be15bbd7
0
Analyze the following code function for security vulnerabilities
static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint16_t len, uint8_t sig) { uint8_t error = 0; if (len > 0) { if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { p_msg->hdr.err_param = *p++; len--; } else if ((sig == AVDT_SIG_START) ||...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: avdt_msg_prs_rej File: system/stack/avdt/avdt_msg.cc Repository: android The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-35684
HIGH
8.8
android
avdt_msg_prs_rej
system/stack/avdt/avdt_msg.cc
668bbca29797728004d88db4c9b69102f3939008
0
Analyze the following code function for security vulnerabilities
static int dissect_kafka_leader_and_isr_request_topic_state(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int offset, kafka_api_version_t api_version) { proto_tree *subtree; proto_item *subti; int topic_start, topic_len; subtree = proto_tree_a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dissect_kafka_leader_and_isr_request_topic_state File: epan/dissectors/packet-kafka.c Repository: wireshark The code follows secure coding practices.
[ "CWE-415" ]
CVE-2020-17498
MEDIUM
4.3
wireshark
dissect_kafka_leader_and_isr_request_topic_state
epan/dissectors/packet-kafka.c
76afda963de4f0b9be24f2d8e873990a5cbf221b
0
Analyze the following code function for security vulnerabilities
static int fnmatch_normalize(const char *pattern, const char *string, int flags) { int i, j, r; char *pattern_norm = NULL; r = ALLOC_N(pattern_norm, strlen(pattern) + 1); if (r < 0) goto error; for (i = 0, j = 0; i < strlen(pattern); i++) { if (pattern[i] != '/' || pattern[i+1] != ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fnmatch_normalize File: src/transform.c Repository: hercules-team/augeas The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-6412
MEDIUM
4.6
hercules-team/augeas
fnmatch_normalize
src/transform.c
f5b4fc0c
0
Analyze the following code function for security vulnerabilities
static TIFF* openSrcImage (char **imageSpec) /* imageSpec points to a pointer to a filename followed by optional ,image#'s Open the TIFF file and assign *imageSpec to either NULL if there are no images specified, or a pointer to the next image number text */ { TIFF *tif; char *fn = *imageSpec; *imageSpec = str...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openSrcImage File: tools/tiffcp.c Repository: libtiff The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-19143
MEDIUM
4.3
libtiff
openSrcImage
tools/tiffcp.c
54ce8c522078cd0f39861df71db848648ec28ade
0
Analyze the following code function for security vulnerabilities
static double filter_bicubic(const double t) { const double abs_t = (double)fabs(t); const double abs_t_sq = abs_t * abs_t; if (abs_t<1) return 1-2*abs_t_sq+abs_t_sq*abs_t; if (abs_t<2) return 4 - 8*abs_t +5*abs_t_sq - abs_t_sq*abs_t; return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filter_bicubic File: ext/gd/libgd/gd_interpolation.c Repository: php/php-src The code follows secure coding practices.
[ "CWE-119", "CWE-200" ]
CVE-2016-1903
MEDIUM
6.4
php/php-src
filter_bicubic
ext/gd/libgd/gd_interpolation.c
84b8db597ae597abce1977ce64dcf231e71330f9
0
Analyze the following code function for security vulnerabilities
void bcf_hdr_destroy(bcf_hdr_t *h) { int i; khint_t k; if (!h) return; for (i = 0; i < 3; ++i) { vdict_t *d = (vdict_t*)h->dict[i]; if (d == 0) continue; for (k = kh_begin(d); k != kh_end(d); ++k) if (kh_exist(d, k)) free((char*)kh_key(d, k)); kh_destroy(vdict...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bcf_hdr_destroy File: vcf.c Repository: samtools/htslib The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-36403
MEDIUM
6.8
samtools/htslib
bcf_hdr_destroy
vcf.c
dcd4b7304941a8832fba2d0fc4c1e716e7a4e72c
0
Analyze the following code function for security vulnerabilities
static int64_t MakeInt(PyObject* integer) { #if PY_MAJOR_VERSION >= 3 return PyLong_AsLong(integer); #else return PyInt_AsLong(integer); #endif }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: MakeInt File: tensorflow/python/eager/pywrap_tfe_src.cc Repository: tensorflow The code follows secure coding practices.
[ "CWE-476" ]
CVE-2022-41889
HIGH
7.5
tensorflow
MakeInt
tensorflow/python/eager/pywrap_tfe_src.cc
e9e95553e5411834d215e6770c81a83a3d0866ce
0
Analyze the following code function for security vulnerabilities
static inline void f2fs_unlock_op(struct f2fs_sb_info *sbi) { up_read(&sbi->cp_rwsem); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: f2fs_unlock_op File: include/trace/events/f2fs.h Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-476" ]
CVE-2019-19815
HIGH
7.1
torvalds/linux
f2fs_unlock_op
include/trace/events/f2fs.h
4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
0
Analyze the following code function for security vulnerabilities
static Ref makeDot(Ref obj, IString key) { return &makeRawArray(3)->push_back(makeRawString(DOT)) .push_back(obj) .push_back(makeRawString(key)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeDot File: src/emscripten-optimizer/simple_ast.h Repository: WebAssembly/binaryen The code follows secure coding practices.
[ "CWE-476" ]
CVE-2019-7153
MEDIUM
4.3
WebAssembly/binaryen
makeDot
src/emscripten-optimizer/simple_ast.h
e63c4a7d04c145dafaf4b09de5f9f5de69cee8ef
0
Analyze the following code function for security vulnerabilities
GF_ItemListBox *gf_isom_locate_box(GF_List *list, u32 boxType, bin128 UUID) { u32 i; GF_Box *box; i=0; while ((box = (GF_Box *)gf_list_enum(list, &i))) { if (box->type == boxType) { GF_UUIDBox* box2 = (GF_UUIDBox* )box; if (boxType != GF_ISOM_BOX_TYPE_UUID) return (GF_ItemListBox *)box; if (!memcmp(box2-...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gf_isom_locate_box File: src/isomedia/isom_read.c Repository: gpac The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-46001
MEDIUM
5.5
gpac
gf_isom_locate_box
src/isomedia/isom_read.c
e79b0cf7e72404750630bc01340e999f3940dbc4
0
Analyze the following code function for security vulnerabilities
static int dwg_decode_common_entity_handle_data(Bit_Chain* dat, Bit_Chain* hdl_dat, Dwg_Object *restrict obj) { Dwg_Data *dwg = obj->parent; Dwg_Object_Entity *_obj; long unsigned int vcount; Dwg_Object_Entity *_ent; int error = 0; _obj = _ent = obj->tio.entity; #in...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dwg_decode_common_entity_handle_data File: src/decode.c Repository: LibreDWG/libredwg The code follows secure coding practices.
[ "CWE-415" ]
CVE-2018-14524
MEDIUM
4.3
LibreDWG/libredwg
dwg_decode_common_entity_handle_data
src/decode.c
9a8b9fb49108bab5d12f3353292f8fd8ea12898f
0
Analyze the following code function for security vulnerabilities
static JSValue js_object_defineProperty(JSContext *ctx, JSValueConst this_val, int argc, JSValueConst *argv, int magic) { JSValueConst obj, prop, desc; int ret, flags; JSAtom atom; obj = argv[0]; prop = argv[1]; desc = argv[2]; if (JS_VALUE_GET_TAG(o...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: js_object_defineProperty File: quickjs.c Repository: bellard/quickjs The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-31922
HIGH
7.5
bellard/quickjs
js_object_defineProperty
quickjs.c
03cc5ecc88f8534a5db5c911df4b712a21d08fb8
0
Analyze the following code function for security vulnerabilities
static inline void perf_get_data_addr(struct pt_regs *regs, u64 *addrp) { unsigned long mmcra = regs->dsisr; unsigned long sdsync = (ppmu->flags & PPMU_ALT_SIPR) ? POWER6_MMCRA_SDSYNC : MMCRA_SDSYNC; if (!(mmcra & MMCRA_SAMPLE_ENABLE) || (mmcra & sdsync)) *addrp = mfspr(SPRN_SDAR); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: perf_get_data_addr File: arch/powerpc/kernel/perf_event.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-189" ]
CVE-2011-4611
MEDIUM
4.9
torvalds/linux
perf_get_data_addr
arch/powerpc/kernel/perf_event.c
0837e3242c73566fc1c0196b4ec61779c25ffc93
0
Analyze the following code function for security vulnerabilities
static int ComparePriority(const void *p1, const void *p2) { FontDirectoryPtr dir1 = (*(FontPathElementPtr*) p1)->private; FontDirectoryPtr dir2 = (*(FontPathElementPtr*) p2)->private; const char *pri1 = NULL; const char *pri2 = NULL; if (dir1->attributes != NULL) pri1 = strstr(dir1->attributes, P...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ComparePriority File: src/fontfile/catalogue.c Repository: xorg/lib/libXfont The code follows secure coding practices.
[ "CWE-119" ]
CVE-2007-5199
HIGH
7.5
xorg/lib/libXfont
ComparePriority
src/fontfile/catalogue.c
5bf703700ee4a5d6eae20da07cb7a29369667aef
0
Analyze the following code function for security vulnerabilities
gboolean nm_device_can_assume_active_connection (NMDevice *self) { NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self); NMConnection *connection; const char *method; const char *assumable_ip6_methods[] = { NM_SETTING_IP6_CONFIG_METHOD_IGNORE, NM_SETTING_IP6_CONFIG_METHOD_AUTO, NM_SETTING_IP6_CONFIG_METHOD_DH...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nm_device_can_assume_active_connection File: src/devices/nm-device.c Repository: NetworkManager The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2015-0272
MEDIUM
5
NetworkManager
nm_device_can_assume_active_connection
src/devices/nm-device.c
d5fc88e573fa58b93034b04d35a2454f5d28cad9
0
Analyze the following code function for security vulnerabilities
uint32_t AudioFlinger::PlaybackThread::Track::sampleRate() const { return mAudioTrackServerProxy->getSampleRate(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: AudioFlinger::PlaybackThread::Track::sampleRate File: services/audioflinger/Tracks.cpp Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20942
MEDIUM
5.5
android
AudioFlinger::PlaybackThread::Track::sampleRate
services/audioflinger/Tracks.cpp
bae3b00a5873d1562679a1289fd8490178cfe064
0
Analyze the following code function for security vulnerabilities
static void ext4_clear_journal_err(struct super_block *sb, struct ext4_super_block *es) { journal_t *journal; int j_errno; const char *errstr; BUG_ON(!ext4_has_feature_journal(sb)); journal = EXT4_SB(sb)->s_journal; /* * Now check for any error status which may have been recorded in the * journal by...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ext4_clear_journal_err File: fs/ext4/super.c Repository: kernel/git/tytso/ext4 The code follows secure coding practices.
[ "CWE-476" ]
CVE-2018-1094
HIGH
7.1
kernel/git/tytso/ext4
ext4_clear_journal_err
fs/ext4/super.c
18db4b4e6fc31eda838dd1c1296d67dbcb3dc957
0
Analyze the following code function for security vulnerabilities
MA_API void ma_pcm_deinterleave_s16(void** dst, const void* src, ma_uint64 frameCount, ma_uint32 channels) { #ifdef MA_USE_REFERENCE_CONVERSION_APIS ma_pcm_deinterleave_s16__reference(dst, src, frameCount, channels); #else ma_pcm_deinterleave_s16__optimized(dst, src, frameCount, channels); #endif }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ma_pcm_deinterleave_s16 File: miniaudio.h Repository: mackron/miniaudio The code follows secure coding practices.
[ "CWE-415" ]
CVE-2021-34184
HIGH
7.5
mackron/miniaudio
ma_pcm_deinterleave_s16
miniaudio.h
8234df87c9268507847e0033280067bade9a57a1
0
Analyze the following code function for security vulnerabilities
int fastcall aio_complete(struct kiocb *iocb, long res, long res2) { struct kioctx *ctx = iocb->ki_ctx; struct aio_ring_info *info; struct aio_ring *ring; struct io_event *event; unsigned long flags; unsigned long tail; int ret; /* * Special case handling for sync iocbs: * - events go directly into the i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aio_complete File: fs/aio.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2010-3066
MEDIUM
4.9
torvalds/linux
aio_complete
fs/aio.c
87e2831c3fa39cbf6f7ab676bb5aef039b9659e2
0
Analyze the following code function for security vulnerabilities
static struct io_kiocb *io_poll_file_find(struct io_ring_ctx *ctx, struct io_cancel_data *cd) __must_hold(&ctx->completion_lock) { struct io_kiocb *req; int i; for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) { struct hlist_head *list; list = &ctx->cancel_hash[i]; hlist_for_each_entry(req, list, h...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: io_poll_file_find File: fs/io_uring.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-476" ]
CVE-2022-4127
MEDIUM
5.5
torvalds/linux
io_poll_file_find
fs/io_uring.c
d785a773bed966a75ca1f11d108ae1897189975b
0
Analyze the following code function for security vulnerabilities
static int snd_pcm_tstamp(struct snd_pcm_substream *substream, int __user *_arg) { struct snd_pcm_runtime *runtime = substream->runtime; int arg; if (get_user(arg, _arg)) return -EFAULT; if (arg < 0 || arg > SNDRV_PCM_TSTAMP_TYPE_LAST) return -EINVAL; runtime->tstamp_type = arg; return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: snd_pcm_tstamp File: sound/core/pcm_native.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-416" ]
CVE-2017-0861
MEDIUM
4.6
torvalds/linux
snd_pcm_tstamp
sound/core/pcm_native.c
e11f0f90a626f93899687b1cc909ee37dd6c5809
0
Analyze the following code function for security vulnerabilities
static void info_callback(const char *msg, void *client_data) { (void)client_data; fprintf(stdout, "[INFO] %s", msg); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: info_callback File: src/bin/jp2/opj_compress.c Repository: uclouvain/openjpeg The code follows secure coding practices.
[ "CWE-190" ]
CVE-2021-29338
MEDIUM
4.3
uclouvain/openjpeg
info_callback
src/bin/jp2/opj_compress.c
f0727df07c4d944d7d1c5002451cfbc9545d3288
0
Analyze the following code function for security vulnerabilities
bool Browser::CanReloadContents(content::WebContents* web_contents) const { return chrome::CanReload(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Browser::CanReloadContents File: chrome/browser/ui/browser.cc Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2015-6583
MEDIUM
4.3
chromium
Browser::CanReloadContents
chrome/browser/ui/browser.cc
11bd6ed1f622cd9421ed4cdb53454e08d689e342
0
Analyze the following code function for security vulnerabilities
long mg_current_thread_id(void) { #if defined(_WIN32) return GetCurrentThreadId(); #else #if defined(__clang__) #pragma clang diagnostic push #pragma clang diagnostic ignored "-Wunreachable-code" /* For every compiler, either "sizeof(pthread_t) > sizeof(unsigned long)" * or not, so one of the two conditions will be ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mg_current_thread_id File: src/civetweb.c Repository: civetweb The code follows secure coding practices.
[ "CWE-200", "CWE-125" ]
CVE-2018-12684
MEDIUM
5.8
civetweb
mg_current_thread_id
src/civetweb.c
8fd069f6dedb064339f1091069ac96f3f8bdb552
0
Analyze the following code function for security vulnerabilities
static DRFLAC_INLINE void drflac_read_pcm_frames_s16__decode_left_side__sse2(drflac* pFlac, drflac_uint64 frameCount, drflac_uint32 unusedBitsPerSample, const drflac_int32* pInputSamples0, const drflac_int32* pInputSamples1, drflac_int16* pOutputSamples) { drflac_uint64 i; drflac_uint64 frameCount4 = frameCount...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: drflac_read_pcm_frames_s16__decode_left_side__sse2 File: miniaudio.h Repository: mackron/miniaudio The code follows secure coding practices.
[ "CWE-415" ]
CVE-2021-34184
HIGH
7.5
mackron/miniaudio
drflac_read_pcm_frames_s16__decode_left_side__sse2
miniaudio.h
8234df87c9268507847e0033280067bade9a57a1
0
Analyze the following code function for security vulnerabilities
void LibRaw::sony_load_raw() { uchar head[40]; ushort *pixel; unsigned i, key, row, col; fseek(ifp, 200896, SEEK_SET); fseek(ifp, (unsigned)fgetc(ifp) * 4 - 1, SEEK_CUR); order = 0x4d4d; key = get4(); fseek(ifp, 164600, SEEK_SET); fread(head, 1, 40, ifp); sony_decrypt((unsigned *)head, 10, 1, key)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: LibRaw::sony_load_raw File: src/decoders/decoders_dcraw.cpp Repository: LibRaw The code follows secure coding practices.
[ "CWE-125" ]
CVE-2020-35533
MEDIUM
5.5
LibRaw
LibRaw::sony_load_raw
src/decoders/decoders_dcraw.cpp
a6937d4046a7c4742b683a04c8564605fd9be4fb
0
Analyze the following code function for security vulnerabilities
static int nfs_pagein_multi(struct inode *inode, struct list_head *head, unsigned int npages, size_t count, int flags) { struct nfs_page *req = nfs_list_entry(head->next); struct page *page = req->wb_page; struct nfs_read_data *data; size_t rsize = NFS_SERVER(inode)->rsize, nbytes; unsigned int offset; int reques...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nfs_pagein_multi File: fs/nfs/read.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2011-4325
MEDIUM
4.9
torvalds/linux
nfs_pagein_multi
fs/nfs/read.c
1ae88b2e446261c038f2c0c3150ffae142b227a2
0
Analyze the following code function for security vulnerabilities
return_t dispatch (const T &obj) { hb_applicable_t *entry = &array[i++]; entry->init (obj, apply_to<T> #ifndef HB_NO_OT_LAYOUT_LOOKUP_CACHE , apply_cached_to<T> , cache_func_to<T> #endif ); #ifndef HB_NO_OT_LAYOUT_LOOKUP_CACHE /* Cache handling * * We allow one subtable from each l...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatch File: src/hb-ot-layout-gsubgpos.hh Repository: harfbuzz The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-25193
HIGH
7.5
harfbuzz
dispatch
src/hb-ot-layout-gsubgpos.hh
85be877925ddbf34f74a1229f3ca1716bb6170dc
0
Analyze the following code function for security vulnerabilities
bool BandwidthRecord::addFrame(int size, int maxpersec) { QMutexLocker ml(&qmMutex); quint64 elapsed = a_qtWhen[iRecNum].elapsed(); if (elapsed == 0) return false; int nsum = iSum-a_iBW[iRecNum]+size; int bw = static_cast<int>((nsum * 1000000LL) / elapsed); if (bw > maxpersec) return false; a_iBW[iRecNu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: BandwidthRecord::addFrame File: src/murmur/ServerUser.cpp Repository: mumble-voip/mumble The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-20743
MEDIUM
5
mumble-voip/mumble
BandwidthRecord::addFrame
src/murmur/ServerUser.cpp
4761ca41ab1f611cd4a6d117f9f6cfd7c64f6b55
0
Analyze the following code function for security vulnerabilities
bfd_boolean elf_slurp_reloc_table (bfd *abfd, asection *asect, asymbol **symbols, bfd_boolean dynamic) { const struct elf_backend_data * const bed = get_elf_backend_data (abfd); struct bfd_elf_section_data * const d = elf_section_data (asect); Elf_Internal_Shdr *rel_hdr; Elf_Internal_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elf_slurp_reloc_table File: bfd/elfcode.h Repository: binutils-gdb The code follows secure coding practices.
[ "CWE-125" ]
CVE-2020-35448
MEDIUM
4.3
binutils-gdb
elf_slurp_reloc_table
bfd/elfcode.h
8642dafaef21aa6747cec01df1977e9c52eb4679
0
Analyze the following code function for security vulnerabilities
static void tpacket_destruct_skb(struct sk_buff *skb) { struct packet_sock *po = pkt_sk(skb->sk); void *ph; BUG_ON(skb == NULL); if (likely(po->tx_ring.pg_vec)) { ph = skb_shinfo(skb)->destructor_arg; BUG_ON(__packet_get_status(po, ph) != TP_STATUS_SENDING); BUG_ON(atomic_read(&po->tx_ring.pending) == 0); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tpacket_destruct_skb File: net/packet/af_packet.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-200" ]
CVE-2011-2898
LOW
1.9
torvalds/linux
tpacket_destruct_skb
net/packet/af_packet.c
13fcb7bd322164c67926ffe272846d4860196dc6
0
Analyze the following code function for security vulnerabilities
int tls_construct_finished(SSL *s, const char *sender, int slen) { unsigned char *p; int i; unsigned long l; p = ssl_handshake_start(s); i = s->method->ssl3_enc->final_finish_mac(s, sender, slen, s->s3->tmp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tls_construct_finished File: ssl/statem/statem_lib.c Repository: openssl The code follows secure coding practices.
[ "CWE-399" ]
CVE-2016-2179
MEDIUM
5
openssl
tls_construct_finished
ssl/statem/statem_lib.c
f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d
0
Analyze the following code function for security vulnerabilities
static void zrangeResultFinalizeClient(zrange_result_handler *handler, size_t result_count) { /* If the reply size was know at start there's nothing left to do */ if (!handler->userdata) return; /* In case of WITHSCORES, respond with a single array in RESP2, and * nested arrays in RESP3. We...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: zrangeResultFinalizeClient File: src/t_zset.c Repository: redis The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-22458
MEDIUM
5.5
redis
zrangeResultFinalizeClient
src/t_zset.c
16f408b1a0121cacd44cbf8aee275d69dc627f02
0
Analyze the following code function for security vulnerabilities
krb5_error_code krb5_ldap_iterate_password_policy(krb5_context context, char *match_expr, void (*func)(krb5_pointer, osa_policy_ent_t), krb5_pointer func_arg) { osa_policy_ent_rec *entry=NULL; char *policy=NULL; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: krb5_ldap_iterate_password_policy File: src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c Repository: krb5 The code follows secure coding practices.
[ "CWE-476" ]
CVE-2014-5353
LOW
3.5
krb5
krb5_ldap_iterate_password_policy
src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c
d1f707024f1d0af6e54a18885322d70fa15ec4d3
0
Analyze the following code function for security vulnerabilities
static int validate_table_offset(BlockDriverState *bs, uint64_t offset, uint64_t entries, size_t entry_len) { BDRVQcowState *s = bs->opaque; uint64_t size; /* Use signed INT64_MAX as the maximum even for uint64_t header fields, * because values will be passed to qemu f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validate_table_offset File: block/qcow2.c Repository: qemu The code follows secure coding practices.
[ "CWE-476" ]
CVE-2014-0146
LOW
1.9
qemu
validate_table_offset
block/qcow2.c
11b128f4062dd7f89b14abc8877ff20d41b28be9
0
Analyze the following code function for security vulnerabilities
pdfio_array_t * // O - Array with binary strings pdfioFileGetID(pdfio_file_t *pdf) // I - PDF file { return (pdf ? pdf->id_array : NULL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pdfioFileGetID File: pdfio-file.c Repository: michaelrsweet/pdfio The code follows secure coding practices.
[ "CWE-835" ]
CVE-2023-24808
MEDIUM
6.5
michaelrsweet/pdfio
pdfioFileGetID
pdfio-file.c
4f10021e7ee527c1aa24853e2947e38e154d9ccb
0
Analyze the following code function for security vulnerabilities
static int imap_mbox_check(struct Context *ctx, int *index_hint) { int rc; (void) index_hint; imap_allow_reopen(ctx); rc = imap_check(ctx->data, 0); imap_disallow_reopen(ctx); return rc; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: imap_mbox_check File: imap/imap.c Repository: neomutt The code follows secure coding practices.
[ "CWE-78" ]
CVE-2018-14354
HIGH
7.5
neomutt
imap_mbox_check
imap/imap.c
95e80bf9ff10f68cb6443f760b85df4117cb15eb
0
Analyze the following code function for security vulnerabilities
int conn_write(const void *buf, size_t count) { conn_debug("Local", buf, count); return WRITE(buf, count); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: conn_write File: conn.c Repository: LINBIT/csync2 The code follows secure coding practices.
[ "CWE-252" ]
CVE-2019-15523
MEDIUM
5
LINBIT/csync2
conn_write
conn.c
92742544a56bcbcd9ec99ca15f898b31797e39e2
0
Analyze the following code function for security vulnerabilities
static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, struct brcmf_if *ifp) { struct brcmf_cfg80211_assoc_ielen_le *assoc_info; struct brcmf_cfg80211_connect_info *conn_info = cfg_to_conn(cfg); u32 req_len; u32 resp_len; s32 err = 0; brcmf_clear_assoc_ies(cfg); err = brcmf_fil_iovar_data_ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: brcmf_get_assoc_ies File: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2017-7541
HIGH
7.2
torvalds/linux
brcmf_get_assoc_ies
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
8f44c9a41386729fea410e688959ddaa9d51be7c
0
Analyze the following code function for security vulnerabilities
static int manager_check_ask_password(Manager *m) { int r; assert(m); if (!m->ask_password_event_source) { assert(m->ask_password_inotify_fd < 0); mkdir_p_label("/run/systemd/ask-password", 0755); m->ask_password_inotify_fd = inotify_init1(IN_N...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: manager_check_ask_password File: src/core/manager.c Repository: systemd The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-7795
MEDIUM
4.9
systemd
manager_check_ask_password
src/core/manager.c
531ac2b2349da02acc9c382849758e07eb92b020
0
Analyze the following code function for security vulnerabilities
static void low_mode_from_nfs4(u32 perm, unsigned short *mode, unsigned int flags) { u32 write_mode = NFS4_WRITE_MODE; if (flags & NFS4_ACL_DIR) write_mode |= NFS4_ACE_DELETE_CHILD; *mode = 0; if ((perm & NFS4_READ_MODE) == NFS4_READ_MODE) *mode |= ACL_READ; if ((perm & write_mode) == write_mode) *mode |= A...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: low_mode_from_nfs4 File: fs/nfsd/nfs4acl.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-1237
MEDIUM
4.9
torvalds/linux
low_mode_from_nfs4
fs/nfsd/nfs4acl.c
999653786df6954a31044528ac3f7a5dadca08f4
0
Analyze the following code function for security vulnerabilities
static void inet6_sk_rx_dst_set(struct sock *sk, const struct sk_buff *skb) { struct dst_entry *dst = skb_dst(skb); if (dst && dst_hold_safe(dst)) { const struct rt6_info *rt = (const struct rt6_info *)dst; sk->sk_rx_dst = dst; inet_sk(sk)->rx_dst_ifindex = skb->skb_iif; inet6_sk(sk)->rx_dst_cookie = rt6_ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inet6_sk_rx_dst_set File: net/ipv6/tcp_ipv6.c Repository: linux-audit/audit-kernel The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-6136
LOW
1.9
linux-audit/audit-kernel
inet6_sk_rx_dst_set
net/ipv6/tcp_ipv6.c
45caeaa5ac0b4b11784ac6f932c0ad4c6b67cda0
0
Analyze the following code function for security vulnerabilities
int ulfius_add_endpoint(struct _u_instance * u_instance, const struct _u_endpoint * u_endpoint) { int res; if (u_instance != NULL && u_endpoint != NULL) { if (ulfius_is_valid_endpoint(u_endpoint, 0)) { if (u_instance->endpoint_list == NULL) { // No endpoint, create a list with 2 endpoints so the ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ulfius_add_endpoint File: src/ulfius.c Repository: babelouest/ulfius The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-40540
HIGH
7.5
babelouest/ulfius
ulfius_add_endpoint
src/ulfius.c
c83f564c184a27145e07c274b305cabe943bbfaa
0
Analyze the following code function for security vulnerabilities
void WasmBinaryWriter::writeExpression(Expression* curr) { ExpressionStackWriter<WasmBinaryWriter>(curr, *this, o, debug); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: WasmBinaryWriter::writeExpression File: src/wasm/wasm-binary.cpp Repository: WebAssembly/binaryen The code follows secure coding practices.
[ "CWE-787", "CWE-476" ]
CVE-2020-18378
MEDIUM
6.5
WebAssembly/binaryen
WasmBinaryWriter::writeExpression
src/wasm/wasm-binary.cpp
766ff5108464161887dbcd209033c303bcff432c
0
Analyze the following code function for security vulnerabilities
static int svm_vcpu_pre_run(struct kvm_vcpu *vcpu) { return 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: svm_vcpu_pre_run File: arch/x86/kvm/svm/svm.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-39189
HIGH
7.8
torvalds/linux
svm_vcpu_pre_run
arch/x86/kvm/svm/svm.c
6cd88243c7e03845a450795e134b488fc2afb736
0
Analyze the following code function for security vulnerabilities
static noinline int mmc_ioctl_cdrom_play_blk(struct cdrom_device_info *cdi, void __user *arg, struct packet_command *cgc) { struct cdrom_device_ops *cdo = cdi->ops; struct cdrom_blk blk; cdinfo(CD_DO_IOCTL, "entering CDROMPLAYBLK\n"); IOCTL_IN(arg, struct cdrom_blk, blk); cgc->cmd[0] = GPCMD_PLAY_AUDIO_1...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mmc_ioctl_cdrom_play_blk File: drivers/cdrom/cdrom.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-200" ]
CVE-2013-2164
LOW
2.1
torvalds/linux
mmc_ioctl_cdrom_play_blk
drivers/cdrom/cdrom.c
050e4b8fb7cdd7096c987a9cd556029c622c7fe2
0
Analyze the following code function for security vulnerabilities
explicit CSRequest(X509_REQ *csr) : m_csr(csr) { assertx(m_csr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: CSRequest File: hphp/runtime/ext/openssl/ext_openssl.cpp Repository: facebook/hhvm The code follows secure coding practices.
[ "CWE-787", "CWE-190", "CWE-125" ]
CVE-2020-1917
HIGH
7.5
facebook/hhvm
CSRequest
hphp/runtime/ext/openssl/ext_openssl.cpp
08193b7f0cd3910256e00d599f0f3eb2519c44ca
0
Analyze the following code function for security vulnerabilities
static Bool Background2D_get_aq_info(GF_Node *n, u32 FieldIndex, u8 *QType, u8 *AType, Fixed *b_min, Fixed *b_max, u32 *QT13_bits) { switch (FieldIndex) { case 1: *AType = 4; *QType = 4; *b_min = FLT2FIX(0); *b_max = FLT2FIX(1); return 1; default: return 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: Background2D_get_aq_info File: src/scenegraph/mpeg4_nodes.c Repository: gpac The code follows secure coding practices.
[ "CWE-476" ]
CVE-2021-46234
MEDIUM
4.3
gpac
Background2D_get_aq_info
src/scenegraph/mpeg4_nodes.c
70c6f6f832dccff814a19a74d87b97b3d68a4af5
0
Analyze the following code function for security vulnerabilities
byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509, byte* dst, int* dstLen) { byte *id = NULL; int copySz = 0; WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID"); if (x509 != NULL) { if (x509->authKeyIdSet) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wolfSSL_X509_get_authorityKeyID File: src/ssl.c Repository: wolfSSL/wolfssl The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-37155
HIGH
7.5
wolfSSL/wolfssl
wolfSSL_X509_get_authorityKeyID
src/ssl.c
73076940af8904f98eee085994c176fe1876b95a
0
Analyze the following code function for security vulnerabilities
int64_t qmp_guest_file_open(const char *path, bool has_mode, const char *mode, Error **err) { FILE *fh; int fd; int64_t ret = -1, handle; if (!has_mode) { mode = "r"; } slog("guest-file-open called, filepath: %s, mode: %s", path, mode); fh = fopen(path, mode); if (!fh) { ...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2013-2007 - Severity: MEDIUM - CVSS Score: 6.9 Description: qga: set umask 0077 when daemonizing (CVE-2013-2007) The qemu guest agent creates a bunch of files with insecure permissions when started in daemon mode. For example: -rw-rw-rw- 1 root root /var/log/...
[ "CWE-264" ]
CVE-2013-2007
MEDIUM
6.9
qemu
qmp_guest_file_open
qga/commands-posix.c
c689b4f1bac352dcfd6ecb9a1d45337de0f1de67
1
Analyze the following code function for security vulnerabilities
static void convertFunctionWordToUint32() {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertFunctionWordToUint32 File: source/extensions/common/wasm/wasm.cc Repository: istio/envoy The code follows secure coding practices.
[ "CWE-476" ]
CVE-2020-10739
MEDIUM
5
istio/envoy
convertFunctionWordToUint32
source/extensions/common/wasm/wasm.cc
8788a3cf255b647fd14e6b5e2585abaaedb28153
0
Analyze the following code function for security vulnerabilities
txBoolean fxEnvironmentDeleteProperty(txMachine* the, txSlot* instance, txID id, txIndex index) { if (id) { txSlot** address = &(instance->next->next); txSlot* property; while ((property = *address)) { if (property->ID == id) { if (property->flag & XS_DONT_DELETE_FLAG) return 0; *address = proper...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fxEnvironmentDeleteProperty File: xs/sources/xsType.c Repository: Moddable-OpenSource/moddable The code follows secure coding practices.
[ "CWE-125" ]
CVE-2021-29328
MEDIUM
5.8
Moddable-OpenSource/moddable
fxEnvironmentDeleteProperty
xs/sources/xsType.c
ef5216cc8bf87f8b16313eb13af0b54b06917c06
0
Analyze the following code function for security vulnerabilities
static size_t push_pipe(struct iov_iter *i, size_t size, int *idxp, size_t *offp) { struct pipe_inode_info *pipe = i->pipe; size_t off; int idx; ssize_t left; if (unlikely(size > i->count)) size = i->count; if (unlikely(!size)) return 0; left = size; data_start(i, &idx, &off); *idxp = idx; *offp = of...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: push_pipe File: lib/iov_iter.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-5550
LOW
2.1
torvalds/linux
push_pipe
lib/iov_iter.c
b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb
0
Analyze the following code function for security vulnerabilities
intptr_t TR_J9SharedCacheVM::methodTrampolineLookup(TR::Compilation *comp, TR::SymbolReference * symRef, void * callSite) { TR_ASSERT(0, "methodTrampolineLookup not implemented for AOT"); return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: TR_J9SharedCacheVM::methodTrampolineLookup File: runtime/compiler/env/VMJ9.cpp Repository: eclipse-openj9/openj9 The code follows secure coding practices.
[ "CWE-440", "CWE-250" ]
CVE-2021-41035
HIGH
7.5
eclipse-openj9/openj9
TR_J9SharedCacheVM::methodTrampolineLookup
runtime/compiler/env/VMJ9.cpp
c6e0d9296ff9a3084965d83e207403de373c0bad
0
Analyze the following code function for security vulnerabilities
static void *WebObjects_create_config(apr_pool_t *p, server_rec *s) { WebObjects_config *wc; // allocate space for the configuration structure from the provided pool p. wc = (WebObjects_config *) apr_pcalloc(p, sizeof(WebObjects_config)); // set the default value for the document root. wc->root = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: WebObjects_create_config File: Utilities/Adaptors/Apache2.2/mod_WebObjects.c Repository: wocommunity/wonder The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-37724
MEDIUM
6.1
wocommunity/wonder
WebObjects_create_config
Utilities/Adaptors/Apache2.2/mod_WebObjects.c
9e75cb6cadd4df2d225209f2ff9f82bfd7fbe432
0
Analyze the following code function for security vulnerabilities
void destroyVideoDepacketizer(void) { if ((VideoCallbacks.capabilities & CAPABILITY_DIRECT_SUBMIT) == 0) { freeDecodeUnitList(LbqDestroyLinkedBlockingQueue(&decodeUnitQueue)); } cleanupFrameState(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroyVideoDepacketizer File: src/VideoDepacketizer.c Repository: moonlight-stream/moonlight-common-c The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-42801
HIGH
7.6
moonlight-stream/moonlight-common-c
destroyVideoDepacketizer
src/VideoDepacketizer.c
f57bd745b4cbed577ea654fad4701bea4d38b44c
0
Analyze the following code function for security vulnerabilities
static void remove_migration_ptes(struct page *old, struct page *new) { rmap_walk(new, remove_migration_pte, old); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: remove_migration_ptes File: mm/migrate.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2010-0415
MEDIUM
4.6
torvalds/linux
remove_migration_ptes
mm/migrate.c
6f5a55f1a6c5abee15a0e878e5c74d9f1569b8b0
0
Analyze the following code function for security vulnerabilities
static void free_elfs(struct user_ta_elf_head *elfs) { struct user_ta_elf *elf; struct user_ta_elf *next; TAILQ_FOREACH_SAFE(elf, elfs, link, next) { TAILQ_REMOVE(elfs, elf, link); mobj_free(elf->mobj_code); free(elf->segs); free(elf); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: free_elfs File: core/arch/arm/kernel/user_ta.c Repository: OP-TEE/optee_os The code follows secure coding practices.
[ "CWE-189" ]
CVE-2019-1010294
MEDIUM
5
OP-TEE/optee_os
free_elfs
core/arch/arm/kernel/user_ta.c
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
0
Analyze the following code function for security vulnerabilities
struct virtio_mei * vmei_host_client_to_vmei(struct vmei_host_client *hclient) { if (hclient && hclient->mclient) return hclient->mclient->vmei; return NULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: vmei_host_client_to_vmei File: devicemodel/hw/pci/virtio/virtio_mei.c Repository: projectacrn/acrn-hypervisor The code follows secure coding practices.
[ "CWE-416" ]
CVE-2021-36144
MEDIUM
5
projectacrn/acrn-hypervisor
vmei_host_client_to_vmei
devicemodel/hw/pci/virtio/virtio_mei.c
dd88504804e186029f845a166dc5c31695e2cca2
0
Analyze the following code function for security vulnerabilities
static void __init __maybe_unused build_assertions(void) { /* 2MB aligned regions */ BUILD_BUG_ON(XEN_VIRT_START & ~SECOND_MASK); BUILD_BUG_ON(FIXMAP_ADDR(0) & ~SECOND_MASK); BUILD_BUG_ON(BOOT_RELOC_VIRT_START & ~SECOND_MASK); /* 1GB aligned regions */ #ifdef CONFIG_ARM_32 BUILD_BUG_ON(XENHEAP_V...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build_assertions File: xen/arch/arm/mm.c Repository: xen-project/xen The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2020-27671
MEDIUM
6.9
xen-project/xen
build_assertions
xen/arch/arm/mm.c
5777a3742d88ff1c0ebc626ceb4fd47f9b3dc6d5
0
Analyze the following code function for security vulnerabilities
Expression* ParserTraits::NewThrowSyntaxError(MessageTemplate::Template message, const AstRawString* arg, int pos) { return NewThrowError(Runtime::kNewSyntaxError, message, arg, pos); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ParserTraits::NewThrowSyntaxError File: src/parsing/parser.cc Repository: chromium The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-5172
MEDIUM
4.3
chromium
ParserTraits::NewThrowSyntaxError
src/parsing/parser.cc
0e14baf712955a1993f742647bb2adc293702b80
0
Analyze the following code function for security vulnerabilities
static GF_Err PathLayout_get_field_index(GF_Node *n, u32 inField, u8 IndexMode, u32 *allField) { switch(IndexMode) { case GF_SG_FIELD_CODING_IN: *allField = PathLayout_In2All[inField]; return GF_OK; case GF_SG_FIELD_CODING_DEF: *allField = PathLayout_Def2All[inField]; return GF_OK; case GF_SG_FIELD_CODING_O...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: PathLayout_get_field_index File: src/scenegraph/mpeg4_nodes.c Repository: gpac The code follows secure coding practices.
[ "CWE-476" ]
CVE-2021-46234
MEDIUM
4.3
gpac
PathLayout_get_field_index
src/scenegraph/mpeg4_nodes.c
70c6f6f832dccff814a19a74d87b97b3d68a4af5
0
Analyze the following code function for security vulnerabilities
static ssize_t aac_show_serial_number(struct device *device, struct device_attribute *attr, char *buf) { struct aac_dev *dev = (struct aac_dev*)class_to_shost(device)->hostdata; int len = 0; if (le32_to_cpu(dev->adapter_info.serial[0]) != 0xBAD0) len = snprintf(buf, 16, "%06X\n", le32_to_cpu(dev->ad...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aac_show_serial_number File: drivers/scsi/aacraid/linit.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-6383
MEDIUM
6.9
torvalds/linux
aac_show_serial_number
drivers/scsi/aacraid/linit.c
f856567b930dfcdbc3323261bf77240ccdde01f5
0
Analyze the following code function for security vulnerabilities
bool omx_vdec::omx_cmd_queue::pop_entry(unsigned long *p1, unsigned long *p2, unsigned long *id) { bool ret = true; if (m_size > 0) { *id = m_q[m_read].id; *p1 = m_q[m_read].param1; *p2 = m_q[m_read].param2; // Move the read pointer ahead ++m_read; --m_size; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: omx_vdec::omx_cmd_queue::pop_entry File: mm-video-v4l2/vidc/vdec/src/omx_vdec_msm8974.cpp Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2016-3746
HIGH
7.5
android
omx_vdec::omx_cmd_queue::pop_entry
mm-video-v4l2/vidc/vdec/src/omx_vdec_msm8974.cpp
5b82f4f90c3d531313714df4b936f92fb0ff15cf
0
Analyze the following code function for security vulnerabilities
static void rndr_header_anchor(struct buf *out, const struct buf *anchor) { static const char *STRIPPED = " -&+$,/:;=?@\"#{}|^~[]`\\*()%.!'"; const uint8_t *a = anchor->data; const size_t size = anchor->size; size_t i = 0; int stripped = 0, inserted = 0; for (; i < size; ++i) { // skip html tags if (a[i] ==...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rndr_header_anchor File: ext/redcarpet/html.c Repository: vmg/redcarpet The code follows secure coding practices.
[ "CWE-79", "CWE-74" ]
CVE-2020-26298
LOW
3.5
vmg/redcarpet
rndr_header_anchor
ext/redcarpet/html.c
a699c82292b17c8e6a62e1914d5eccc252272793
0
Analyze the following code function for security vulnerabilities
static int xmlValidateNmtokensValueInternal(xmlDocPtr doc, const xmlChar *value) { const xmlChar *cur; int val, len; if (value == NULL) return(0); cur = value; val = xmlStringCurrentChar(NULL, cur, &len); cur += len; while (IS_BLANK(val)) { val = xmlStringCurrentChar(NULL, cur, &len); cu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xmlValidateNmtokensValueInternal File: valid.c Repository: GNOME/libxml2 The code follows secure coding practices.
[ "CWE-416" ]
CVE-2022-23308
MEDIUM
4.3
GNOME/libxml2
xmlValidateNmtokensValueInternal
valid.c
652dd12a858989b14eed4e84e453059cd3ba340e
0
Analyze the following code function for security vulnerabilities
void VisitBinop(Node* node, UseInfo input_use, NodeOutputInfo output) { VisitBinop(node, input_use, input_use, output); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: VisitBinop File: src/compiler/simplified-lowering.cc Repository: chromium The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-1653
HIGH
9.3
chromium
VisitBinop
src/compiler/simplified-lowering.cc
58ab990aa8c3aeee38e888c1c33404f4b5a14759
0
Analyze the following code function for security vulnerabilities
static void nf_tables_commit_chain_prepare_cancel(struct net *net) { struct nftables_pernet *nft_net = nft_pernet(net); struct nft_trans *trans, *next; list_for_each_entry_safe(trans, next, &nft_net->commit_list, list) { struct nft_chain *chain = trans->ctx.chain; if (trans->msg_type == NFT_MSG_NEWRULE || ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nf_tables_commit_chain_prepare_cancel File: net/netfilter/nf_tables_api.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-665" ]
CVE-2021-46283
MEDIUM
4.9
torvalds/linux
nf_tables_commit_chain_prepare_cancel
net/netfilter/nf_tables_api.c
ad9f151e560b016b6ad3280b48e42fa11e1a5440
0
Analyze the following code function for security vulnerabilities
static void h2_session_destroy(h2_session *session) { ap_assert(session); if (session->mplx) { h2_mplx_set_consumed_cb(session->mplx, NULL, NULL); h2_mplx_release_and_join(session->mplx, session->iowait); session->mplx = NULL; } ap_remove_input_filter_byhandle((session->r? ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: h2_session_destroy File: modules/http2/h2_session.c Repository: apache/httpd The code follows secure coding practices.
[ "CWE-20", "CWE-399" ]
CVE-2016-8740
MEDIUM
5
apache/httpd
h2_session_destroy
modules/http2/h2_session.c
29c63b786ae028d82405421585e91283c8fa0da3
0
Analyze the following code function for security vulnerabilities
static int llc_ui_listen(struct socket *sock, int backlog) { struct sock *sk = sock->sk; int rc = -EINVAL; lock_sock(sk); if (unlikely(sock->state != SS_UNCONNECTED)) goto out; rc = -EOPNOTSUPP; if (unlikely(sk->sk_type != SOCK_STREAM)) goto out; rc = -EAGAIN; if (sock_flag(sk, SOCK_ZAPPED)) goto out; r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: llc_ui_listen File: net/llc/af_llc.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-28356
LOW
2.1
torvalds/linux
llc_ui_listen
net/llc/af_llc.c
764f4eb6846f5475f1244767d24d25dd86528a4a
0
Analyze the following code function for security vulnerabilities
static void dof_session_add_proto_data(dof_session_data *session, int proto, void *proto_data) { dof_proto_data *p1 = wmem_new0(wmem_packet_scope(), dof_proto_data); p1->proto = proto; p1->proto_data = proto_data; /* Add it to the list of items for this conversation. */ session->data_list = g_sli...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dof_session_add_proto_data File: epan/dissectors/packet-dof.c Repository: wireshark The code follows secure coding practices.
[ "CWE-835" ]
CVE-2017-7704
HIGH
7.8
wireshark
dof_session_add_proto_data
epan/dissectors/packet-dof.c
da53a90b6895e47e03c5de05edf84bd99d535fd8
0
Analyze the following code function for security vulnerabilities
FT_LOCAL_DEF( void ) cff_face_done( FT_Face cffface ) /* CFF_Face */ { CFF_Face face = (CFF_Face)cffface; FT_Memory memory; SFNT_Service sfnt; if ( !face ) return; memory = cffface->memory; sfnt = (SFNT_Service)face->sfnt; if ( sfnt ) sfnt->done_face(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cff_face_done File: src/cff/cffobjs.c Repository: android The code follows secure coding practices.
[ "CWE-843" ]
CVE-2023-21287
CRITICAL
9.8
android
cff_face_done
src/cff/cffobjs.c
a79e80a25874dacaa266906a9048f13d4bac41c6
0
Analyze the following code function for security vulnerabilities
static GF_Err FootPrintSetNode_get_field_index(GF_Node *n, u32 inField, u8 IndexMode, u32 *allField) { switch(IndexMode) { case GF_SG_FIELD_CODING_IN: *allField = FootPrintSetNode_In2All[inField]; return GF_OK; case GF_SG_FIELD_CODING_DEF: *allField = FootPrintSetNode_Def2All[inField]; return GF_OK; case GF...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: FootPrintSetNode_get_field_index File: src/scenegraph/mpeg4_nodes.c Repository: gpac The code follows secure coding practices.
[ "CWE-476" ]
CVE-2021-46234
MEDIUM
4.3
gpac
FootPrintSetNode_get_field_index
src/scenegraph/mpeg4_nodes.c
70c6f6f832dccff814a19a74d87b97b3d68a4af5
0
Analyze the following code function for security vulnerabilities
static u32 ctrn_sample_flags_to_index(u32 val) { if (!val) return 0; if (val & 0x0000FFFF) return 3; if (val & 0x00FF0000) return 2; return 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ctrn_sample_flags_to_index File: src/isomedia/box_code_base.c Repository: gpac The code follows secure coding practices.
[ "CWE-125" ]
CVE-2023-5377
HIGH
7.1
gpac
ctrn_sample_flags_to_index
src/isomedia/box_code_base.c
8e9d6b38c036a97020c462ad48e1132e0ddc57ce
0
Analyze the following code function for security vulnerabilities
static void *writer_child_next(void *obj, void *prev) { WriterContext *ctx = obj; if (!prev && ctx->writer && ctx->writer->priv_class && ctx->priv) return ctx->priv; return NULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writer_child_next File: ffprobe.c Repository: ffmpeg The code follows secure coding practices.
[ "CWE-476" ]
CVE-2017-14225
MEDIUM
6.8
ffmpeg
writer_child_next
ffprobe.c
837cb4325b712ff1aab531bf41668933f61d75d2
0
Analyze the following code function for security vulnerabilities
static s32 brcmf_cfg80211_scan(struct wiphy *wiphy, struct cfg80211_scan_request *request) { struct brcmf_cfg80211_vif *vif; s32 err = 0; brcmf_dbg(TRACE, "Enter\n"); vif = container_of(request->wdev, struct brcmf_cfg80211_vif, wdev); if (!check_vif_up(vif)) return -EIO; err = brcmf_cfg80211_escan(wiphy, vif,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: brcmf_cfg80211_scan File: drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-119" ]
CVE-2017-7541
HIGH
7.2
torvalds/linux
brcmf_cfg80211_scan
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
8f44c9a41386729fea410e688959ddaa9d51be7c
0
Analyze the following code function for security vulnerabilities
void SSH_notify_cred(PTInstVar pvar) { try_send_credentials(pvar); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: SSH_notify_cred File: ttssh2/ttxssh/ssh.c Repository: TeraTermProject/teraterm The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
TeraTermProject/teraterm
SSH_notify_cred
ttssh2/ttxssh/ssh.c
7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
0
Analyze the following code function for security vulnerabilities
static int ip_mc_leave_src(struct sock *sk, struct ip_mc_socklist *iml, struct in_device *in_dev) { struct ip_sf_socklist *psf = rtnl_dereference(iml->sflist); int err; if (psf == NULL) { /* any-source empty exclude case */ return ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr, iml->sfmode, 0, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ip_mc_leave_src File: net/ipv4/igmp.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-369" ]
CVE-2012-0207
HIGH
7.8
torvalds/linux
ip_mc_leave_src
net/ipv4/igmp.c
25c413ad0029ea86008234be28aee33456e53e5b
0
Analyze the following code function for security vulnerabilities
static struct ucounts *inc_net_namespaces(struct user_namespace *ns) { return inc_ucount(ns, current_euid(), UCOUNT_NET_NAMESPACES); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inc_net_namespaces File: net/core/net_namespace.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-362" ]
CVE-2017-15129
MEDIUM
4.9
torvalds/linux
inc_net_namespaces
net/core/net_namespace.c
21b5944350052d2583e82dd59b19a9ba94a007f0
0
Analyze the following code function for security vulnerabilities
static ssize_t bfad_im_optionrom_version_show(struct device *dev, struct device_attribute *attr, char *buf) { struct Scsi_Host *shost = class_to_shost(dev); struct bfad_im_port_s *im_port = (struct bfad_im_port_s *) shost->hostdata[0]; struct bfad_s *bfad = im_port->bfad; char optrom_ver[BFA_VERSION_LEN]; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bfad_im_optionrom_version_show File: drivers/scsi/bfa/bfad_attr.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-401" ]
CVE-2019-19066
MEDIUM
4.7
torvalds/linux
bfad_im_optionrom_version_show
drivers/scsi/bfa/bfad_attr.c
0e62395da2bd5166d7c9e14cbc7503b256a34cb0
0
Analyze the following code function for security vulnerabilities
ALWAYS_INLINE void LoadThreeScalars(const T** data, Packet* l1, Packet* l2, Packet* l3) { LoadTwoScalars(data, l1, l2); LoadSingleScalar(data, l3); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: LoadThreeScalars File: tensorflow/core/kernels/sparse_matmul_op.cc Repository: tensorflow The code follows secure coding practices.
[ "CWE-125" ]
CVE-2021-41219
MEDIUM
4.6
tensorflow
LoadThreeScalars
tensorflow/core/kernels/sparse_matmul_op.cc
e6cf28c72ba2eb949ca950d834dd6d66bb01cfae
0
Analyze the following code function for security vulnerabilities
static int stbi__create_png_image(stbi__png *a, stbi_uc *image_data, stbi__uint32 image_data_len, int out_n, int depth, int color, int interlaced) { int bytes = (depth == 16 ? 2 : 1); int out_bytes = out_n * bytes; stbi_uc *final; int p; if (!interlaced) return stbi__create_png_image_raw(a, image_d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stbi__create_png_image File: stb_image.h Repository: nothings/stb The code follows secure coding practices.
[ "CWE-787" ]
CVE-2021-28021
MEDIUM
6.8
nothings/stb
stbi__create_png_image
stb_image.h
86b7570cfba845e8209c6aec2d15e487bb1d8bb4
0
Analyze the following code function for security vulnerabilities
static bool is_flow_key_reg(struct bpf_verifier_env *env, int regno) { const struct bpf_reg_state *reg = reg_state(env, regno); /* Separate to is_ctx_reg() since we still want to allow BPF_ST here. */ return reg->type == PTR_TO_FLOW_KEYS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: is_flow_key_reg File: kernel/bpf/verifier.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-476" ]
CVE-2022-23222
HIGH
7.2
torvalds/linux
is_flow_key_reg
kernel/bpf/verifier.c
64620e0a1e712a778095bd35cbb277dc2259281f
0
Analyze the following code function for security vulnerabilities
static int selinux_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) { const struct cred *cred = current_cred(); int err = 0; switch (cmd) { case F_SETFL: if ((file->f_flags & O_APPEND) && !(arg & O_APPEND)) { err = file_has_perm(cred, file, FILE__WRITE); break; } /* fall thro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selinux_file_fcntl File: security/selinux/hooks.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-349" ]
CVE-2020-10751
LOW
3.6
torvalds/linux
selinux_file_fcntl
security/selinux/hooks.c
fb73974172ffaaf57a7c42f35424d9aece1a5af6
0
Analyze the following code function for security vulnerabilities
static void redisPushAutoFree(void *privdata, void *reply) { (void)privdata; freeReplyObject(reply); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: redisPushAutoFree File: deps/hiredis/hiredis.c Repository: redis The code follows secure coding practices.
[ "CWE-190", "CWE-680" ]
CVE-2021-32762
HIGH
9
redis
redisPushAutoFree
deps/hiredis/hiredis.c
0215324a66af949be39b34be2d55143232c1cb71
0
Analyze the following code function for security vulnerabilities
static void onInterruptCallback(v8::Isolate* isolate, void* data) { V8IsolateInterruptor* interruptor = reinterpret_cast<V8IsolateInterruptor*>(data); interruptor->onInterrupted(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onInterruptCallback File: third_party/WebKit/Source/bindings/core/v8/V8Binding.h Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2015-1268
MEDIUM
5
chromium
onInterruptCallback
third_party/WebKit/Source/bindings/core/v8/V8Binding.h
542ab473e104b7df23e95f933bda41723794d4da
0
Analyze the following code function for security vulnerabilities
int load_pdptrs(struct kvm_vcpu *vcpu, unsigned long cr3) { gfn_t pdpt_gfn = cr3 >> PAGE_SHIFT; unsigned offset = ((cr3 & (PAGE_SIZE-1)) >> 5) << 2; int i; int ret; u64 pdpte[ARRAY_SIZE(vcpu->arch.pdptrs)]; ret = kvm_read_guest_page(vcpu->kvm, pdpt_gfn, pdpte, offset * sizeof(u64), sizeof(pdpte)); if (ret...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: load_pdptrs File: arch/x86/kvm/x86.c Repository: torvalds/linux The code follows secure coding practices.
[ "CWE-399" ]
CVE-2009-3290
HIGH
7.2
torvalds/linux
load_pdptrs
arch/x86/kvm/x86.c
07708c4af1346ab1521b26a202f438366b7bcffd
0
Analyze the following code function for security vulnerabilities
static inline int mpeg4_decode_dc(MpegEncContext *s, int n, int *dir_ptr) { int level, code; if (n < 4) code = get_vlc2(&s->gb, dc_lum.table, DC_VLC_BITS, 1); else code = get_vlc2(&s->gb, dc_chrom.table, DC_VLC_BITS, 1); if (code < 0 || code > 9 /* && s->nbit < 9 */) { av_log(s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mpeg4_decode_dc File: libavcodec/mpeg4videodec.c Repository: ffmpeg The code follows secure coding practices.
[ "CWE-787" ]
CVE-2014-125005
MEDIUM
4.3
ffmpeg
mpeg4_decode_dc
libavcodec/mpeg4videodec.c
3edc3b159503d512c919b3d5902f7026e961823a
0
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
22