Result for 09CD4FD0B97A6095AAF2D6F325544AE06D7EE66E

Query result

Key Value
FileName./usr/share/cppcheck/addons/y2038.py
FileSize7138
MD5D860F476E25AB91DA5B95B993D441F6E
SHA-109CD4FD0B97A6095AAF2D6F325544AE06D7EE66E
SHA-256B6B220A03DAF32D23E279284740786C477ABF73D45343F1A4F0B862255FFE90F
SSDEEP192:oJ/LxBoxo4PYQ2NkaA0mVoUDf9VhEoWZFWE+kYFv8v:oJ/XoF72NkNHeUDf9VhEoWFH+j8v
TLSHT19AE10B3A2D0B24849253DC4B855EA0D6CFA996670F023468FAEC84087FED15CC1FF67A
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5740D0D2043B7E740C8DBDCB276372A1C
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageReleasebp155.1.5
PackageVersion2.10
SHA-1446B65476EE9D629B9B993C4EAF27F956953665B
SHA-256A8AD252B0F50D215005DE038D9FE0B54017CB581E2C16CB1EE7947B5D14E3CB1