Result for 0AA6B692C6985F81AB7E9B112E4208E58395F0BE

Query result

Key Value
FileName./usr/share/cppcheck/cfg/windows.cfg
FileSize842492
MD52BEA5DA40F68CEFA312991E4F8D5BA4A
SHA-10AA6B692C6985F81AB7E9B112E4208E58395F0BE
SHA-25667DC2604263B6025E9A1823E410EA8E22CD51FC195CB21779CD03D0683CBB34A
SSDEEP6144:pZJdwLatEvE6BGYQItOMgrM6QrLKUEOJkqzni+/qKUESSCKeI7d:vJdwLatEvE6BNFtONgxA1KT
TLSHT1AB051F22FDD88D51C8490D2AAEB938416A78EDF7538C39D960CC3E9C5E64C514CF36EA
tar:gnameroot
tar:unameroot
hashlookup:parent-total11
hashlookup:trust100

Network graph view

Parents (Total: 11)

The searched file hash is included in 11 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize2228324
MD5164CEBB849959BF39398C93AAA70B6E0
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.10-2
SHA-145A1C5B42527BE7B283059442A918451F3AA0731
SHA-256869C23F3ECA838FE86A9380B401917CAB4F980B7B535855D1D52F893AD196F5D
Key Value
FileSize1798944
MD510DB877FE3075EAF7E2B842E93CF2A20
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.10-2
SHA-149E7BA95C2A132C35A03CE559A21BAA86F6E6D32
SHA-2560ABA3EDF7018C6900321427E1401E1C4E05ED182368446483D1CBAB1F14CC4A3
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//s390x//cppcheck-2.10.3-r0.apk
MD5B3BCAA9733D6F32DD7AFEE6C2C448BA1
SHA-1AAC343FCD5BFB5100E389293EC78A75047163DFB
SHA-256EC8A63C172B394A9D88B13B17EC0CD48E583A06C772916F4F514B0407664DFD5
SSDEEP49152:W+fV78Hy8C4CoMR382xgQFcuGm5G9AXWWoB:W+fVR8FCTBxgQFcuGjiWW8
TLSHT1F89533C6A93F7C0DC1477B988EE3138B83F269C72B3144FA1556A36D4348732DA958B6
Key Value
FileSize1866868
MD51FFA8E5823AF71C0C0B4E5225DEF8EA0
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.10-2
SHA-1330486BFD303086387EC4A81A2F3B388E485A8A0
SHA-256ABA6512974022D87E9B9CD395FBB39AA43CC386B711E9408CC654914F58EBC39
Key Value
FileSize2084380
MD5BEB77EF018BA9467F0719AD3EF85115D
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.10-2
SHA-1577D8685E178601BEB81643674AEBF4199F14E47
SHA-2569BB8DA72B7FFBF4221B68CC290BE2F8A23A1454B68AA12CC085E815C3BC6BEF2
Key Value
FileSize1862244
MD57DE24003489643A64E5198BB509DAF1F
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.10-2
SHA-1E893CB69F0C0CDDADEF0CC709FCF84642CA3555B
SHA-2563D46B772990D95DE06BF7824CDEE89DE433D00D768DCE285E400EDE36B1EEDCF
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86//cppcheck-2.10.3-r0.apk
MD5D43815F5E57C90B81701ADB2E585D5F8
SHA-12FA61946EBCD6F41887CA458F54662FBB4BB2F80
SHA-256C7E33CF52A30B4B8DF6472A14F7E1F7BFCB5FA259F0359CD29F8F42EEB298BB6
SSDEEP49152:2wGNWe2B8YsbErxaWXn4DvBr5dq2bosDvf6f00X61a37x:2v2qYmqxhn4jd5M2lD36f0hi
TLSHT13A95339B5FC5C22E9DD7D6E18710BE2ECC2386CF3577A0978EE092E80C6211C594E5B6
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//armv7//cppcheck-2.10.3-r0.apk
MD510BC9BB4AC0ED53DDC31C917E7F370FC
SHA-1770BB05645173FD771E53C67BC7A2F03244E6003
SHA-256000373288F66ABEE1EB3719E4D1BB6234E782E5A18FBC2B3012216F915CA0EF9
SSDEEP49152:D3UlRWgQJSfFt8GnBPo/dSJY1KzMcJFJMGk2ytpAPGPW:DEvWgZFiWBPoUJY1KzFbk2UpoB
TLSHT12C8533F7D74907D6198AD256D311920F37D38B7A9C78C48B060E087CF858992DECB6BA
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//armhf//cppcheck-2.10.3-r0.apk
MD5241BE6773A3DA13ACE3307AF485B7728
SHA-1BB06F40E8A9FC93C80FE7AD30BC441F9866E2E59
SHA-2569B281B75F05595D22E928FE77B04C534C06EF27DD8867F52085578F9704B1DE4
SSDEEP49152:xFZEYR9yjP05L3qUZgtjc3/K1X7hi7OyTHhstaQ:PZE6O6jTOc3i1XtCTvQ
TLSHT12195339322563F9242B9BCA3F7CCC5384443497EBDD51079C2D5AD62E0AA69F0CE2C97
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86_64//cppcheck-2.10.3-r0.apk
MD570CFF8E8EA61708425A4BAA26F71BCEB
SHA-1A5ABC517096407DC3E73BA3C6E2441099FA55BF7
SHA-25609F1215B9C7285F40DAE184F61404DF87B68F5AEEF41305A03DFA2D4CDAD969C
SSDEEP24576:4i6pfUlhbUYs2pw1POhyftpMK9N+9g8fux7qXdOJNYi0BIIrrKsVOX1PGU6hp9Vr:4iYslhb7VyEKG+QdiyJnXV69GUapPlzV
TLSHT1DE9533812ABF0322BB35F0FB01062DF5BA0B9B6976679FEB185452FB54C661C0D82177
Key Value
MD5740D0D2043B7E740C8DBDCB276372A1C
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageReleasebp155.1.5
PackageVersion2.10
SHA-1446B65476EE9D629B9B993C4EAF27F956953665B
SHA-256A8AD252B0F50D215005DE038D9FE0B54017CB581E2C16CB1EE7947B5D14E3CB1