Result for 167560150DF9D022E2BA99CBAC33B0E303AF6A74

Query result

Key Value
FileName./usr/share/man/man1/cppcheck.1.gz
FileSize4285
MD5545E3268F7568C9A595FDF980220F92E
SHA-1167560150DF9D022E2BA99CBAC33B0E303AF6A74
SHA-25629DFB3D3B41B7FBFCDB61F4C95AF24CE0DBC7B0458491ABEDD9EA224A012FD81
SSDEEP96:GFO/kGwRpDETEK4vJ/tJF/trKy4vuOLPibDU+S01luBiS:GFO/WRptJvr3JPJkPi/Uqu1
TLSHT14E915CCEC28863A6A06C161F3AA61D4C6C3D982FD114514B378BE0D1EBBB51D6C77019
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize726762
MD56BC1E1712FFAE7285146D2D040224C7D
PackageDescriptiontool for static C/C++ code analysis Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers;
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.67-1
SHA-1F3CADDAAB1717D0367A6CB4EF2B16373116739A0
SHA-256C334B99A93A51036027FCC15589444ECF25873491672FADC73B244FCF9F14296
Key Value
FileSize697402
MD51A6E86118721BCF5D1C50D088CFB1D9C
PackageDescriptiontool for static C/C++ code analysis Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers;
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.67-1
SHA-1B849A30FEB5F27E586B13A83EA73A3E53E791F93
SHA-256B0E2CF5145BE941462083B66B48AC8B2313C6041995CA2D39346884053CEDC13
Key Value
FileSize663352
MD5080A8315CDE89B503B01419BCF9908F7
PackageDescriptiontool for static C/C++ code analysis Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers;
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.67-1
SHA-10631C6A8FFA2A80E84B6ED2DC7AFE1804E38D771
SHA-256593FB58557B9FF62CDF98583609B2E7D015E8B76945DDF8E0B48B8198B57E666