Result for 29A74BD2AE24079651B4B3C6F7F3D09B02276CE2

Query result

Key Value
CRC324939E8A8
FileNamewindows.cfg
FileSize93445
MD54143720482F781D6FD99D4254E17F256
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
ProductCode{'ApplicationType': 'Analysis', 'Language': 'English', 'MfgCode': '1722', 'OpSystemCode': '289', 'ProductCode': '183058', 'ProductName': 'Cppcheck source code', 'ProductVersion': '2017-08-08'}
SHA-129A74BD2AE24079651B4B3C6F7F3D09B02276CE2
SHA-256809BF493B0A499D169DF599C6ED31DEE0DE388D1FD7E07EABDD603E86B614EBA
SSDEEP1536:FXk4xRGi89saSz9g8qOgweiliEWGMtRFtaLNBseLVoRuLzUEdyv4EpszYQ9dbFem:s4RGogQmOdn3
SpecialCode
TLSHT1F193AC64E9FDDC85C3110E11AEF50436AF61D6C3B75A458EBC8C3AE86F624929017BEC
dbnsrl_modern_rds
insert-timestamp1646993843.042244
sourceNSRL
tar:gnamebin
tar:unameroot
hashlookup:parent-total9
hashlookup:trust95

Network graph view

Parents (Total: 9)

The searched file hash is included in 9 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize840416
MD5E62189FBA422F10507DB0026AD44D36D
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-1344A751E6BDD0897FA143A9ACECFCE897600F171
SHA-256A59D1B8763F2FA9C5A94DEF19BD2F87191EC3C58DCFAF7BE267B6B725BEA8AFD
Key Value
FileSize774282
MD5F6C1A493DFD246985EF1B7479BB09DC9
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-10B37B04B90EEC58F0F31AD83B0D4001D1D790648
SHA-2568AD6801D9BAE26ADFD4947F15137E03424A4C31D8508BAB256E82868A878807A
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.2/packages//hppa//cppcheck-1.80.tgz
MD519CFB716B9B5F7CD57A45ED45DDB586F
SHA-1D7674E3EA7D32B5E782A8B67D63A3B2D9CD6B37B
SHA-256A76C1185020648D89D3A9DAD069DCE900D5FAEB3A15CB3D4029007DB60037944
SSDEEP49152:aOfv6LR2s2Qr2olKPhW+qhiWFTTtKSdio7ZKdNSsvM:acyl2dQr2xcz3Eia3vM
TLSHT1647533A9237EF25FD30B5D474FA5D8B8A1A409BD0143F9A08428FD3617880295F63EB7
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.2/packages//arm//cppcheck-1.80.tgz
MD535836F3429D979CEFE6C60876EB87A25
SHA-1671376017F8E881F7FC2ABDBBE7C8226F99926BE
SHA-256EC279D9052007BE1B6F92B8F8BAB81D69D4F14D752D4FB26D294E0E2D1E176EB
SSDEEP24576:UtJo9X8C2RVtPTIaYY71WnbEMs7rC0RYkMg0XnP+28j1fL+mZW9pLSMjCA:+o9XWLlTIvYxWnbE3UIJF+KGWMjd
TLSHT1EC4533AD06820A0EDB1C887F2EED64FB02A5044944E75CD18B25CBFDCCA1F935E9D65B
Key Value
FileSize997498
MD5894E052B53F4353D405593CC9B20B4BC
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-1EAE988E18EDE6E3905D65495334BECD3BCF411F7
SHA-256F128D22389EA31FE5DD130F87DC718E9B3F4772C59D7F58D2F6C3D133664D562
Key Value
FileSize794846
MD5BA424415FCDABB5827B2D0F1BD707CF8
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-193C1E94AAD23DED88975376EC2E29ED063783231
SHA-2561E5092B5CDB99404321531C7D311AF1B8092A3E9E0AB46BF99A9BDA40A846794
Key Value
FileSize887580
MD5F012C316AF1B89C9746F412DDC1B06FD
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-139757604D1D21639EDAA448D6A53477BB6141A57
SHA-256F476A222FF74B1CFBDACF033EE39829B4CEDD46AF3B8C43B26AEEEF41D6E46E4
Key Value
FileSize981114
MD562DF01FDCF6E65023B81522F717DBE5E
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.80-1
SHA-1D4E6D8BCFE2E77DFEEECA9107B6B770960D8586C
SHA-2560E86782FC97568A292C4DD7D08321DD1CF1920E8F718D067F9100DC4D51CBA19
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.2/packages//amd64//cppcheck-1.80.tgz
MD5C84D33C5EA9B8BB8EABCD017CC77AF22
SHA-196E444FA8AFF6B9CC85C4C4D4F2D90AA6E248E6B
SHA-2565E662E80A3F3A132B715AF476CCEA9D9B51D06B50808B7CC861C4576E1FAB31A
SSDEEP24576:V3UC+sfWfotMRAbI1tkGBvJdFtqr5Huij5QCcurSQl:Vh+suQtLaDBvJfor9FtNl
TLSHT1CF5533DF218C85EA113E84D9EC08D5919E79265018733637DA4131B1962EC7FCACAFBE