News
Since the call graph contains the vulnerable function signature, i.e. its name, parameters and return types, we can check whether this function also exists as-is in the fixed version.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results