idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
163,087 | Chrome | 23803a58e481e464a787e4b2c461af9e62f03905 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/23803a58e481e464a787e4b2c461af9e62f03905 | None | 0 | bool CopyDirectory(const FilePath& from_path,
const FilePath& to_path,
bool recursive) {
base::ThreadRestrictions::AssertIOAllowed();
DCHECK(to_path.value().find('*') == std::string::npos);
DCHECK(from_path.value().find('*') == std::string::npos);
char top_dir[PATH_MAX];
... | 17,712,955,504,660,474,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2013-0895 | Google Chrome before 25.0.1364.97 on Linux, and before 25.0.1364.99 on Mac OS X, does not properly handle pathnames during copy operations, which might make it easier for remote attackers to execute arbitrary programs via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0895 |
6,019 | Chrome | 12baa2097220e33c12b60aa5e6da6701637761bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12baa2097220e33c12b60aa5e6da6701637761bf | None | 1 | void BookmarksIOFunction::ShowSelectFileDialog(
ui::SelectFileDialog::Type type,
const base::FilePath& default_path) {
AddRef();
WebContents* web_contents = dispatcher()->delegate()->
GetAssociatedWebContents();
select_file_dialog_ = ui::SelectFileDialog::Create(
this, new ChromeSelectFi... | 48,717,565,889,459,830,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0920 | Use-after-free vulnerability in the extension bookmarks API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0920 |
163,109 | Chrome | 12baa2097220e33c12b60aa5e6da6701637761bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12baa2097220e33c12b60aa5e6da6701637761bf | None | 0 | void BookmarksIOFunction::ShowSelectFileDialog(
ui::SelectFileDialog::Type type,
const base::FilePath& default_path) {
if (!dispatcher())
return; // Extension was unloaded.
AddRef();
WebContents* web_contents = dispatcher()->delegate()->
GetAssociatedWebContents();
select_file_dialog_ ... | 242,718,137,275,964,850,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0920 | Use-after-free vulnerability in the extension bookmarks API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0920 |
6,023 | Chrome | 28aaa72a03df96fa1934876b0efbbc7e6b4b38af | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/28aaa72a03df96fa1934876b0efbbc7e6b4b38af | None | 1 | bool ResourceDispatcherHostImpl::AcceptAuthRequest(
ResourceLoader* loader,
net::AuthChallengeInfo* auth_info) {
if (delegate_ && !delegate_->AcceptAuthRequest(loader->request(), auth_info))
return false;
if (!auth_info->is_proxy) {
HttpAuthResourceType resource_type =
HttpAuthResourceTypeO... | 66,539,345,592,789,220,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0922 | Google Chrome before 26.0.1410.43 does not properly restrict brute-force access attempts against web sites that require HTTP Basic Authentication, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0922 |
163,113 | Chrome | 28aaa72a03df96fa1934876b0efbbc7e6b4b38af | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/28aaa72a03df96fa1934876b0efbbc7e6b4b38af | None | 0 | bool ResourceDispatcherHostImpl::AcceptAuthRequest(
ResourceLoader* loader,
net::AuthChallengeInfo* auth_info) {
if (delegate_ && !delegate_->AcceptAuthRequest(loader->request(), auth_info))
return false;
if (!auth_info->is_proxy) {
HttpAuthResourceType resource_type =
HttpAuthResourceTypeO... | 53,063,575,338,202,250,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0922 | Google Chrome before 26.0.1410.43 does not properly restrict brute-force access attempts against web sites that require HTTP Basic Authentication, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0922 |
6,024 | Chrome | a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | None | 1 | static blink::WebScreenOrientations stringToOrientations(const AtomicString& orientationString)
{
DEFINE_STATIC_LOCAL(const AtomicString, portrait, ("portrait", AtomicString::ConstructFromLiteral));
DEFINE_STATIC_LOCAL(const AtomicString, landscape, ("landscape", AtomicString::ConstructFromLiteral));
... | 286,179,830,601,049,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0923 | The USB Apps API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0923 |
163,114 | Chrome | a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | None | 0 | static blink::WebScreenOrientations stringToOrientations(const AtomicString& orientationString)
{
DEFINE_STATIC_LOCAL(const AtomicString, any, ("any", AtomicString::ConstructFromLiteral));
DEFINE_STATIC_LOCAL(const AtomicString, portrait, ("portrait", AtomicString::ConstructFromLiteral));
DEFINE_STATIC_... | 252,834,669,501,595,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0923 | The USB Apps API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0923 |
6,039 | Chrome | 52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | None | 1 | void WebPreferences::Apply(WebView* web_view) const {
WebSettings* settings = web_view->settings();
ApplyFontsFromMap(standard_font_family_map, setStandardFontFamilyWrapper,
settings);
ApplyFontsFromMap(fixed_font_family_map, setFixedFontFamilyWrapper, settings);
ApplyFontsFromMap(serif_font... | 302,887,036,079,995,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0926 | Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0926 |
163,129 | Chrome | 52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | None | 0 | void WebPreferences::Apply(WebView* web_view) const {
WebSettings* settings = web_view->settings();
ApplyFontsFromMap(standard_font_family_map, setStandardFontFamilyWrapper,
settings);
ApplyFontsFromMap(fixed_font_family_map, setFixedFontFamilyWrapper, settings);
ApplyFontsFromMap(serif_font... | 167,529,831,195,121,250,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0926 | Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0926 |
6,040 | Chrome | faceb51d5058e1159835a4b0cd65081bb0a9de1e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/faceb51d5058e1159835a4b0cd65081bb0a9de1e | None | 1 | void WebRuntimeFeatures::enableSpeechSynthesis(bool enable)
{
RuntimeEnabledFeatures::setSpeechSynthesisEnabled(enable);
}
| 118,835,515,116,955,900,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-0912 | WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion." | https://nvd.nist.gov/vuln/detail/CVE-2013-0912 |
111,380 | Chrome | faceb51d5058e1159835a4b0cd65081bb0a9de1e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/faceb51d5058e1159835a4b0cd65081bb0a9de1e | None | 0 | void WebRuntimeFeatures::enableFileSystem(bool enable)
{
RuntimeEnabledFeatures::setFileSystemEnabled(enable);
}
| 35,448,387,642,528,256,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-0912 | WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion." | https://nvd.nist.gov/vuln/detail/CVE-2013-0912 |
6,050 | Chrome | 537abce1bcf7378e760e904d6e5540a02a2fca9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/537abce1bcf7378e760e904d6e5540a02a2fca9f | None | 1 | int ShellBrowserMain(const content::MainFunctionParams& parameters) {
bool layout_test_mode =
CommandLine::ForCurrentProcess()->HasSwitch(switches::kDumpRenderTree);
base::ScopedTempDir browser_context_path_for_layout_tests;
if (layout_test_mode) {
CHECK(browser_context_path_for_layout_tests.CreateUniq... | 287,540,519,605,687,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-0909 | The XSS Auditor in Google Chrome before 25.0.1364.152 allows remote attackers to obtain sensitive HTTP Referer information via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0909 |
163,140 | Chrome | 537abce1bcf7378e760e904d6e5540a02a2fca9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/537abce1bcf7378e760e904d6e5540a02a2fca9f | None | 0 | int ShellBrowserMain(const content::MainFunctionParams& parameters) {
bool layout_test_mode =
CommandLine::ForCurrentProcess()->HasSwitch(switches::kDumpRenderTree);
base::ScopedTempDir browser_context_path_for_layout_tests;
if (layout_test_mode) {
CHECK(browser_context_path_for_layout_tests.CreateUniq... | 325,833,676,780,452,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-0909 | The XSS Auditor in Google Chrome before 25.0.1364.152 allows remote attackers to obtain sensitive HTTP Referer information via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0909 |
6,117 | Chrome | 935cb0dee7696d70880f96a71bf5687411bb8cb9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/935cb0dee7696d70880f96a71bf5687411bb8cb9 | None | 1 | bool SharedMemory::Create(const SharedMemoryCreateOptions& options) {
DCHECK(!options.executable);
DCHECK(!mapped_file_);
if (options.size == 0)
return false;
uint32 rounded_size = (options.size + 0xffff) & ~0xffff;
name_ = ASCIIToWide(options.name == NULL ? "" : *options.name);
mapped_file_ = Creat... | 281,356,070,748,747,680,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5154 | Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory. | https://nvd.nist.gov/vuln/detail/CVE-2012-5154 |
163,207 | Chrome | 935cb0dee7696d70880f96a71bf5687411bb8cb9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/935cb0dee7696d70880f96a71bf5687411bb8cb9 | None | 0 | bool SharedMemory::Create(const SharedMemoryCreateOptions& options) {
DCHECK(!options.executable);
DCHECK(!mapped_file_);
if (options.size == 0)
return false;
uint32 rounded_size = (options.size + 0xffff) & ~0xffff;
if (rounded_size < options.size)
return false;
name_ = ASCIIToWide(options.name =... | 122,785,357,989,879,630,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5154 | Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory. | https://nvd.nist.gov/vuln/detail/CVE-2012-5154 |
6,118 | Chrome | 0d7717faeaef5b72434632c95c78bee4883e2573 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d7717faeaef5b72434632c95c78bee4883e2573 | None | 1 | bool ReturnsValidPath(int dir_type) {
base::FilePath path;
bool result = PathService::Get(dir_type, &path);
bool check_path_exists = true;
#if defined(OS_POSIX)
if (dir_type == base::DIR_CACHE)
check_path_exists = false;
#endif
#if defined(OS_LINUX)
if (dir_type == base::DIR_USER_DESKTOP)
check_path_... | 38,994,124,641,422,465,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-5155 | Google Chrome before 24.0.1312.52 on Mac OS X does not use an appropriate sandboxing approach for worker processes, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-5155 |
163,208 | Chrome | 0d7717faeaef5b72434632c95c78bee4883e2573 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d7717faeaef5b72434632c95c78bee4883e2573 | None | 0 | bool ReturnsValidPath(int dir_type) {
base::FilePath path;
bool result = PathService::Get(dir_type, &path);
bool check_path_exists = true;
#if defined(OS_POSIX)
if (dir_type == base::DIR_CACHE)
check_path_exists = false;
#endif
#if defined(OS_LINUX)
if (dir_type == base::DIR_USER_DESKTOP)
check_path_... | 329,659,260,017,302,940,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-5155 | Google Chrome before 24.0.1312.52 on Mac OS X does not use an appropriate sandboxing approach for worker processes, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-5155 |
6,163 | Chrome | f7038db6ef172459f14b1b67a5155b8dd210be0f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7038db6ef172459f14b1b67a5155b8dd210be0f | None | 1 | bool decode(const SharedBuffer& data, bool onlySize)
{
m_decodingSizeOnly = onlySize;
unsigned newByteCount = data.size() - m_bufferLength;
unsigned readOffset = m_bufferLength - m_info.src->bytes_in_buffer;
m_info.src->bytes_in_buffer += newByteCount;
m_info.src->next_... | 163,182,612,046,974,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0836 | Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2013-0836 |
163,251 | Chrome | f7038db6ef172459f14b1b67a5155b8dd210be0f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7038db6ef172459f14b1b67a5155b8dd210be0f | None | 0 | bool decode(const SharedBuffer& data, bool onlySize)
{
m_decodingSizeOnly = onlySize;
unsigned newByteCount = data.size() - m_bufferLength;
unsigned readOffset = m_bufferLength - m_info.src->bytes_in_buffer;
m_info.src->bytes_in_buffer += newByteCount;
m_info.src->next_... | 19,941,816,186,488,348,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0836 | Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2013-0836 |
6,164 | Chrome | d333e22282bd4bdaa2864980cd45c272f206a44c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d333e22282bd4bdaa2864980cd45c272f206a44c | None | 1 | void LayerWebKitThread::setNeedsCommit()
{
if (m_owner)
m_owner->notifySyncRequired();
}
| 74,204,523,172,678,720,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0837 | Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs. | https://nvd.nist.gov/vuln/detail/CVE-2013-0837 |
163,252 | Chrome | d333e22282bd4bdaa2864980cd45c272f206a44c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d333e22282bd4bdaa2864980cd45c272f206a44c | None | 0 | void LayerWebKitThread::setNeedsCommit()
{
// Call notifyFlushRequired(), which in this implementation plumbs through to
if (m_owner)
m_owner->notifyFlushRequired();
}
| 8,622,689,505,823,860,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0837 | Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs. | https://nvd.nist.gov/vuln/detail/CVE-2013-0837 |
6,173 | Chrome | 9965adea952e84c925de418e971b204dfda7d6e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9965adea952e84c925de418e971b204dfda7d6e0 | None | 1 | int MockNetworkTransaction::RestartWithAuth(
const AuthCredentials& credentials,
const CompletionCallback& callback) {
if (!IsReadyToRestartForAuth())
return ERR_FAILED;
HttpRequestInfo auth_request_info = *request_;
auth_request_info.extra_headers.AddHeaderFromString("Authorization: Bar");
re... | 264,094,544,930,396,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7904 | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-7904 |
163,260 | Chrome | 9965adea952e84c925de418e971b204dfda7d6e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9965adea952e84c925de418e971b204dfda7d6e0 | None | 0 | int MockNetworkTransaction::RestartWithAuth(
const AuthCredentials& credentials,
const CompletionCallback& callback) {
if (!IsReadyToRestartForAuth())
return ERR_FAILED;
HttpRequestInfo auth_request_info = *request_;
auth_request_info.extra_headers.SetHeader("Authorization", "Bar");
return Sta... | 59,941,443,209,715,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7904 | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-7904 |
6,182 | Chrome | 2571533bbb5b554ff47205c8ef1513ccc0817c3e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2571533bbb5b554ff47205c8ef1513ccc0817c3e | None | 1 | void DocumentThreadableLoader::loadRequest(const ResourceRequest& request, ResourceLoaderOptions resourceLoaderOptions)
{
const KURL& requestURL = request.url();
ASSERT(m_sameOriginRequest || requestURL.user().isEmpty());
ASSERT(m_sameOriginRequest || requestURL.pass().isEmpty());
if (m_forceDoNotAllow... | 318,306,592,559,316,860,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7909 | effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7909 |
163,269 | Chrome | 2571533bbb5b554ff47205c8ef1513ccc0817c3e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2571533bbb5b554ff47205c8ef1513ccc0817c3e | None | 0 | void DocumentThreadableLoader::loadRequest(const ResourceRequest& request, ResourceLoaderOptions resourceLoaderOptions)
{
const KURL& requestURL = request.url();
ASSERT(m_sameOriginRequest || requestURL.user().isEmpty());
ASSERT(m_sameOriginRequest || requestURL.pass().isEmpty());
if (m_forceDoNotAllow... | 252,619,243,734,466,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7909 | effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7909 |
6,201 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 1 | void FrameView::updateLayoutAndStyleForPainting()
{
RefPtr<FrameView> protector(this);
updateLayoutAndStyleIfNeededRecursive();
if (RenderView* view = renderView()) {
TRACE_EVENT_INSTANT1(TRACE_DISABLED_BY_DEFAULT("devtools.timeline"), "UpdateLayerTree", "frame", m_frame.get());
In... | 145,960,508,048,872,620,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
163,288 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 0 | void FrameView::updateLayoutAndStyleForPainting()
{
RefPtr<FrameView> protector(this);
updateLayoutAndStyleIfNeededRecursive();
updateWidgetPositionsIfNeeded();
if (RenderView* view = renderView()) {
TRACE_EVENT_INSTANT1(TRACE_DISABLED_BY_DEFAULT("devtools.timeline"), "UpdateLayerTree... | 227,285,103,028,143,770,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
6,202 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 1 | void RenderLayerScrollableArea::setScrollOffset(const IntPoint& newScrollOffset)
{
if (!box().isMarquee()) {
if (m_scrollDimensionsDirty)
computeScrollDimensions();
}
if (scrollOffset() == toIntSize(newScrollOffset))
return;
setScrollOffset(toIntSize(newScrollOffset));
... | 288,520,017,721,751,300,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
163,289 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 0 | void RenderLayerScrollableArea::setScrollOffset(const IntPoint& newScrollOffset)
{
if (!box().isMarquee()) {
if (m_scrollDimensionsDirty)
computeScrollDimensions();
}
if (scrollOffset() == toIntSize(newScrollOffset))
return;
setScrollOffset(toIntSize(newScrollOffset));
... | 109,365,309,835,259,280,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
6,205 | Chrome | 9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | None | 1 | bool Instance::HandleInputEvent(const pp::InputEvent& event) {
pp::InputEvent event_device_res(event);
{
pp::MouseInputEvent mouse_event(event);
if (!mouse_event.is_null()) {
pp::Point point = mouse_event.GetPosition();
pp::Point movement = mouse_event.GetMovement();
ScalePoint(device_scal... | 2,949,400,329,031,434,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3198 | The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-3198 |
163,292 | Chrome | 9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | None | 0 | bool Instance::HandleInputEvent(const pp::InputEvent& event) {
pp::InputEvent event_device_res(event);
{
pp::MouseInputEvent mouse_event(event);
if (!mouse_event.is_null()) {
pp::Point point = mouse_event.GetPosition();
pp::Point movement = mouse_event.GetMovement();
ScalePoint(device_scal... | 285,089,109,954,740,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3198 | The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-3198 |
6,234 | Chrome | ee281f7cac9df44fe241a37f188b28be8845ded0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ee281f7cac9df44fe241a37f188b28be8845ded0 | None | 1 | bool ResourceFetcher::canRequest(Resource::Type type, const KURL& url, const ResourceLoaderOptions& options, bool forPreload, FetchRequest::OriginRestriction originRestriction) const
{
SecurityOrigin* securityOrigin = options.securityOrigin.get();
if (!securityOrigin && document())
securityOrigin = docu... | 171,053,594,726,445,880,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2014-3160 | The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2014-3160 |
163,321 | Chrome | ee281f7cac9df44fe241a37f188b28be8845ded0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ee281f7cac9df44fe241a37f188b28be8845ded0 | None | 0 | bool ResourceFetcher::canRequest(Resource::Type type, const KURL& url, const ResourceLoaderOptions& options, bool forPreload, FetchRequest::OriginRestriction originRestriction) const
{
SecurityOrigin* securityOrigin = options.securityOrigin.get();
if (!securityOrigin && document())
securityOrigin = docu... | 283,991,990,204,660,200,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2014-3160 | The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2014-3160 |
6,239 | Chrome | 96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | None | 1 | int FFmpegVideoDecoder::GetVideoBuffer(AVCodecContext* codec_context,
AVFrame* frame) {
VideoFrame::Format format = PixelFormatToVideoFormat(codec_context->pix_fmt);
if (format == VideoFrame::UNKNOWN)
return AVERROR(EINVAL);
DCHECK(format == VideoFrame::YV12 || format ==... | 37,770,097,475,656,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3157 | Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for prop... | https://nvd.nist.gov/vuln/detail/CVE-2014-3157 |
163,326 | Chrome | 96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | None | 0 | int FFmpegVideoDecoder::GetVideoBuffer(AVCodecContext* codec_context,
AVFrame* frame) {
VideoFrame::Format format = PixelFormatToVideoFormat(codec_context->pix_fmt);
if (format == VideoFrame::UNKNOWN)
return AVERROR(EINVAL);
DCHECK(format == VideoFrame::YV12 || format ==... | 9,426,575,119,671,087,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3157 | Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for prop... | https://nvd.nist.gov/vuln/detail/CVE-2014-3157 |
6,308 | Chrome | b71fc042e1124cda2ab51dfdacc2362da62779a6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b71fc042e1124cda2ab51dfdacc2362da62779a6 | None | 1 | bool AsyncPixelTransfersCompletedQuery::End(
base::subtle::Atomic32 submit_count) {
AsyncMemoryParams mem_params;
Buffer buffer = manager()->decoder()->GetSharedMemoryBuffer(shm_id());
if (!buffer.shared_memory)
return false;
mem_params.shared_memory = buffer.shared_memory;
mem_params.shm_size = buff... | 17,389,564,410,575,507,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-1710 | The AsyncPixelTransfersCompletedQuery::End function in gpu/command_buffer/service/query_manager.cc in Google Chrome, as used in Google Chrome OS before 33.0.1750.152, does not check whether a certain position is within the bounds of a shared-memory segment, which allows remote attackers to cause a denial of service (GP... | https://nvd.nist.gov/vuln/detail/CVE-2014-1710 |
163,395 | Chrome | b71fc042e1124cda2ab51dfdacc2362da62779a6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b71fc042e1124cda2ab51dfdacc2362da62779a6 | None | 0 | bool AsyncPixelTransfersCompletedQuery::End(
base::subtle::Atomic32 submit_count) {
AsyncMemoryParams mem_params;
Buffer buffer = manager()->decoder()->GetSharedMemoryBuffer(shm_id());
if (!buffer.shared_memory)
return false;
mem_params.shared_memory = buffer.shared_memory;
mem_params.shm_size = buff... | 319,539,573,773,553,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-1710 | The AsyncPixelTransfersCompletedQuery::End function in gpu/command_buffer/service/query_manager.cc in Google Chrome, as used in Google Chrome OS before 33.0.1750.152, does not check whether a certain position is within the bounds of a shared-memory segment, which allows remote attackers to cause a denial of service (GP... | https://nvd.nist.gov/vuln/detail/CVE-2014-1710 |
6,328 | Chrome | 318530d771586b39056c0da7b8bdad03469a0dc4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/318530d771586b39056c0da7b8bdad03469a0dc4 | None | 1 | bool IsSmartVirtualKeyboardEnabled() {
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
keyboard::switches::kEnableVirtualKeyboard)) {
return false;
}
return !base::CommandLine::ForCurrentProcess()->HasSwitch(
keyboard::switches::kDisableSmartVirtualKeyboard);
}
| 138,519,658,245,803,260,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-1700 | Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure. | https://nvd.nist.gov/vuln/detail/CVE-2014-1700 |
163,415 | Chrome | 318530d771586b39056c0da7b8bdad03469a0dc4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/318530d771586b39056c0da7b8bdad03469a0dc4 | None | 0 | bool IsSmartVirtualKeyboardEnabled() {
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
keyboard::switches::kEnableVirtualKeyboard)) {
return false;
}
return keyboard::IsSmartDeployEnabled();
}
| 198,045,851,553,744,740,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-1700 | Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure. | https://nvd.nist.gov/vuln/detail/CVE-2014-1700 |
6,350 | Chrome | 70bcb6b3396a395e871e10b2ff883d92b8218e9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/70bcb6b3396a395e871e10b2ff883d92b8218e9f | None | 1 | void RenderSVGImage::paint(PaintInfo& paintInfo, const LayoutPoint&)
{
ANNOTATE_GRAPHICS_CONTEXT(paintInfo, this);
if (paintInfo.context->paintingDisabled() || style()->visibility() == HIDDEN || !m_imageResource->hasImage())
return;
FloatRect boundingBox = repaintRectInLocalCoordinates();
if (... | 78,156,417,942,089,070,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6649 | Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6649 |
163,437 | Chrome | 70bcb6b3396a395e871e10b2ff883d92b8218e9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/70bcb6b3396a395e871e10b2ff883d92b8218e9f | None | 0 | void RenderSVGImage::paint(PaintInfo& paintInfo, const LayoutPoint&)
{
ANNOTATE_GRAPHICS_CONTEXT(paintInfo, this);
if (paintInfo.context->paintingDisabled() || style()->visibility() == HIDDEN || !m_imageResource->hasImage())
return;
FloatRect boundingBox = repaintRectInLocalCoordinates();
if (... | 218,303,881,725,857,680,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6649 | Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6649 |
6,367 | Chrome | cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | None | 1 | void SVGImage::setContainerSize(const IntSize& size)
{
if (!m_page || !usesContainerSize())
return;
LocalFrame* frame = m_page->mainFrame();
SVGSVGElement* rootElement = toSVGDocument(frame->document())->rootElement();
if (!rootElement)
return;
RenderSVGRoot* renderer = toRenderS... | 182,241,956,130,076,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
163,454 | Chrome | cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | None | 0 | void SVGImage::setContainerSize(const IntSize& size)
{
if (!m_page || !usesContainerSize())
return;
LocalFrame* frame = m_page->mainFrame();
SVGSVGElement* rootElement = toSVGDocument(frame->document())->rootElement();
if (!rootElement)
return;
FrameView* view = frameView();
... | 55,402,960,077,293,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,370 | Chrome | 59296d9276ffcc8bced092828210748d2ed19ab0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/59296d9276ffcc8bced092828210748d2ed19ab0 | None | 1 | int32_t PepperFlashRendererHost::OnNavigate(
ppapi::host::HostMessageContext* host_context,
const ppapi::URLRequestInfoData& data,
const std::string& target,
bool from_user_action) {
content::PepperPluginInstance* plugin_instance =
host_->GetPluginInstance(pp_instance());
if (!plugin_instance... | 228,119,142,004,611,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
163,457 | Chrome | 59296d9276ffcc8bced092828210748d2ed19ab0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/59296d9276ffcc8bced092828210748d2ed19ab0 | None | 0 | int32_t PepperFlashRendererHost::OnNavigate(
ppapi::host::HostMessageContext* host_context,
const ppapi::URLRequestInfoData& data,
const std::string& target,
bool from_user_action) {
content::PepperPluginInstance* plugin_instance =
host_->GetPluginInstance(pp_instance());
if (!plugin_instance... | 141,822,367,674,571,880,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,372 | Chrome | c21d7ac13d69cbadbbb5b2dc147be1933d52147a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c21d7ac13d69cbadbbb5b2dc147be1933d52147a | None | 1 | void ScreenPositionController::ConvertHostPointToRelativeToRootWindow(
aura::Window* root_window,
const aura::Window::Windows& root_windows,
gfx::Point* point,
aura::Window** target_root) {
DCHECK(!root_window->parent());
gfx::Point point_in_root(*point);
root_window->GetHost()->ConvertPointFrom... | 30,125,943,252,732,386,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
163,459 | Chrome | c21d7ac13d69cbadbbb5b2dc147be1933d52147a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c21d7ac13d69cbadbbb5b2dc147be1933d52147a | None | 0 | void ScreenPositionController::ConvertHostPointToRelativeToRootWindow(
aura::Window* root_window,
const aura::Window::Windows& root_windows,
gfx::Point* point,
aura::Window** target_root) {
DCHECK(!root_window->parent());
gfx::Point point_in_root(*point);
root_window->GetHost()->ConvertPointFrom... | 201,711,480,890,930,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,391 | Chrome | fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | None | 1 | void FormAssociatedElement::formRemovedFromTree(const Node* formRoot)
{
ASSERT(m_form);
if (toHTMLElement(this)->highestAncestor() != formRoot)
setForm(0);
}
| 85,267,172,430,327,180,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2013-6643 | The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing o... | https://nvd.nist.gov/vuln/detail/CVE-2013-6643 |
163,478 | Chrome | fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | None | 0 | void FormAssociatedElement::formRemovedFromTree(const Node* formRoot)
{
ASSERT(m_form);
if (toHTMLElement(this)->highestAncestor() == formRoot)
return;
RefPtr<HTMLElement> protector(toHTMLElement(this));
setForm(0);
}
| 124,136,856,282,307,120,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2013-6643 | The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing o... | https://nvd.nist.gov/vuln/detail/CVE-2013-6643 |
6,439 | Chrome | b770d85e37b2d0e248f04cf20606a2f3871ef039 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b770d85e37b2d0e248f04cf20606a2f3871ef039 | None | 1 | void WebPageSerializerImpl::openTagToString(Element* element,
SerializeDomParam* param)
{
bool needSkip;
StringBuilder result;
result.append(preActionBeforeSerializeOpenTag(element, param, &needSkip));
if (needSkip)
return;
result.append('<');
... | 87,504,207,161,441,810,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6790 | The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a doubl... | https://nvd.nist.gov/vuln/detail/CVE-2015-6790 |
163,525 | Chrome | b770d85e37b2d0e248f04cf20606a2f3871ef039 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b770d85e37b2d0e248f04cf20606a2f3871ef039 | None | 0 | void WebPageSerializerImpl::openTagToString(Element* element,
SerializeDomParam* param)
{
bool needSkip;
StringBuilder result;
result.append(preActionBeforeSerializeOpenTag(element, param, &needSkip));
if (needSkip)
return;
result.append('<');
... | 87,636,341,132,036,840,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6790 | The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a doubl... | https://nvd.nist.gov/vuln/detail/CVE-2015-6790 |
6,457 | Chrome | 4c8b008f055f79e622344627fed7f820375a4f01 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4c8b008f055f79e622344627fed7f820375a4f01 | None | 1 | void Document::detach(const AttachContext& context)
{
TRACE_EVENT0("blink", "Document::detach");
ASSERT(!m_frame || m_frame->tree().childCount() == 0);
if (!isActive())
return;
FrameNavigationDisabler navigationDisabler(*m_frame);
HTMLFrameOwnerElement::UpdateSuspendScope suspendWidge... | 326,911,140,912,325,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6768 | The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770. | https://nvd.nist.gov/vuln/detail/CVE-2015-6768 |
163,542 | Chrome | 4c8b008f055f79e622344627fed7f820375a4f01 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4c8b008f055f79e622344627fed7f820375a4f01 | None | 0 | void Document::detach(const AttachContext& context)
{
TRACE_EVENT0("blink", "Document::detach");
RELEASE_ASSERT(!m_frame || m_frame->tree().childCount() == 0);
if (!isActive())
return;
FrameNavigationDisabler navigationDisabler(*m_frame);
HTMLFrameOwnerElement::UpdateSuspendScope susp... | 149,686,716,545,712,650,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6768 | The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770. | https://nvd.nist.gov/vuln/detail/CVE-2015-6768 |
6,462 | Chrome | 0b1b7baa4695c945a1b0bea1f0636f1219139e8e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b1b7baa4695c945a1b0bea1f0636f1219139e8e | None | 1 | void DownloadUIAdapterDelegate::OpenItem(const OfflineItem& item,
int64_t offline_id) {
JNIEnv* env = AttachCurrentThread();
Java_OfflinePageDownloadBridge_openItem(
env, ConvertUTF8ToJavaString(env, item.page_url.spec()), offline_id);
}
| 61,398,520,627,540,260,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6772 | The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin. | https://nvd.nist.gov/vuln/detail/CVE-2015-6772 |
163,547 | Chrome | 0b1b7baa4695c945a1b0bea1f0636f1219139e8e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b1b7baa4695c945a1b0bea1f0636f1219139e8e | None | 0 | void DownloadUIAdapterDelegate::OpenItem(const OfflineItem& item,
int64_t offline_id) {
JNIEnv* env = AttachCurrentThread();
Java_OfflinePageDownloadBridge_openItem(
env, ConvertUTF8ToJavaString(env, item.page_url.spec()), offline_id,
offline_pages::ShouldOffl... | 8,059,418,628,340,227,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6772 | The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin. | https://nvd.nist.gov/vuln/detail/CVE-2015-6772 |
6,490 | Chrome | d9e316238aee59acf665d80b544cf4e1edfd3349 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d9e316238aee59acf665d80b544cf4e1edfd3349 | None | 1 | int FindStartOffsetOfFileInZipFile(const char* zip_file, const char* filename) {
FileDescriptor fd;
if (!fd.OpenReadOnly(zip_file)) {
LOG_ERRNO("%s: open failed trying to open zip file %s\n",
__FUNCTION__, zip_file);
return CRAZY_OFFSET_FAILED;
}
struct stat stat_buf;
if (stat(zip_file,... | 299,890,482,944,780,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6783 | The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-6783 |
163,575 | Chrome | d9e316238aee59acf665d80b544cf4e1edfd3349 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d9e316238aee59acf665d80b544cf4e1edfd3349 | None | 0 | int FindStartOffsetOfFileInZipFile(const char* zip_file, const char* filename) {
FileDescriptor fd;
if (!fd.OpenReadOnly(zip_file)) {
LOG_ERRNO("%s: open failed trying to open zip file %s\n",
__FUNCTION__, zip_file);
return CRAZY_OFFSET_FAILED;
}
struct stat stat_buf;
if (stat(zip_file,... | 78,979,517,195,040,430,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6783 | The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-6783 |
6,494 | Chrome | 5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | None | 1 | bool CSPSourceList::matches(const KURL& url, ContentSecurityPolicy::RedirectStatus redirectStatus) const
{
if (m_allowStar)
return true;
KURL effectiveURL = m_policy->selfMatchesInnerURL() && SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : url;
if (m_allowSel... | 305,681,779,156,627,620,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6786 | The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in op... | https://nvd.nist.gov/vuln/detail/CVE-2015-6786 |
163,579 | Chrome | 5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | None | 0 | bool CSPSourceList::matches(const KURL& url, ContentSecurityPolicy::RedirectStatus redirectStatus) const
{
// The CSP spec specifically states that data:, blob:, and filesystem URLs
// should not be captured by a '*" source
// (http://www.w3.org/TR/CSP2/#source-list-guid-matching). Thus, in the
// cas... | 110,360,786,242,858,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6786 | The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in op... | https://nvd.nist.gov/vuln/detail/CVE-2015-6786 |
6,726 | Chrome | 5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | None | 1 | void MidiManagerUsb::DispatchSendMidiData(MidiManagerClient* client,
uint32_t port_index,
const std::vector<uint8>& data,
double timestamp) {
DCHECK_LT(port_index, output_streams_.size());
... | 321,192,437,589,487,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1232 | Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out... | https://nvd.nist.gov/vuln/detail/CVE-2015-1232 |
163,807 | Chrome | 5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | None | 0 | void MidiManagerUsb::DispatchSendMidiData(MidiManagerClient* client,
uint32_t port_index,
const std::vector<uint8>& data,
double timestamp) {
if (port_index >= output_streams_.size()) {
... | 296,874,382,149,069,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1232 | Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out... | https://nvd.nist.gov/vuln/detail/CVE-2015-1232 |
6,749 | Chrome | fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | None | 1 | bool OutOfProcessInstance::Init(uint32_t argc,
const char* argn[],
const char* argv[]) {
pp::Var document_url_var = pp::URLUtil_Dev::Get()->GetDocumentURL(this);
std::string document_url = document_url_var.is_string() ?
document_url_var.AsStri... | 153,316,566,716,019,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-1302 | The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. | https://nvd.nist.gov/vuln/detail/CVE-2015-1302 |
163,830 | Chrome | fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | None | 0 | bool OutOfProcessInstance::Init(uint32_t argc,
const char* argn[],
const char* argv[]) {
// the plugin to be loaded in the extension and print preview to avoid
// exposing sensitive APIs directly to external websites.
pp::Var document_url_var = pp... | 317,368,516,268,221,480,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-1302 | The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. | https://nvd.nist.gov/vuln/detail/CVE-2015-1302 |
6,750 | Chrome | 31b81d4cf8b6a063391839816c82fc61c8272e53 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/31b81d4cf8b6a063391839816c82fc61c8272e53 | None | 1 | bool ScreenLayoutObserver::GetDisplayMessageForNotification(
const ScreenLayoutObserver::DisplayInfoMap& old_info,
base::string16* out_message,
base::string16* out_additional_message) {
if (old_display_mode_ != current_display_mode_) {
if (current_display_mode_ == DisplayMode::MIRRORING) {
*out_... | 266,527,405,274,977,800,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1233 | Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-1233 |
163,831 | Chrome | 31b81d4cf8b6a063391839816c82fc61c8272e53 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/31b81d4cf8b6a063391839816c82fc61c8272e53 | None | 0 | bool ScreenLayoutObserver::GetDisplayMessageForNotification(
const ScreenLayoutObserver::DisplayInfoMap& old_info,
base::string16* out_message,
base::string16* out_additional_message) {
if (old_display_mode_ != current_display_mode_) {
if (current_display_mode_ == DisplayMode::MIRRORING) {
*out_... | 301,021,934,310,463,480,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1233 | Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-1233 |
6,757 | Chrome | c3957448cfc6e299165196a33cd954b790875fdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c3957448cfc6e299165196a33cd954b790875fdb | None | 1 | bool Document::SetFocusedElement(Element* new_focused_element,
const FocusParams& params) {
DCHECK(!lifecycle_.InDetach());
clear_focused_element_timer_.Stop();
if (new_focused_element && (new_focused_element->GetDocument() != this))
return true;
if (NodeChildRemovalTrack... | 283,705,955,295,929,570,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5170 | WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted... | https://nvd.nist.gov/vuln/detail/CVE-2016-5170 |
163,838 | Chrome | c3957448cfc6e299165196a33cd954b790875fdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c3957448cfc6e299165196a33cd954b790875fdb | None | 0 | bool Document::SetFocusedElement(Element* new_focused_element,
const FocusParams& params) {
DCHECK(!lifecycle_.InDetach());
clear_focused_element_timer_.Stop();
if (new_focused_element && (new_focused_element->GetDocument() != this))
return true;
if (NodeChildRemovalTrack... | 329,244,114,597,616,230,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5170 | WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted... | https://nvd.nist.gov/vuln/detail/CVE-2016-5170 |
6,764 | Chrome | 47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | None | 1 | ChooserContextBase::GetGrantedObjects(const GURL& requesting_origin,
const GURL& embedding_origin) {
DCHECK_EQ(requesting_origin, requesting_origin.GetOrigin());
DCHECK_EQ(embedding_origin, embedding_origin.GetOrigin());
if (!CanRequestObjectPermission(requesting_origin, emb... | 248,409,627,958,061,740,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5152 | Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5152 |
163,845 | Chrome | 47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | None | 0 | ChooserContextBase::GetGrantedObjects(const GURL& requesting_origin,
const GURL& embedding_origin) {
DCHECK_EQ(requesting_origin, requesting_origin.GetOrigin());
DCHECK_EQ(embedding_origin, embedding_origin.GetOrigin());
if (!CanRequestObjectPermission(requesting_origin, emb... | 35,589,613,332,056,680,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5152 | Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5152 |
6,769 | Chrome | ba011d9f8322c62633a069a59c2c5525e3ff46cc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba011d9f8322c62633a069a59c2c5525e3ff46cc | None | 1 | void EventBindings::AttachFilteredEvent(
const v8::FunctionCallbackInfo<v8::Value>& args) {
CHECK_EQ(2, args.Length());
CHECK(args[0]->IsString());
CHECK(args[1]->IsObject());
std::string event_name = *v8::String::Utf8Value(args[0]);
if (!context()->HasAccessOrThrowError(event_name))
return;
std::... | 256,333,972,582,958,900,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5156 | extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have un... | https://nvd.nist.gov/vuln/detail/CVE-2016-5156 |
163,850 | Chrome | ba011d9f8322c62633a069a59c2c5525e3ff46cc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba011d9f8322c62633a069a59c2c5525e3ff46cc | None | 0 | void EventBindings::AttachFilteredEvent(
const v8::FunctionCallbackInfo<v8::Value>& args) {
CHECK_EQ(2, args.Length());
CHECK(args[0]->IsString());
CHECK(args[1]->IsObject());
std::string event_name = *v8::String::Utf8Value(args[0]);
if (!context()->HasAccessOrThrowError(event_name))
return;
std::... | 80,013,230,693,631,730,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5156 | extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have un... | https://nvd.nist.gov/vuln/detail/CVE-2016-5156 |
6,770 | Chrome | 6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | None | 1 | void AXTree::PopulateOrderedSetItems(const AXNode* ordered_set,
const AXNode* local_parent,
std::vector<const AXNode*>& items,
bool node_is_radio_button) const {
if (!(ordered_set == local_parent)) {
if ... | 149,255,040,034,515,960,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5158 | Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via c... | https://nvd.nist.gov/vuln/detail/CVE-2016-5158 |
163,851 | Chrome | 6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | None | 0 | void AXTree::PopulateOrderedSetItems(const AXNode* ordered_set,
const AXNode* local_parent,
std::vector<const AXNode*>& items,
bool node_is_radio_button) const {
if (!(ordered_set == local_parent)) {
if ... | 469,373,609,505,600,300,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5158 | Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via c... | https://nvd.nist.gov/vuln/detail/CVE-2016-5158 |
6,780 | Chrome | 5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | None | 1 | static void JNI_WebApkUpdateManager_StoreWebApkUpdateRequestToFile(
JNIEnv* env,
const JavaParamRef<jstring>& java_update_request_path,
const JavaParamRef<jstring>& java_start_url,
const JavaParamRef<jstring>& java_scope,
const JavaParamRef<jstring>& java_name,
const JavaParamRef<jstring>& java_... | 111,886,150,626,802,060,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5166 | The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5166 |
163,861 | Chrome | 5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | None | 0 | static void JNI_WebApkUpdateManager_StoreWebApkUpdateRequestToFile(
JNIEnv* env,
const JavaParamRef<jstring>& java_update_request_path,
const JavaParamRef<jstring>& java_start_url,
const JavaParamRef<jstring>& java_scope,
const JavaParamRef<jstring>& java_name,
const JavaParamRef<jstring>& java_... | 304,180,408,219,269,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5166 | The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5166 |
6,783 | Chrome | 89f296b34f4f33e048848c06da08fc9271b30bc9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/89f296b34f4f33e048848c06da08fc9271b30bc9 | None | 1 | void PageFormAnalyserLogger::Flush() {
std::string text;
for (ConsoleLevel level : {kError, kWarning, kVerbose}) {
for (LogEntry& entry : node_buffer_[level]) {
text.clear();
text += "[DOM] ";
text += entry.message;
for (unsigned i = 0; i < entry.nodes.size(); ++i)
text += " %... | 209,053,833,526,816,140,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5182 | Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5182 |
163,864 | Chrome | 89f296b34f4f33e048848c06da08fc9271b30bc9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/89f296b34f4f33e048848c06da08fc9271b30bc9 | None | 0 | void PageFormAnalyserLogger::Flush() {
std::string text;
for (ConsoleLevel level : {kError, kWarning, kVerbose}) {
for (LogEntry& entry : node_buffer_[level]) {
text.clear();
text += "[DOM] ";
text += entry.message;
std::vector<blink::WebNode> nodesToLog;
for (unsigned i = 0; i... | 263,496,522,459,253,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5182 | Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5182 |
6,804 | Chrome | 4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | None | 1 | void RemoveActionCallback(const ActionCallback& callback) {
DCHECK(g_task_runner.Get());
DCHECK(g_task_runner.Get()->BelongsToCurrentThread());
std::vector<ActionCallback>* callbacks = g_callbacks.Pointer();
for (size_t i = 0; i < callbacks->size(); ++i) {
if ((*callbacks)[i].Equals(callback)) {
c... | 321,198,076,601,606,140,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5187 | Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5187 |
163,885 | Chrome | 4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | None | 0 | void RemoveActionCallback(const ActionCallback& callback) {
DCHECK(g_task_runner.Get());
DCHECK(g_task_runner.Get()->BelongsToCurrentThread());
std::vector<ActionCallback>* callbacks = g_callbacks.Pointer();
for (size_t i = 0; i < callbacks->size(); ++i) {
if ((*callbacks)[i] == callback) {
callba... | 184,992,839,136,453,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5187 | Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5187 |
6,808 | Chrome | fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | None | 1 | base::string16 FormatBookmarkURLForDisplay(const GURL& url) {
return url_formatter::FormatUrl(
url, url_formatter::kFormatUrlOmitAll &
~url_formatter::kFormatUrlOmitUsernamePassword,
net::UnescapeRule::SPACES, nullptr, nullptr, nullptr);
}
| 148,653,877,527,532,850,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5191 | Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo a... | https://nvd.nist.gov/vuln/detail/CVE-2016-5191 |
163,889 | Chrome | fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | None | 0 | base::string16 FormatBookmarkURLForDisplay(const GURL& url) {
// and trailing slash, and unescape most characters. However, it's
url_formatter::FormatUrlTypes format_types =
url_formatter::kFormatUrlOmitAll &
~url_formatter::kFormatUrlOmitUsernamePassword;
// If username is present, we must not omit... | 290,915,278,834,994,340,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5191 | Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo a... | https://nvd.nist.gov/vuln/detail/CVE-2016-5191 |
6,874 | Chrome | dd77c2a41c72589d929db0592565125ca629fb2c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dd77c2a41c72589d929db0592565125ca629fb2c | None | 1 | int32_t PPB_Flash_MessageLoop_Impl::InternalRun(
const RunFromHostProxyCallback& callback) {
if (state_->run_called()) {
if (!callback.is_null())
callback.Run(PP_ERROR_FAILED);
return PP_ERROR_FAILED;
}
state_->set_run_called();
state_->set_run_callback(callback);
scoped_refptr<State> state... | 169,066,781,763,766,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-1631 | The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1631 |
163,955 | Chrome | dd77c2a41c72589d929db0592565125ca629fb2c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dd77c2a41c72589d929db0592565125ca629fb2c | None | 0 | int32_t PPB_Flash_MessageLoop_Impl::InternalRun(
const RunFromHostProxyCallback& callback) {
if (state_->run_called()) {
if (!callback.is_null())
callback.Run(PP_ERROR_FAILED);
return PP_ERROR_FAILED;
}
state_->set_run_called();
state_->set_run_callback(callback);
scoped_refptr<State> state... | 96,030,776,693,046,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-1631 | The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1631 |
6,931 | Chrome | 7f3d85b096f66870a15b37c2f40b219b2e292693 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7f3d85b096f66870a15b37c2f40b219b2e292693 | None | 1 | png_set_PLTE(png_structp png_ptr, png_infop info_ptr,
png_colorp palette, int num_palette)
{
png_debug1(1, "in %s storage function", "PLTE");
if (png_ptr == NULL || info_ptr == NULL)
return;
if (num_palette < 0 || num_palette > PNG_MAX_PALETTE_LENGTH)
{
if (info_ptr->color_type =... | 304,007,704,134,051,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ... | https://nvd.nist.gov/vuln/detail/CVE-2015-8126 |
164,011 | Chrome | 7f3d85b096f66870a15b37c2f40b219b2e292693 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7f3d85b096f66870a15b37c2f40b219b2e292693 | None | 0 | png_set_PLTE(png_structp png_ptr, png_infop info_ptr,
png_colorp palette, int num_palette)
{
png_uint_32 max_palette_length;
png_debug1(1, "in %s storage function", "PLTE");
if (png_ptr == NULL || info_ptr == NULL)
return;
max_palette_length = (png_ptr->color_type == PNG_COLOR_TYPE_PALE... | 84,601,710,246,652,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ... | https://nvd.nist.gov/vuln/detail/CVE-2015-8126 |
6,979 | Chrome | 297ae873b471a46929ea39697b121c0b411434ee | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/297ae873b471a46929ea39697b121c0b411434ee | None | 1 | bool CustomButton::AcceleratorPressed(const ui::Accelerator& accelerator) {
SetState(STATE_NORMAL);
ui::MouseEvent synthetic_event(
ui::ET_MOUSE_RELEASED, gfx::Point(), gfx::Point(), ui::EventTimeForNow(),
ui::EF_LEFT_MOUSE_BUTTON, ui::EF_LEFT_MOUSE_BUTTON);
NotifyClick(synthetic_event);
return t... | 303,261,665,525,374,700,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1616 | The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button. | https://nvd.nist.gov/vuln/detail/CVE-2016-1616 |
164,057 | Chrome | 297ae873b471a46929ea39697b121c0b411434ee | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/297ae873b471a46929ea39697b121c0b411434ee | None | 0 | bool CustomButton::AcceleratorPressed(const ui::Accelerator& accelerator) {
// Should only handle accelerators when active. However, only top level
// widgets can be active, so for child widgets check if they are focused
// instead.
if ((IsChildWidget() && !FocusInChildWidget()) ||
(!IsChildWidget() && !... | 178,543,790,831,287,940,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1616 | The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button. | https://nvd.nist.gov/vuln/detail/CVE-2016-1616 |
6,981 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 1 | void TestingPlatformSupport::cryptographicallyRandomValues(unsigned char* buffer, size_t length)
{
}
| 135,052,527,899,353,880,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
164,059 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 0 | void TestingPlatformSupport::cryptographicallyRandomValues(unsigned char* buffer, size_t length)
{
RELEASE_ASSERT_NOT_REACHED();
}
| 200,923,857,530,405,600,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
9,995 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 1 | void TestBlinkPlatformSupport::cryptographicallyRandomValues(
unsigned char* buffer,
size_t length) {
}
| 267,872,989,200,443,520,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
185,043 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 0 | void TestBlinkPlatformSupport::cryptographicallyRandomValues(
unsigned char* buffer,
size_t length) {
base::RandBytes(buffer, length);
}
| 185,211,021,209,782,230,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
6,998 | Chrome | 1948aefa8901dca0ccb993753fca00b15d2a6e25 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1948aefa8901dca0ccb993753fca00b15d2a6e25 | None | 1 | void FrameLoader::startLoad(FrameLoadRequest& frameLoadRequest, FrameLoadType type, NavigationPolicy navigationPolicy)
{
ASSERT(client()->hasWebView());
if (m_frame->document()->pageDismissalEventBeingDispatched() != Document::NoDismissal)
return;
NavigationType navigationType = determineNavigation... | 91,912,671,201,154,680,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1697 | The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2016-1697 |
164,075 | Chrome | 1948aefa8901dca0ccb993753fca00b15d2a6e25 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1948aefa8901dca0ccb993753fca00b15d2a6e25 | None | 0 | void FrameLoader::startLoad(FrameLoadRequest& frameLoadRequest, FrameLoadType type, NavigationPolicy navigationPolicy)
{
ASSERT(client()->hasWebView());
if (m_frame->document()->pageDismissalEventBeingDispatched() != Document::NoDismissal)
return;
NavigationType navigationType = determineNavigation... | 218,101,855,443,136,220,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1697 | The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2016-1697 |
6,999 | Chrome | 5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | None | 1 | v8::Local<v8::Object> V8SchemaRegistry::GetSchema(const std::string& api) {
if (schema_cache_ != NULL) {
v8::Local<v8::Object> cached_schema = schema_cache_->Get(api);
if (!cached_schema.IsEmpty()) {
return cached_schema;
}
}
v8::Isolate* isolate = v8::Isolate::GetCurrent();
v8::EscapableHan... | 312,257,934,248,800,170,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-1698 | The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition. | https://nvd.nist.gov/vuln/detail/CVE-2016-1698 |
164,076 | Chrome | 5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | None | 0 | v8::Local<v8::Object> V8SchemaRegistry::GetSchema(const std::string& api) {
if (schema_cache_ != NULL) {
v8::Local<v8::Object> cached_schema = schema_cache_->Get(api);
if (!cached_schema.IsEmpty()) {
return cached_schema;
}
}
v8::Isolate* isolate = v8::Isolate::GetCurrent();
v8::EscapableHan... | 51,554,644,394,997,980,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-1698 | The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition. | https://nvd.nist.gov/vuln/detail/CVE-2016-1698 |
7,010 | Chrome | 1af4fada49c4f3890f16daac31d38379a9d782b2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1af4fada49c4f3890f16daac31d38379a9d782b2 | None | 1 | void ResourceDispatcherHostImpl::BeginRequest(
int request_id,
const ResourceHostMsg_Request& request_data,
IPC::Message* sync_result, // only valid for sync
int route_id) {
int process_type = filter_->process_type();
int child_id = filter_->child_id();
if (IsBrowserSideNavigationEnabled() &... | 37,454,385,498,734,345,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2016-1670 | Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID. | https://nvd.nist.gov/vuln/detail/CVE-2016-1670 |
164,087 | Chrome | 1af4fada49c4f3890f16daac31d38379a9d782b2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1af4fada49c4f3890f16daac31d38379a9d782b2 | None | 0 | void ResourceDispatcherHostImpl::BeginRequest(
int request_id,
const ResourceHostMsg_Request& request_data,
IPC::Message* sync_result, // only valid for sync
int route_id) {
int process_type = filter_->process_type();
int child_id = filter_->child_id();
// Reject request id that's currently i... | 281,482,977,973,651,830,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2016-1670 | Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID. | https://nvd.nist.gov/vuln/detail/CVE-2016-1670 |
7,017 | Chrome | 8355de453bb4014b74b2db5d7ca38c5664d65d83 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8355de453bb4014b74b2db5d7ca38c5664d65d83 | None | 1 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 153,325,502,741,300,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-1654 | The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1654 |
164,094 | Chrome | 8355de453bb4014b74b2db5d7ca38c5664d65d83 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8355de453bb4014b74b2db5d7ca38c5664d65d83 | None | 0 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 74,388,412,360,827,170,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-1654 | The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1654 |
7,018 | Chrome | f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | None | 1 | void SetUpFontconfig() {
std::unique_ptr<Environment> env = Environment::Create();
if (!env->HasVar("FONTCONFIG_FILE")) {
FilePath dir_module;
PathService::Get(DIR_MODULE, &dir_module);
FilePath font_cache = dir_module.Append("fontconfig_caches");
FilePath test_fonts = dir_module.Append("test_fonts... | 271,007,301,915,850,960,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1657 | The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL. | https://nvd.nist.gov/vuln/detail/CVE-2016-1657 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.