idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
164,095 | Chrome | f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | None | 0 | void SetUpFontconfig() {
FilePath dir_module;
PathService::Get(DIR_MODULE, &dir_module);
FilePath font_cache = dir_module.Append("fontconfig_caches");
FilePath test_fonts = dir_module.Append("test_fonts");
std::string fonts_conf = ReplaceStringPlaceholders(
kFontsConfTemplate, {font_cache.value(), test... | 289,834,052,076,518,400,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1657 | The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL. | https://nvd.nist.gov/vuln/detail/CVE-2016-1657 |
7,022 | Chrome | 2386a6a49ea992a1e859eb0296c1cc53e5772cdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2386a6a49ea992a1e859eb0296c1cc53e5772cdb | None | 1 | void ImageInputType::ensurePrimaryContent()
{
if (!m_useFallbackContent)
return;
m_useFallbackContent = false;
reattachFallbackContent();
}
| 173,363,941,087,375,970,000,000,000,000,000,000,000 | None | null | [
"CWE-361"
] | CVE-2016-1643 | The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2016-1643 |
130,163 | Chrome | 2386a6a49ea992a1e859eb0296c1cc53e5772cdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2386a6a49ea992a1e859eb0296c1cc53e5772cdb | None | 0 | void ImageInputType::ensureFallbackContent()
{
if (m_useFallbackContent)
return;
setUseFallbackContent();
reattachFallbackContent();
}
| 57,913,671,977,250,850,000,000,000,000,000,000,000 | None | null | [
"CWE-361"
] | CVE-2016-1643 | The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2016-1643 |
7,025 | Chrome | 7716418a27d561ee295a99f11fd3865580748de2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7716418a27d561ee295a99f11fd3865580748de2 | None | 1 | static BROTLI_INLINE BrotliResult ProcessCommandsInternal(int safe,
BrotliState* s) {
int pos = s->pos;
int i = s->loop_counter;
BrotliResult result = BROTLI_RESULT_SUCCESS;
BrotliBitReader* br = &s->br;
if (!CheckInputAmount(safe, br, 28) || !WarmupBitReader(safe, br)) {
result = BROTLI_RESULT_NEEDS... | 9,320,645,353,081,902,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1624 | Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression. | https://nvd.nist.gov/vuln/detail/CVE-2016-1624 |
164,102 | Chrome | 7716418a27d561ee295a99f11fd3865580748de2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7716418a27d561ee295a99f11fd3865580748de2 | None | 0 | static BROTLI_INLINE BrotliResult ProcessCommandsInternal(int safe,
BrotliState* s) {
int pos = s->pos;
int i = s->loop_counter;
BrotliResult result = BROTLI_RESULT_SUCCESS;
BrotliBitReader* br = &s->br;
if (!CheckInputAmount(safe, br, 28) || !WarmupBitReader(safe, br)) {
result = BROTLI_RESULT_NEEDS... | 235,559,156,001,697,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1624 | Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression. | https://nvd.nist.gov/vuln/detail/CVE-2016-1624 |
7,050 | Chrome | 41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | None | 1 | void SkiaOutputSurfaceImpl::Reshape(const gfx::Size& size,
float device_scale_factor,
const gfx::ColorSpace& color_space,
bool has_alpha,
bool use_stencil) {
DCHECK_CALLED_O... | 60,093,522,846,727,510,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5094 | Type confusion in extensions JavaScript bindings in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5094 |
164,127 | Chrome | 41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | None | 0 | void SkiaOutputSurfaceImpl::Reshape(const gfx::Size& size,
float device_scale_factor,
const gfx::ColorSpace& color_space,
bool has_alpha,
bool use_stencil) {
DCHECK_CALLED_O... | 131,751,900,426,761,960,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5094 | Type confusion in extensions JavaScript bindings in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5094 |
7,051 | Chrome | 29734f46c6dc9362783091180c2ee279ad53637f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/29734f46c6dc9362783091180c2ee279ad53637f | None | 1 | V4L2JpegEncodeAccelerator::JobRecord::JobRecord(
scoped_refptr<VideoFrame> input_frame,
scoped_refptr<VideoFrame> output_frame,
int quality,
int32_t task_id,
BitstreamBuffer* exif_buffer)
: input_frame(input_frame),
output_frame(output_frame),
quality(quality),
task_id(task_... | 213,676,667,209,846,170,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5101 | Inappropriate implementation in Omnibox in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5101 |
164,128 | Chrome | 29734f46c6dc9362783091180c2ee279ad53637f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/29734f46c6dc9362783091180c2ee279ad53637f | None | 0 | V4L2JpegEncodeAccelerator::JobRecord::JobRecord(
scoped_refptr<VideoFrame> input_frame,
scoped_refptr<VideoFrame> output_frame,
int quality,
int32_t task_id,
BitstreamBuffer* exif_buffer)
: input_frame(input_frame),
output_frame(output_frame),
quality(quality),
task_id(task_... | 210,595,407,484,207,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5101 | Inappropriate implementation in Omnibox in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5101 |
7,068 | Chrome | 536f72f4eeb63af895ee489c7244ccf2437cd157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/536f72f4eeb63af895ee489c7244ccf2437cd157 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 175,286,993,609,359,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5105 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5105 |
164,136 | Chrome | 536f72f4eeb63af895ee489c7244ccf2437cd157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/536f72f4eeb63af895ee489c7244ccf2437cd157 | None | 0 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 23,814,362,773,363,680,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5105 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5105 |
7,078 | Chrome | 5cb799a393ba9e732f89f687ff3a322b4514ebfb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cb799a393ba9e732f89f687ff3a322b4514ebfb | None | 1 | static bool ShouldAutofocus(const HTMLFormControlElement* element) {
if (!element->isConnected())
return false;
if (!element->IsAutofocusable())
return false;
Document& doc = element->GetDocument();
if (doc.IsSandboxed(WebSandboxFlags::kAutomaticFeatures)) {
doc.AddConsoleMessage(ConsoleMess... | 103,762,075,407,255,680,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5108 | Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5108 |
164,146 | Chrome | 5cb799a393ba9e732f89f687ff3a322b4514ebfb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cb799a393ba9e732f89f687ff3a322b4514ebfb | None | 0 | static bool ShouldAutofocus(const HTMLFormControlElement* element) {
if (!element->isConnected())
return false;
if (!element->IsAutofocusable())
return false;
Document& doc = element->GetDocument();
if (!doc.GetFrame())
return false;
if (doc.IsSandboxed(WebSandboxFlags::kAutomaticFeatures)... | 224,071,619,499,114,340,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5108 | Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5108 |
7,111 | Chrome | cbc5d5153b18ea387f4769caa01d1339261f6ed6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6 | None | 1 | void FeatureInfo::EnableOESTextureHalfFloatLinear() {
if (!oes_texture_half_float_linear_available_)
return;
AddExtensionString("GL_OES_texture_half_float_linear");
feature_flags_.enable_texture_half_float_linear = true;
feature_flags_.gpu_memory_buffer_formats.Add(gfx::BufferFormat::RGBA_F16);
}
| 178,900,952,203,591,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5057 | Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5057 |
164,179 | Chrome | cbc5d5153b18ea387f4769caa01d1339261f6ed6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6 | None | 0 | void FeatureInfo::EnableOESTextureHalfFloatLinear() {
if (!oes_texture_half_float_linear_available_)
return;
AddExtensionString("GL_OES_texture_half_float_linear");
feature_flags_.enable_texture_half_float_linear = true;
// TODO(capn) : Re-enable this once we have ANGLE+SwiftShader supporting
// IOSur... | 122,395,820,240,847,750,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5057 | Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5057 |
7,120 | Chrome | 83588d6ed473f923a46484958d440da0b8a51b1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/83588d6ed473f923a46484958d440da0b8a51b1b | None | 1 | scoped_refptr<VideoFrame> CloneVideoFrameWithLayout(
const VideoFrame* const src_frame,
const VideoFrameLayout& dst_layout) {
LOG_ASSERT(src_frame->IsMappable());
LOG_ASSERT(src_frame->format() == dst_layout.format());
auto dst_frame = VideoFrame::CreateFrameWithLayout(
dst_layout, src_frame->visibl... | 273,563,293,085,518,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5067 | An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5067 |
164,188 | Chrome | 83588d6ed473f923a46484958d440da0b8a51b1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/83588d6ed473f923a46484958d440da0b8a51b1b | None | 0 | scoped_refptr<VideoFrame> CloneVideoFrameWithLayout(
const VideoFrame* const src_frame,
const VideoFrameLayout& dst_layout) {
LOG_ASSERT(src_frame->IsMappable());
LOG_ASSERT(src_frame->format() == dst_layout.format());
auto dst_frame = VideoFrame::CreateFrameWithLayout(
dst_layout, src_frame->visibl... | 282,318,245,280,600,270,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5067 | An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5067 |
7,121 | Chrome | 7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | None | 1 | SessionStartupPref StartupBrowserCreator::GetSessionStartupPref(
const base::CommandLine& command_line,
Profile* profile) {
DCHECK(profile);
PrefService* prefs = profile->GetPrefs();
SessionStartupPref pref = SessionStartupPref::GetStartupPref(prefs);
#if defined(OS_CHROMEOS)
const bool is_first_run =
... | 278,754,199,857,462,470,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5069 | Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5069 |
164,189 | Chrome | 7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | None | 0 | SessionStartupPref StartupBrowserCreator::GetSessionStartupPref(
const base::CommandLine& command_line,
Profile* profile) {
DCHECK(profile);
PrefService* prefs = profile->GetPrefs();
SessionStartupPref pref = SessionStartupPref::GetStartupPref(prefs);
#if defined(OS_CHROMEOS)
const bool is_first_run =
... | 17,389,048,743,666,292,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5069 | Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5069 |
7,128 | Chrome | 2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | None | 1 | void InputEngine::ProcessText(const std::string& message,
ProcessTextCallback callback) {
NOTIMPLEMENTED(); // Text message not used in the rulebased engine.
}
| 120,056,686,304,310,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5056 | A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5056 |
134,189 | Chrome | 2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | None | 0 | void InputEngine::ProcessMessage(const std::vector<uint8_t>& message,
ProcessMessageCallback callback) {
NOTIMPLEMENTED(); // Protobuf message is not used in the rulebased engine.
}
| 285,191,233,134,452,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5056 | A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5056 |
7,129 | Chrome | 5c895ed26b096468eea6baa6584f2df65905b76b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5c895ed26b096468eea6baa6584f2df65905b76b | None | 1 | bool PasswordAutofillAgent::TryToShowTouchToFill(
const WebFormControlElement& control_element) {
const WebInputElement* element = ToWebInputElement(&control_element);
if (!element || (!base::Contains(web_input_to_password_info_, *element) &&
!base::Contains(password_to_username_, *element... | 230,707,109,267,248,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5053 | An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf. | https://nvd.nist.gov/vuln/detail/CVE-2017-5053 |
164,197 | Chrome | 5c895ed26b096468eea6baa6584f2df65905b76b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5c895ed26b096468eea6baa6584f2df65905b76b | None | 0 | bool PasswordAutofillAgent::TryToShowTouchToFill(
const WebFormControlElement& control_element) {
const WebInputElement* element = ToWebInputElement(&control_element);
WebInputElement username_element;
WebInputElement password_element;
PasswordInfo* password_info = nullptr;
if (!element ||
!FindP... | 4,788,617,793,537,906,300,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5053 | An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf. | https://nvd.nist.gov/vuln/detail/CVE-2017-5053 |
7,171 | Chrome | c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | None | 1 | static v8::Local<v8::Value> compileAndRunPrivateScript(ScriptState* scriptState,
String scriptClassName,
const char* source,
size_t size) {
v8::Isolate* ... | 43,321,180,124,893,950,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5008 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5008 |
164,239 | Chrome | c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | None | 0 | static v8::Local<v8::Value> compileAndRunPrivateScript(ScriptState* scriptState,
String scriptClassName,
const char* source,
size_t size) {
v8::Isolate* ... | 261,761,876,839,289,900,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5008 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5008 |
7,206 | Chrome | a8e17a3031b6ad69c399e5e04dd0084e577097fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc | None | 1 | void HTMLFormControlElement::updateVisibleValidationMessage() {
Page* page = document().page();
if (!page)
return;
String message;
if (layoutObject() && willValidate())
message = validationMessage().stripWhiteSpace();
m_hasValidationMessage = true;
ValidationMessageClient* client = &page->vali... | 149,198,302,204,706,460,000,000,000,000,000,000,000 | None | null | [
"CWE-1021"
] | CVE-2017-5016 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5016 |
164,274 | Chrome | a8e17a3031b6ad69c399e5e04dd0084e577097fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc | None | 0 | void HTMLFormControlElement::updateVisibleValidationMessage() {
Page* page = document().page();
if (!page || !page->isPageVisible())
return;
String message;
if (layoutObject() && willValidate())
message = validationMessage().stripWhiteSpace();
m_hasValidationMessage = true;
ValidationMessageCl... | 168,413,201,881,961,840,000,000,000,000,000,000,000 | None | null | [
"CWE-1021"
] | CVE-2017-5016 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5016 |
7,255 | Chrome | c6f0d22d508a551a40fc8bd7418941b77435aac3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c6f0d22d508a551a40fc8bd7418941b77435aac3 | None | 1 | bool OmniboxViewViews::ShouldShowPlaceholderText() const {
return Textfield::ShouldShowPlaceholderText() &&
!model()->is_caret_visible() && !model()->is_keyword_selected();
}
| 8,362,373,834,993,374,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5220 | PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5220 |
164,323 | Chrome | c6f0d22d508a551a40fc8bd7418941b77435aac3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c6f0d22d508a551a40fc8bd7418941b77435aac3 | None | 0 | bool OmniboxViewViews::ShouldShowPlaceholderText() const {
bool show_with_caret = base::FeatureList::IsEnabled(
omnibox::kUIExperimentShowPlaceholderWhenCaretShowing);
return Textfield::ShouldShowPlaceholderText() &&
(show_with_caret || !model()->is_caret_visible()) &&
!model()->is_keyword... | 263,567,248,588,776,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5220 | PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5220 |
7,256 | Chrome | e4ebe078840e65d673722e94f8251b334030b5e8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e4ebe078840e65d673722e94f8251b334030b5e8 | None | 1 | bool NavigatorImpl::NavigateToEntry(
FrameTreeNode* frame_tree_node,
const FrameNavigationEntry& frame_entry,
const NavigationEntryImpl& entry,
ReloadType reload_type,
bool is_same_document_history_load,
bool is_history_navigation_in_new_child,
bool is_pending_entry,
const scoped_refptr<... | 11,271,315,131,120,144,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5222 | Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5222 |
164,324 | Chrome | e4ebe078840e65d673722e94f8251b334030b5e8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e4ebe078840e65d673722e94f8251b334030b5e8 | None | 0 | bool NavigatorImpl::NavigateToEntry(
FrameTreeNode* frame_tree_node,
const FrameNavigationEntry& frame_entry,
const NavigationEntryImpl& entry,
ReloadType reload_type,
bool is_same_document_history_load,
bool is_history_navigation_in_new_child,
bool is_pending_entry,
const scoped_refptr<... | 318,149,853,114,027,070,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5222 | Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5222 |
7,257 | Chrome | 4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | None | 1 | void HTMLFormElement::scheduleFormSubmission(FormSubmission* submission) {
DCHECK(submission->method() == FormSubmission::PostMethod ||
submission->method() == FormSubmission::GetMethod);
DCHECK(submission->data());
DCHECK(submission->form());
if (submission->action().isEmpty())
return;
if (docum... | 60,890,742,356,783,270,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-5225 | Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5225 |
164,325 | Chrome | 4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | None | 0 | void HTMLFormElement::scheduleFormSubmission(FormSubmission* submission) {
DCHECK(submission->method() == FormSubmission::PostMethod ||
submission->method() == FormSubmission::GetMethod);
DCHECK(submission->data());
DCHECK(submission->form());
if (submission->action().isEmpty())
return;
if (docum... | 73,004,261,540,224,800,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-5225 | Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5225 |
7,258 | Chrome | a4acc2991a60408f2044b2a3b19817074c04b751 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a4acc2991a60408f2044b2a3b19817074c04b751 | None | 1 | void SetBuildInfoAnnotations(std::map<std::string, std::string>* annotations) {
base::android::BuildInfo* info = base::android::BuildInfo::GetInstance();
(*annotations)["android_build_id"] = info->android_build_id();
(*annotations)["android_build_fp"] = info->android_build_fp();
(*annotations)["device"] = ... | 231,354,713,576,835,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-5224 | A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5224 |
164,326 | Chrome | a4acc2991a60408f2044b2a3b19817074c04b751 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a4acc2991a60408f2044b2a3b19817074c04b751 | None | 0 | void SetBuildInfoAnnotations(std::map<std::string, std::string>* annotations) {
base::android::BuildInfo* info = base::android::BuildInfo::GetInstance();
(*annotations)["android_build_id"] = info->android_build_id();
(*annotations)["android_build_fp"] = info->android_build_fp();
(*annotations)["sdk"] = base... | 51,170,931,332,779,840,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-5224 | A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5224 |
7,271 | Chrome | 2f19869af13bbfdcfd682a55c0d2c61c6e102475 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f19869af13bbfdcfd682a55c0d2c61c6e102475 | None | 1 | base::string16 GetRelyingPartyIdString(
AuthenticatorRequestDialogModel* dialog_model) {
static constexpr char kRpIdUrlPrefix[] = "https://";
static constexpr int kDialogWidth = 300;
const auto& rp_id = dialog_model->relying_party_id();
DCHECK(!rp_id.empty());
GURL rp_id_url(kRpIdUrlPrefix + rp_id);
... | 287,909,333,433,410,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5200 | V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5200 |
164,339 | Chrome | 2f19869af13bbfdcfd682a55c0d2c61c6e102475 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f19869af13bbfdcfd682a55c0d2c61c6e102475 | None | 0 | base::string16 GetRelyingPartyIdString(
AuthenticatorRequestDialogModel* dialog_model) {
static constexpr char kRpIdUrlPrefix[] = "https://";
static constexpr int kDialogWidth = 300;
const auto& rp_id = dialog_model->relying_party_id();
DCHECK(!rp_id.empty());
GURL rp_id_url(kRpIdUrlPrefix + rp_id);
... | 143,695,496,656,223,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5200 | V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5200 |
7,280 | Chrome | bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | None | 1 | void HistoryController::UpdateForCommit(RenderFrameImpl* frame,
const WebHistoryItem& item,
WebHistoryCommitType commit_type,
bool navigation_within_page) {
switch (commit_type) {
case blink::W... | 123,660,876,161,276,620,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1664 | The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1664 |
164,348 | Chrome | bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | None | 0 | void HistoryController::UpdateForCommit(RenderFrameImpl* frame,
const WebHistoryItem& item,
WebHistoryCommitType commit_type,
bool navigation_within_page) {
switch (commit_type) {
case blink::W... | 200,684,913,471,493,720,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1664 | The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1664 |
7,299 | Chrome | 2f8e481c12c9e8de107b73508b6c283569d4df5b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f8e481c12c9e8de107b73508b6c283569d4df5b | None | 1 | Node::InsertionNotificationRequest HTMLLinkElement::InsertedInto(
ContainerNode& insertion_point) {
HTMLElement::InsertedInto(insertion_point);
LogAddElementIfIsolatedWorldAndInDocument("link", relAttr, hrefAttr);
if (!insertion_point.isConnected())
return kInsertionDone;
DCHECK(isConnected());
if... | 302,743,156,411,312,450,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-18337 | Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18337 |
164,367 | Chrome | 2f8e481c12c9e8de107b73508b6c283569d4df5b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f8e481c12c9e8de107b73508b6c283569d4df5b | None | 0 | Node::InsertionNotificationRequest HTMLLinkElement::InsertedInto(
ContainerNode& insertion_point) {
HTMLElement::InsertedInto(insertion_point);
LogAddElementIfIsolatedWorldAndInDocument("link", relAttr, hrefAttr);
if (!insertion_point.isConnected())
return kInsertionDone;
DCHECK(isConnected());
Ge... | 79,961,097,846,889,210,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-18337 | Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18337 |
7,313 | Chrome | e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | None | 1 | void RendererSchedulerImpl::OnShutdownTaskQueue(
const scoped_refptr<MainThreadTaskQueue>& task_queue) {
if (main_thread_only().was_shutdown)
return;
if (task_queue_throttler_)
task_queue_throttler_->ShutdownTaskQueue(task_queue.get());
if (task_runners_.erase(task_queue)) {
switch (task_queue->... | 318,747,477,006,032,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-18339 | Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18339 |
164,381 | Chrome | e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | None | 0 | void RendererSchedulerImpl::OnShutdownTaskQueue(
const scoped_refptr<MainThreadTaskQueue>& task_queue) {
if (main_thread_only().was_shutdown)
return;
if (task_queue_throttler_)
task_queue_throttler_->ShutdownTaskQueue(task_queue.get());
if (task_runners_.erase(task_queue)) {
switch (task_queue->... | 155,317,608,875,217,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-18339 | Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18339 |
7,316 | Chrome | dae5b388b44dae4dc11668dba210bbb92d72d969 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dae5b388b44dae4dc11668dba210bbb92d72d969 | None | 1 | String TextCodecUTF8::Decode(const char* bytes,
wtf_size_t length,
FlushBehavior flush,
bool stop_on_error,
bool& saw_error) {
const bool do_flush = flush != FlushBehavior::kDoNotFlush;
StringBuffer<L... | 258,282,673,784,096,970,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-18341 | An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18341 |
164,384 | Chrome | dae5b388b44dae4dc11668dba210bbb92d72d969 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dae5b388b44dae4dc11668dba210bbb92d72d969 | None | 0 | String TextCodecUTF8::Decode(const char* bytes,
wtf_size_t length,
FlushBehavior flush,
bool stop_on_error,
bool& saw_error) {
const bool do_flush = flush != FlushBehavior::kDoNotFlush;
StringBuffer<L... | 224,136,936,032,843,180,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-18341 | An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18341 |
7,318 | Chrome | c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | None | 1 | Response PageHandler::SetDownloadBehavior(const std::string& behavior,
Maybe<std::string> download_path) {
WebContentsImpl* web_contents = GetWebContents();
if (!web_contents)
return Response::InternalError();
if (behavior == Page::SetDownloadBehavior::BehaviorE... | 316,483,507,304,812,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18344 | Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18344 |
164,386 | Chrome | c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | None | 0 | Response PageHandler::SetDownloadBehavior(const std::string& behavior,
Maybe<std::string> download_path) {
if (!allow_set_download_behavior_)
return Response::Error("Not allowed.");
WebContentsImpl* web_contents = GetWebContents();
if (!web_contents)
return ... | 267,864,140,629,336,260,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18344 | Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18344 |
7,322 | Chrome | 9004be20a4cfde70456579489258c3aca4ed45a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9004be20a4cfde70456579489258c3aca4ed45a4 | None | 1 | void OnReadAllMetadata(
const SessionStore::SessionInfo& session_info,
SessionStore::FactoryCompletionCallback callback,
std::unique_ptr<ModelTypeStore> store,
std::unique_ptr<ModelTypeStore::RecordList> record_list,
const base::Optional<syncer::ModelError>& error,
std::unique_p... | 158,754,708,407,809,220,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18346 | Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18346 |
164,390 | Chrome | 9004be20a4cfde70456579489258c3aca4ed45a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9004be20a4cfde70456579489258c3aca4ed45a4 | None | 0 | void OnReadAllMetadata(
const SessionStore::SessionInfo& session_info,
SessionStore::FactoryCompletionCallback callback,
std::unique_ptr<ModelTypeStore> store,
std::unique_ptr<ModelTypeStore::RecordList> record_list,
const base::Optional<syncer::ModelError>& error,
std::unique_p... | 77,630,288,680,905,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18346 | Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18346 |
7,323 | Chrome | 0aa576040704401ae28ea73b862d0b5d84262d51 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0aa576040704401ae28ea73b862d0b5d84262d51 | None | 1 | void NavigatorImpl::DiscardPendingEntryIfNeeded(int expected_pending_entry_id) {
NavigationEntry* pending_entry = controller_->GetPendingEntry();
bool pending_matches_fail_msg =
pending_entry &&
expected_pending_entry_id == pending_entry->GetUniqueID();
if (!pending_matches_fail_msg)
return;
bo... | 86,982,784,795,579,680,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18347 | Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18347 |
164,391 | Chrome | 0aa576040704401ae28ea73b862d0b5d84262d51 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0aa576040704401ae28ea73b862d0b5d84262d51 | None | 0 | void NavigatorImpl::DiscardPendingEntryIfNeeded(int expected_pending_entry_id) {
NavigationEntry* pending_entry = controller_->GetPendingEntry();
bool pending_matches_fail_msg =
pending_entry &&
expected_pending_entry_id == pending_entry->GetUniqueID();
if (!pending_matches_fail_msg)
return;
//... | 150,608,829,682,985,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18347 | Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18347 |
7,324 | Chrome | 5f8671e7667b8b133bd3664100012a3906e92d65 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5f8671e7667b8b133bd3664100012a3906e92d65 | None | 1 | void RemoteFrame::ScheduleNavigation(Document& origin_document,
const KURL& url,
WebFrameLoadType frame_load_type,
UserGestureStatus user_gesture_status) {
FrameLoadRequest frame_request(&origin_document... | 82,778,449,170,609,700,000,000,000,000,000,000,000 | None | null | [
"CWE-732"
] | CVE-2018-18349 | Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18349 |
164,392 | Chrome | 5f8671e7667b8b133bd3664100012a3906e92d65 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5f8671e7667b8b133bd3664100012a3906e92d65 | None | 0 | void RemoteFrame::ScheduleNavigation(Document& origin_document,
const KURL& url,
WebFrameLoadType frame_load_type,
UserGestureStatus user_gesture_status) {
if (!origin_document.GetSecurityOrigin()->CanDis... | 327,255,685,429,368,200,000,000,000,000,000,000,000 | None | null | [
"CWE-732"
] | CVE-2018-18349 | Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18349 |
7,328 | Chrome | 07fbae50670ea44e35e1d554db1bbece7fe3711f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/07fbae50670ea44e35e1d554db1bbece7fe3711f | None | 1 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 130,348,220,011,088,760,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18351 | Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18351 |
164,395 | Chrome | 07fbae50670ea44e35e1d554db1bbece7fe3711f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/07fbae50670ea44e35e1d554db1bbece7fe3711f | None | 0 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 263,100,447,171,764,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18351 | Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18351 |
7,344 | Chrome | 4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | None | 1 | void IDNSpoofChecker::SetAllowedUnicodeSet(UErrorCode* status) {
if (U_FAILURE(*status))
return;
const icu::UnicodeSet* recommended_set =
uspoof_getRecommendedUnicodeSet(status);
icu::UnicodeSet allowed_set;
allowed_set.addAll(*recommended_set);
const icu::UnicodeSet* inclusion_set = uspoof_getIncl... | 203,276,699,258,571,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18355 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18355 |
164,411 | Chrome | 4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | None | 0 | void IDNSpoofChecker::SetAllowedUnicodeSet(UErrorCode* status) {
if (U_FAILURE(*status))
return;
const icu::UnicodeSet* recommended_set =
uspoof_getRecommendedUnicodeSet(status);
icu::UnicodeSet allowed_set;
allowed_set.addAll(*recommended_set);
const icu::UnicodeSet* inclusion_set = uspoof_getIncl... | 180,195,026,896,359,560,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18355 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18355 |
7,345 | Chrome | 01e16ef252070f81b5f61ef4bfc0442422fd5d16 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01e16ef252070f81b5f61ef4bfc0442422fd5d16 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 186,379,375,530,314,070,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18357 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18357 |
164,412 | Chrome | 01e16ef252070f81b5f61ef4bfc0442422fd5d16 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01e16ef252070f81b5f61ef4bfc0442422fd5d16 | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 337,790,917,803,540,360,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18357 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18357 |
7,352 | Chrome | cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 219,759,752,202,148,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-20070 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-20070 |
164,419 | Chrome | cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 58,767,621,007,677,010,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-20070 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-20070 |
7,355 | Chrome | 9d2ead1650a1c901754dd1a68705006a6934cffc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d2ead1650a1c901754dd1a68705006a6934cffc | None | 1 | void AppCacheGroup::RemoveCache(AppCache* cache) {
DCHECK(cache->associated_hosts().empty());
if (cache == newest_complete_cache_) {
CancelUpdate();
AppCache* tmp_cache = newest_complete_cache_;
newest_complete_cache_ = nullptr;
tmp_cache->set_owning_group(nullptr); // may cause this group to... | 138,055,724,054,737,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17462 | Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17462 |
164,422 | Chrome | 9d2ead1650a1c901754dd1a68705006a6934cffc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d2ead1650a1c901754dd1a68705006a6934cffc | None | 0 | void AppCacheGroup::RemoveCache(AppCache* cache) {
DCHECK(cache->associated_hosts().empty());
if (cache == newest_complete_cache_) {
AppCache* tmp_cache = newest_complete_cache_;
newest_complete_cache_ = nullptr;
CancelUpdate();
tmp_cache->set_owning_group(nullptr); // may cause this group to... | 169,075,970,973,599,470,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17462 | Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17462 |
7,363 | Chrome | 3983030c2ee3e54afa60fe24f23e4c98067a3634 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3983030c2ee3e54afa60fe24f23e4c98067a3634 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 234,687,996,016,746,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17473 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-17473 |
164,429 | Chrome | 3983030c2ee3e54afa60fe24f23e4c98067a3634 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3983030c2ee3e54afa60fe24f23e4c98067a3634 | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 95,129,994,912,911,190,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17473 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-17473 |
7,365 | Chrome | 3d41e77125f3de8d722b6d8303599abaf2a91667 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3d41e77125f3de8d722b6d8303599abaf2a91667 | None | 1 | void Browser::SetWebContentsBlocked(content::WebContents* web_contents,
bool blocked) {
int index = tab_strip_model_->GetIndexOfWebContents(web_contents);
if (index == TabStripModel::kNoTab) {
return;
}
tab_strip_model_->SetTabBlocked(index, blocked);
bool browser... | 211,797,006,234,735,850,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17476 | Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17476 |
164,431 | Chrome | 3d41e77125f3de8d722b6d8303599abaf2a91667 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3d41e77125f3de8d722b6d8303599abaf2a91667 | None | 0 | void Browser::SetWebContentsBlocked(content::WebContents* web_contents,
bool blocked) {
int index = tab_strip_model_->GetIndexOfWebContents(web_contents);
if (index == TabStripModel::kNoTab) {
return;
}
// For security, if the WebContents is in fullscreen, have it drop... | 182,850,516,282,432,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17476 | Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17476 |
7,366 | Chrome | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | None | 1 | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... | 338,198,694,062,496,940,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6031 | Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6031 |
164,432 | Chrome | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | None | 0 | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... | 224,469,997,936,707,500,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6031 | Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6031 |
7,367 | Chrome | a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | None | 1 | bool DownloadItemImpl::CanOpenDownload() {
const bool is_complete = GetState() == DownloadItem::COMPLETE;
return (!IsDone() || is_complete) && !IsTemporary() &&
!file_externally_removed_;
}
| 238,820,870,745,881,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6033 | Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6033 |
164,433 | Chrome | a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | None | 0 | bool DownloadItemImpl::CanOpenDownload() {
const bool is_complete = GetState() == DownloadItem::COMPLETE;
return (!IsDone() || is_complete) && !IsTemporary() &&
!file_externally_removed_ &&
delegate_->IsMostRecentDownloadItemAtFilePath(this);
}
| 53,503,357,604,745,760,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6033 | Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6033 |
7,384 | Chrome | 5cd363bc34f508c63b66e653bc41bd1783a4b711 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cd363bc34f508c63b66e653bc41bd1783a4b711 | None | 1 | RenderFrameHostImpl* RenderFrameHostManager::GetFrameHostForNavigation(
const NavigationRequest& request) {
DCHECK(!request.common_params().url.SchemeIs(url::kJavaScriptScheme))
<< "Don't call this method for JavaScript URLs as those create a "
"temporary NavigationRequest and we don't want to res... | 328,808,169,727,114,960,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6041 | Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6041 |
164,442 | Chrome | 5cd363bc34f508c63b66e653bc41bd1783a4b711 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cd363bc34f508c63b66e653bc41bd1783a4b711 | None | 0 | RenderFrameHostImpl* RenderFrameHostManager::GetFrameHostForNavigation(
const NavigationRequest& request) {
DCHECK(!request.common_params().url.SchemeIs(url::kJavaScriptScheme))
<< "Don't call this method for JavaScript URLs as those create a "
"temporary NavigationRequest and we don't want to res... | 62,447,435,332,449,950,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6041 | Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6041 |
7,388 | Chrome | 24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | None | 1 | GURL SanitizeFrontendURL(const GURL& url,
const std::string& scheme,
const std::string& host,
const std::string& path,
bool allow_query_and_fragment) {
std::vector<std::string> query_parts;
std::string fragment;
if... | 172,431,416,603,395,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6046 | Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6046 |
164,445 | Chrome | 24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | None | 0 | GURL SanitizeFrontendURL(const GURL& url,
const std::string& scheme,
const std::string& host,
const std::string& path,
bool allow_query_and_fragment) {
std::vector<std::string> query_parts;
std::string fragment;
if... | 145,155,123,873,369,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6046 | Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6046 |
7,389 | Chrome | fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | None | 1 | bool WebGLRenderingContextBase::ValidateHTMLImageElement(
const SecurityOrigin* security_origin,
const char* function_name,
HTMLImageElement* image,
ExceptionState& exception_state) {
if (!image || !image->CachedImage()) {
SynthesizeGLError(GL_INVALID_VALUE, function_name, "no image");
return ... | 255,972,174,539,003,430,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6047 | Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user redirect URL via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6047 |
164,446 | Chrome | fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | None | 0 | bool WebGLRenderingContextBase::ValidateHTMLImageElement(
const SecurityOrigin* security_origin,
const char* function_name,
HTMLImageElement* image,
ExceptionState& exception_state) {
if (!image || !image->CachedImage()) {
SynthesizeGLError(GL_INVALID_VALUE, function_name, "no image");
return ... | 78,416,701,654,700,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6047 | Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user redirect URL via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6047 |
7,391 | Chrome | a30f64b4ae13255535a4947616fce484c54207df | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a30f64b4ae13255535a4947616fce484c54207df | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), nullptr, &status);
i... | 308,391,636,262,837,550,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6050 | Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6050 |
164,447 | Chrome | a30f64b4ae13255535a4947616fce484c54207df | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a30f64b4ae13255535a4947616fce484c54207df | None | 0 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), nullptr, &status);
i... | 294,074,234,884,736,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6050 | Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6050 |
7,392 | Chrome | 0da6dcdbe8e34740133773d20cc466b89d399d0a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0da6dcdbe8e34740133773d20cc466b89d399d0a | None | 1 | void XSSAuditor::Init(Document* document,
XSSAuditorDelegate* auditor_delegate) {
DCHECK(IsMainThread());
if (state_ != kUninitialized)
return;
state_ = kFilteringTokens;
if (Settings* settings = document->GetSettings())
is_enabled_ = settings->GetXSSAuditorEnabled();
if (!is_e... | 174,848,119,607,278,600,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6051 | XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6051 |
164,448 | Chrome | 0da6dcdbe8e34740133773d20cc466b89d399d0a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0da6dcdbe8e34740133773d20cc466b89d399d0a | None | 0 | void XSSAuditor::Init(Document* document,
XSSAuditorDelegate* auditor_delegate) {
DCHECK(IsMainThread());
if (state_ != kUninitialized)
return;
state_ = kFilteringTokens;
if (Settings* settings = document->GetSettings())
is_enabled_ = settings->GetXSSAuditorEnabled();
if (!is_e... | 224,498,140,899,435,530,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6051 | XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6051 |
7,393 | Chrome | 6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | None | 1 | void TopSitesImpl::SetTopSites(const MostVisitedURLList& new_top_sites,
const CallLocation location) {
DCHECK(thread_checker_.CalledOnValidThread());
MostVisitedURLList top_sites(new_top_sites);
size_t num_forced_urls = MergeCachedForcedURLs(&top_sites);
AddPrepopulatedPages(&top... | 268,250,571,136,774,840,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6053 | Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a local attacker to view website thumbnail images after clearing browser data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6053 |
164,449 | Chrome | 6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | None | 0 | void TopSitesImpl::SetTopSites(const MostVisitedURLList& new_top_sites,
const CallLocation location) {
DCHECK(thread_checker_.CalledOnValidThread());
MostVisitedURLList top_sites(new_top_sites);
size_t num_forced_urls = MergeCachedForcedURLs(&top_sites);
AddPrepopulatedPages(&top... | 313,856,828,935,102,460,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6053 | Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a local attacker to view website thumbnail images after clearing browser data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6053 |
7,394 | Chrome | 90585e657db48f93bd73bc45d4caa975323da41b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/90585e657db48f93bd73bc45d4caa975323da41b | None | 1 | void WebUIExtension::Send(gin::Arguments* args) {
blink::WebLocalFrame* frame;
RenderFrame* render_frame;
if (!ShouldRespondToRequest(&frame, &render_frame))
return;
std::string message;
if (!args->GetNext(&message)) {
args->ThrowError();
return;
}
if (base::EndsWith(message, "RequiringGestu... | 164,307,740,332,095,210,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6054 | Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6054 |
164,450 | Chrome | 90585e657db48f93bd73bc45d4caa975323da41b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/90585e657db48f93bd73bc45d4caa975323da41b | None | 0 | void WebUIExtension::Send(gin::Arguments* args) {
blink::WebLocalFrame* frame;
RenderFrame* render_frame;
if (!ShouldRespondToRequest(&frame, &render_frame))
return;
std::string message;
if (!args->GetNext(&message)) {
args->ThrowError();
return;
}
if (base::EndsWith(message, "RequiringGestu... | 43,252,105,417,124,370,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6054 | Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6054 |
7,399 | Chrome | c9d673b54832afde658f214d7da7d0453fa89774 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c9d673b54832afde658f214d7da7d0453fa89774 | None | 1 | void MemBackendImpl::EvictIfNeeded() {
if (current_size_ <= max_size_)
return;
int target_size = std::max(0, max_size_ - kDefaultEvictionSize);
base::LinkNode<MemEntryImpl>* entry = lru_list_.head();
while (current_size_ > target_size && entry != lru_list_.end()) {
MemEntryImpl* to_doom = entry->va... | 315,799,070,500,799,380,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6086 | A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6086 |
164,455 | Chrome | c9d673b54832afde658f214d7da7d0453fa89774 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c9d673b54832afde658f214d7da7d0453fa89774 | None | 0 | void MemBackendImpl::EvictIfNeeded() {
if (current_size_ <= max_size_)
return;
int target_size = std::max(0, max_size_ - kDefaultEvictionSize);
base::LinkNode<MemEntryImpl>* entry = lru_list_.head();
while (current_size_ > target_size && entry != lru_list_.end()) {
MemEntryImpl* to_doom = entry->va... | 185,092,312,834,555,960,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6086 | A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6086 |
7,400 | Chrome | 94b3728a2836da335a10085d4089c9d8e1c9d225 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/94b3728a2836da335a10085d4089c9d8e1c9d225 | None | 1 | int PDFiumEngine::GetVisiblePageIndex(FPDF_PAGE page) {
for (int page_index : visible_pages_) {
if (pages_[page_index]->GetPage() == page)
return page_index;
}
return -1;
}
| 306,739,967,883,605,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6088 | An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6088 |
164,456 | Chrome | 94b3728a2836da335a10085d4089c9d8e1c9d225 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/94b3728a2836da335a10085d4089c9d8e1c9d225 | None | 0 | int PDFiumEngine::GetVisiblePageIndex(FPDF_PAGE page) {
// Copy visible_pages_ since it can change as a result of loading the page in
// GetPage(). See https://crbug.com/822091.
std::vector<int> visible_pages_copy(visible_pages_);
for (int page_index : visible_pages_copy) {
if (pages_[page_index]->GetPage... | 207,319,984,385,427,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6088 | An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6088 |
7,425 | Chrome | ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | None | 1 | void ServerWrapper::OnHttpRequest(int connection_id,
const net::HttpServerRequestInfo& info) {
server_->SetSendBufferSize(connection_id, kSendBufferSizeForDevTools);
if (base::StartsWith(info.path, "/json", base::CompareCase::SENSITIVE)) {
BrowserThread::PostTask(BrowserT... | 212,957,148,344,421,130,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6101 | A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server. | https://nvd.nist.gov/vuln/detail/CVE-2018-6101 |
164,480 | Chrome | ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | None | 0 | void ServerWrapper::OnHttpRequest(int connection_id,
const net::HttpServerRequestInfo& info) {
if (!RequestIsSafeToServe(info)) {
Send500(connection_id,
"Host header is specified and is not an IP address or localhost.");
return;
}
server_->SetSendBufferSiz... | 133,423,183,364,749,950,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6101 | A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server. | https://nvd.nist.gov/vuln/detail/CVE-2018-6101 |
7,426 | Chrome | d52b8375cfe5b56194d3df09c18e7b64e5838369 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d52b8375cfe5b56194d3df09c18e7b64e5838369 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 266,538,480,458,293,870,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6102 | Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6102 |
164,481 | Chrome | d52b8375cfe5b56194d3df09c18e7b64e5838369 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d52b8375cfe5b56194d3df09c18e7b64e5838369 | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 325,757,619,716,514,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6102 | Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6102 |
7,478 | Chrome | bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | None | 1 | bool NavigateToUrlWithEdge(const base::string16& url) {
base::string16 protocol_url = L"microsoft-edge:" + url;
SHELLEXECUTEINFO info = { sizeof(info) };
info.fMask = SEE_MASK_NOASYNC | SEE_MASK_FLAG_NO_UI;
info.lpVerb = L"open";
info.lpFile = protocol_url.c_str();
info.nShow = SW_SHOWNORMAL;
if (::... | 9,734,627,333,286,498,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6115 | Inappropriate setting of the SEE_MASK_FLAG_NO_UI flag in file downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially bypass OS malware checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6115 |
164,528 | Chrome | bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | None | 0 | bool NavigateToUrlWithEdge(const base::string16& url) {
base::string16 protocol_url = L"microsoft-edge:" + url;
SHELLEXECUTEINFO info = { sizeof(info) };
info.fMask = SEE_MASK_NOASYNC;
info.lpVerb = L"open";
info.lpFile = protocol_url.c_str();
info.nShow = SW_SHOWNORMAL;
if (::ShellExecuteEx(&info))... | 198,565,485,258,494,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6115 | Inappropriate setting of the SEE_MASK_FLAG_NO_UI flag in file downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially bypass OS malware checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6115 |
7,479 | Chrome | 52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | None | 1 | void AddPasswordsAndFormsStrings(content::WebUIDataSource* html_source) {
LocalizedString localized_strings[] = {
{"passwordsAndAutofillPageTitle",
IDS_SETTINGS_PASSWORDS_AND_AUTOFILL_PAGE_TITLE},
{"autofill", IDS_SETTINGS_AUTOFILL},
{"googlePayments", IDS_SETTINGS_GOOGLE_PAYMENTS},
... | 36,426,098,985,734,715,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6117 | Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6117 |
164,529 | Chrome | 52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | None | 0 | void AddPasswordsAndFormsStrings(content::WebUIDataSource* html_source) {
LocalizedString localized_strings[] = {
{"passwordsAndAutofillPageTitle",
IDS_SETTINGS_PASSWORDS_AND_AUTOFILL_PAGE_TITLE},
{"autofill", IDS_SETTINGS_AUTOFILL},
{"googlePayments", IDS_SETTINGS_GOOGLE_PAYMENTS},
... | 204,328,713,577,922,370,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6117 | Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6117 |
7,480 | Chrome | fd6a5115103b3e6a52ce15858c5ad4956df29300 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd6a5115103b3e6a52ce15858c5ad4956df29300 | None | 1 | void AudioNode::Dispose() {
DCHECK(IsMainThread());
#if DEBUG_AUDIONODE_REFERENCES
fprintf(stderr, "[%16p]: %16p: %2d: AudioNode::dispose %16p\n", context(),
this, Handler().GetNodeType(), handler_.get());
#endif
BaseAudioContext::GraphAutoLocker locker(context());
Handler().Dispose();
if (contex... | 224,602,300,920,060,400,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6060 | Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6060 |
164,530 | Chrome | fd6a5115103b3e6a52ce15858c5ad4956df29300 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd6a5115103b3e6a52ce15858c5ad4956df29300 | None | 0 | void AudioNode::Dispose() {
DCHECK(IsMainThread());
#if DEBUG_AUDIONODE_REFERENCES
fprintf(stderr, "[%16p]: %16p: %2d: AudioNode::dispose %16p\n", context(),
this, Handler().GetNodeType(), handler_.get());
#endif
BaseAudioContext::GraphAutoLocker locker(context());
Handler().Dispose();
if (contex... | 283,962,812,287,469,470,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6060 | Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6060 |
7,563 | Chrome | 673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | None | 1 | ScopedSharedBufferHandle WrapSharedMemoryHandle(
const base::SharedMemoryHandle& memory_handle,
size_t size,
bool read_only) {
if (!memory_handle.IsValid())
return ScopedSharedBufferHandle();
MojoPlatformHandle platform_handle;
platform_handle.struct_size = sizeof(MojoPlatformHandle);
plat... | 72,164,664,479,411,620,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-6063 | Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6063 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.