idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
164,614 | Chrome | 673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | None | 0 | ScopedSharedBufferHandle WrapSharedMemoryHandle(
const base::SharedMemoryHandle& memory_handle,
size_t size,
UnwrappedSharedMemoryHandleProtection protection) {
if (!memory_handle.IsValid())
return ScopedSharedBufferHandle();
MojoPlatformHandle platform_handle;
platform_handle.struct_size = ... | 313,045,936,899,468,250,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-6063 | Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6063 |
7,574 | Chrome | f283cdf7c850f3db923a5303c7e01bd929d4117f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f283cdf7c850f3db923a5303c7e01bd929d4117f | None | 1 | bool VaapiJpegDecoder::Initialize(const base::RepeatingClosure& error_uma_cb) {
vaapi_wrapper_ = VaapiWrapper::Create(VaapiWrapper::kDecode,
VAProfileJPEGBaseline, error_uma_cb);
if (!vaapi_wrapper_) {
VLOGF(1) << "Failed initializing VAAPI";
return false;
}
retur... | 3,272,268,027,632,531,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6070 | Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6070 |
164,625 | Chrome | f283cdf7c850f3db923a5303c7e01bd929d4117f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f283cdf7c850f3db923a5303c7e01bd929d4117f | None | 0 | bool VaapiJpegDecoder::Initialize(const base::RepeatingClosure& error_uma_cb) {
| 248,933,294,380,413,570,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6070 | Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6070 |
7,581 | Chrome | f8f6ed59949be4451ee2f5443d8a313f102fde60 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f8f6ed59949be4451ee2f5443d8a313f102fde60 | None | 1 | void DoCanonicalizeRef(const CHAR* spec,
const Component& ref,
CanonOutput* output,
Component* out_ref) {
if (ref.len < 0) {
*out_ref = Component();
return;
}
output->push_back('#');
out_ref->begin = output->length();
int end = ref... | 267,438,556,305,741,560,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6076 | Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6076 |
164,631 | Chrome | f8f6ed59949be4451ee2f5443d8a313f102fde60 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f8f6ed59949be4451ee2f5443d8a313f102fde60 | None | 0 | void DoCanonicalizeRef(const CHAR* spec,
const Component& ref,
CanonOutput* output,
Component* out_ref) {
if (ref.len < 0) {
*out_ref = Component();
return;
}
output->push_back('#');
out_ref->begin = output->length();
int end = ref... | 39,193,589,272,103,326,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6076 | Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6076 |
7,587 | Chrome | fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 195,566,591,690,515,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6078 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6078 |
164,637 | Chrome | fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 51,938,912,222,486,955,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6078 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6078 |
7,597 | Chrome | a96567f02a0881561c964e5c11afe9c1af17a5f7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a96567f02a0881561c964e5c11afe9c1af17a5f7 | None | 1 | QuicErrorCode QuicStreamSequencerBuffer::OnStreamData(
QuicStreamOffset starting_offset,
QuicStringPiece data,
QuicTime timestamp,
size_t* const bytes_buffered,
std::string* error_details) {
CHECK_EQ(destruction_indicator_, 123456) << "This object has been destructed";
*bytes_buffered = 0;
Qui... | 195,459,414,426,763,180,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-15407 | Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15407 |
164,647 | Chrome | a96567f02a0881561c964e5c11afe9c1af17a5f7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a96567f02a0881561c964e5c11afe9c1af17a5f7 | None | 0 | QuicErrorCode QuicStreamSequencerBuffer::OnStreamData(
QuicStreamOffset starting_offset,
QuicStringPiece data,
QuicTime timestamp,
size_t* const bytes_buffered,
std::string* error_details) {
CHECK_EQ(destruction_indicator_, 123456) << "This object has been destructed";
*bytes_buffered = 0;
Qui... | 209,344,924,826,091,360,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-15407 | Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15407 |
7,600 | Chrome | 11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | None | 1 | BlobStorageContext::BlobFlattener::BlobFlattener(
const BlobDataBuilder& input_builder,
BlobEntry* output_blob,
BlobStorageRegistry* registry) {
const std::string& uuid = input_builder.uuid_;
std::set<std::string> dependent_blob_uuids;
size_t num_files_with_unknown_size = 0;
size_t num_building_dep... | 159,071,568,910,807,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15416 | Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2017-15416 |
164,650 | Chrome | 11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | None | 0 | BlobStorageContext::BlobFlattener::BlobFlattener(
const BlobDataBuilder& input_builder,
BlobEntry* output_blob,
BlobStorageRegistry* registry) {
const std::string& uuid = input_builder.uuid_;
std::set<std::string> dependent_blob_uuids;
size_t num_files_with_unknown_size = 0;
size_t num_building_dep... | 275,201,289,420,920,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15416 | Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2017-15416 |
7,609 | Chrome | 16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | None | 1 | int OmniboxViewViews::OnDrop(const ui::OSExchangeData& data) {
if (HasTextBeingDragged())
return ui::DragDropTypes::DRAG_NONE;
if (data.HasURL(ui::OSExchangeData::CONVERT_FILENAMES)) {
GURL url;
base::string16 title;
if (data.GetURLAndTitle(
ui::OSExchangeData::CONVERT_FILENAMES, &url, ... | 116,048,407,286,939,860,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-15427 | Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar. | https://nvd.nist.gov/vuln/detail/CVE-2017-15427 |
164,659 | Chrome | 16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | None | 0 | int OmniboxViewViews::OnDrop(const ui::OSExchangeData& data) {
if (HasTextBeingDragged())
return ui::DragDropTypes::DRAG_NONE;
if (data.HasURL(ui::OSExchangeData::CONVERT_FILENAMES)) {
GURL url;
base::string16 title;
if (data.GetURLAndTitle(
ui::OSExchangeData::CONVERT_FILENAMES, &url, ... | 102,155,979,583,315,870,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-15427 | Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar. | https://nvd.nist.gov/vuln/detail/CVE-2017-15427 |
7,612 | Chrome | 7a6484fa7b7f86ea06749bfc9d10bb67b145140b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a6484fa7b7f86ea06749bfc9d10bb67b145140b | None | 1 | void QuicClientPromisedInfo::OnPromiseHeaders(const SpdyHeaderBlock& headers) {
SpdyHeaderBlock::const_iterator it = headers.find(kHttp2MethodHeader);
DCHECK(it != headers.end());
if (!(it->second == "GET" || it->second == "HEAD")) {
QUIC_DVLOG(1) << "Promise for stream " << id_ << " has invalid method "
... | 210,233,707,268,975,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15398 | A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15398 |
164,662 | Chrome | 7a6484fa7b7f86ea06749bfc9d10bb67b145140b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a6484fa7b7f86ea06749bfc9d10bb67b145140b | None | 0 | void QuicClientPromisedInfo::OnPromiseHeaders(const SpdyHeaderBlock& headers) {
SpdyHeaderBlock::const_iterator it = headers.find(kHttp2MethodHeader);
if (it == headers.end()) {
QUIC_DVLOG(1) << "Promise for stream " << id_ << " has no method";
Reset(QUIC_INVALID_PROMISE_METHOD);
return;
}
if (!(i... | 187,869,342,291,007,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15398 | A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15398 |
7,615 | Chrome | 783c28d59c4c748ef9b787d4717882c90c5b227b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/783c28d59c4c748ef9b787d4717882c90c5b227b | None | 1 | void ScriptProcessorHandler::Process(size_t frames_to_process) {
AudioBus* input_bus = Input(0).Bus();
AudioBus* output_bus = Output(0).Bus();
unsigned double_buffer_index = this->DoubleBufferIndex();
bool is_double_buffer_index_good =
double_buffer_index < 2 && double_buffer_index < input_buffers_.size... | 39,757,271,478,211,367,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-5129 | A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5129 |
164,665 | Chrome | 783c28d59c4c748ef9b787d4717882c90c5b227b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/783c28d59c4c748ef9b787d4717882c90c5b227b | None | 0 | void ScriptProcessorHandler::Process(size_t frames_to_process) {
AudioBus* input_bus = Input(0).Bus();
AudioBus* output_bus = Output(0).Bus();
unsigned double_buffer_index = this->DoubleBufferIndex();
bool is_double_buffer_index_good =
double_buffer_index < 2 && double_buffer_index < input_buffers_.size... | 237,118,012,896,770,000,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-5129 | A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5129 |
7,625 | Chrome | 1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 104,852,595,640,074,470,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15390 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-15390 |
164,671 | Chrome | 1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | None | 0 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 184,474,259,585,724,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15390 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-15390 |
7,630 | Chrome | a8ef19900d003ff7078fe4fcec8f63496b18f0dc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8ef19900d003ff7078fe4fcec8f63496b18f0dc | None | 1 | WebContents* DevToolsWindow::OpenURLFromTab(
WebContents* source,
const content::OpenURLParams& params) {
DCHECK(source == main_web_contents_);
if (!params.url.SchemeIs(content::kChromeDevToolsScheme)) {
WebContents* inspected_web_contents = GetInspectedWebContents();
return inspected_web_content... | 223,302,603,119,110,200,000,000,000,000,000,000,000 | None | null | [
"CWE-668"
] | CVE-2017-15393 | Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak. | https://nvd.nist.gov/vuln/detail/CVE-2017-15393 |
164,676 | Chrome | a8ef19900d003ff7078fe4fcec8f63496b18f0dc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8ef19900d003ff7078fe4fcec8f63496b18f0dc | None | 0 | WebContents* DevToolsWindow::OpenURLFromTab(
WebContents* source,
const content::OpenURLParams& params) {
DCHECK(source == main_web_contents_);
if (!params.url.SchemeIs(content::kChromeDevToolsScheme)) {
WebContents* inspected_web_contents = GetInspectedWebContents();
if (!inspected_web_contents)... | 117,148,924,944,230,750,000,000,000,000,000,000,000 | None | null | [
"CWE-668"
] | CVE-2017-15393 | Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak. | https://nvd.nist.gov/vuln/detail/CVE-2017-15393 |
7,631 | Chrome | 504e0c45030f76bffda93f0857e7595216d6e7a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/504e0c45030f76bffda93f0857e7595216d6e7a4 | None | 1 | std::set<std::string> GetDistinctHosts(const URLPatternSet& host_patterns,
bool include_rcd,
bool exclude_file_scheme) {
typedef base::StringPairs HostVector;
HostVector hosts_best_rcd;
for (const URLPattern& pattern : host_patterns) {
... | 127,460,476,047,306,420,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15394 | Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2017-15394 |
164,677 | Chrome | 504e0c45030f76bffda93f0857e7595216d6e7a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/504e0c45030f76bffda93f0857e7595216d6e7a4 | None | 0 | std::set<std::string> GetDistinctHosts(const URLPatternSet& host_patterns,
bool include_rcd,
bool exclude_file_scheme) {
typedef base::StringPairs HostVector;
HostVector hosts_best_rcd;
for (const URLPattern& pattern : host_patterns) {
... | 220,468,085,493,705,240,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15394 | Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2017-15394 |
7,633 | Chrome | 761d65ebcac0cdb730fd27b87e207201ac38e3b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/761d65ebcac0cdb730fd27b87e207201ac38e3b4 | None | 1 | void ServiceWorkerPaymentInstrument::OnPaymentAppInvoked(
mojom::PaymentHandlerResponsePtr response) {
DCHECK(delegate_);
if (delegate_ != nullptr) {
delegate_->OnInstrumentDetailsReady(response->method_name,
response->stringified_details);
delegate_ = nullpt... | 124,123,857,466,942,320,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5828 | Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5828 |
164,679 | Chrome | 761d65ebcac0cdb730fd27b87e207201ac38e3b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/761d65ebcac0cdb730fd27b87e207201ac38e3b4 | None | 0 | void ServiceWorkerPaymentInstrument::OnPaymentAppInvoked(
mojom::PaymentHandlerResponsePtr response) {
if (delegate_ != nullptr) {
delegate_->OnInstrumentDetailsReady(response->method_name,
response->stringified_details);
delegate_ = nullptr;
}
}
| 205,114,343,039,471,070,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5828 | Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5828 |
7,680 | Chrome | 37a0e90a956194a066dd31edd5b5ac5045701d31 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/37a0e90a956194a066dd31edd5b5ac5045701d31 | None | 1 | ChildProcessTerminationInfo ChildProcessLauncherHelper::GetTerminationInfo(
const ChildProcessLauncherHelper::Process& process,
bool known_dead) {
ChildProcessTerminationInfo info;
if (!java_peer_avaiable_on_client_thread_)
return info;
Java_ChildProcessLauncherHelperImpl_getTerminationInfo(
... | 333,289,139,968,551,200,000,000,000,000,000,000,000 | None | null | [
"CWE-664"
] | CVE-2019-5816 | Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5816 |
164,726 | Chrome | 37a0e90a956194a066dd31edd5b5ac5045701d31 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/37a0e90a956194a066dd31edd5b5ac5045701d31 | None | 0 | ChildProcessTerminationInfo ChildProcessLauncherHelper::GetTerminationInfo(
const ChildProcessLauncherHelper::Process& process,
bool known_dead) {
ChildProcessTerminationInfo info;
if (!java_peer_avaiable_on_client_thread_)
return info;
Java_ChildProcessLauncherHelperImpl_getTerminationInfoAndStop... | 275,636,419,419,037,900,000,000,000,000,000,000,000 | None | null | [
"CWE-664"
] | CVE-2019-5816 | Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5816 |
7,690 | Chrome | b38064dbb21aaf32151073dcb7d594b240c68f73 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b38064dbb21aaf32151073dcb7d594b240c68f73 | None | 1 | OperationID FileSystemOperationRunner::BeginOperation(
std::unique_ptr<FileSystemOperation> operation) {
OperationID id = next_operation_id_++;
operations_.emplace(id, std::move(operation));
return id;
}
| 307,301,560,034,915,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-5788 | An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5788 |
164,736 | Chrome | b38064dbb21aaf32151073dcb7d594b240c68f73 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b38064dbb21aaf32151073dcb7d594b240c68f73 | None | 0 | OperationID FileSystemOperationRunner::BeginOperation(
std::unique_ptr<FileSystemOperation> operation) {
OperationID id = next_operation_id_++;
operations_[id] = std::move(operation);
return id;
}
| 208,172,056,118,274,320,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-5788 | An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5788 |
7,718 | Chrome | 12348a12a8b108baedee2ddbda99948029d363ed | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12348a12a8b108baedee2ddbda99948029d363ed | None | 1 | UseCounterPageLoadMetricsObserver::GetAllowedUkmFeatures() {
static base::NoDestructor<UseCounterPageLoadMetricsObserver::UkmFeatureList>
opt_in_features(std::initializer_list<WebFeature>({
WebFeature::kNavigatorVibrate,
WebFeature::kNavigatorVibrateSubFrame,
WebFeature::kTouchEven... | 57,277,998,242,963,050,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5802 | Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5802 |
164,764 | Chrome | 12348a12a8b108baedee2ddbda99948029d363ed | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12348a12a8b108baedee2ddbda99948029d363ed | None | 0 | UseCounterPageLoadMetricsObserver::GetAllowedUkmFeatures() {
static base::NoDestructor<UseCounterPageLoadMetricsObserver::UkmFeatureList>
opt_in_features(std::initializer_list<WebFeature>({
WebFeature::kNavigatorVibrate,
WebFeature::kNavigatorVibrateSubFrame,
WebFeature::kTouchEven... | 127,882,781,293,696,440,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5802 | Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5802 |
7,719 | Chrome | 0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | None | 1 | void Location::SetLocation(const String& url,
LocalDOMWindow* current_window,
LocalDOMWindow* entered_window,
ExceptionState* exception_state,
SetLocationPolicy set_location_policy) {
if (!IsAttached())
ret... | 167,749,381,289,571,010,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5803 | Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5803 |
164,765 | Chrome | 0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | None | 0 | void Location::SetLocation(const String& url,
LocalDOMWindow* current_window,
LocalDOMWindow* entered_window,
ExceptionState* exception_state,
SetLocationPolicy set_location_policy) {
if (!IsAttached())
ret... | 26,488,344,675,399,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5803 | Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5803 |
7,720 | Chrome | 08965161257ab9aeef9a3548c1cd1a44525dc562 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08965161257ab9aeef9a3548c1cd1a44525dc562 | None | 1 | std::wstring GetSwitchValueFromCommandLine(const std::wstring& command_line,
const std::wstring& switch_name) {
assert(!command_line.empty());
assert(!switch_name.empty());
std::vector<std::wstring> as_array = TokenizeCommandLineToArray(command_line);
std::wstr... | 171,910,779,797,819,600,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-5804 | Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2019-5804 |
164,766 | Chrome | 08965161257ab9aeef9a3548c1cd1a44525dc562 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08965161257ab9aeef9a3548c1cd1a44525dc562 | None | 0 | std::wstring GetSwitchValueFromCommandLine(const std::wstring& command_line,
const std::wstring& switch_name) {
static constexpr wchar_t kSwitchTerminator[] = L"--";
assert(!command_line.empty());
assert(!switch_name.empty());
std::vector<std::wstring> as_array ... | 174,079,714,125,950,200,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-5804 | Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2019-5804 |
7,721 | Chrome | ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | None | 1 | DOMArrayBuffer* FileReaderLoader::ArrayBufferResult() {
DCHECK_EQ(read_type_, kReadAsArrayBuffer);
if (array_buffer_result_)
return array_buffer_result_;
if (!raw_data_ || error_code_ != FileErrorCode::kOK)
return nullptr;
DOMArrayBuffer* result = DOMArrayBuffer::Create(raw_data_->ToArrayBuffer());... | 122,522,782,558,913,250,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5786 | Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5786 |
164,767 | Chrome | ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | None | 0 | DOMArrayBuffer* FileReaderLoader::ArrayBufferResult() {
DCHECK_EQ(read_type_, kReadAsArrayBuffer);
if (array_buffer_result_)
return array_buffer_result_;
if (!raw_data_ || error_code_ != FileErrorCode::kOK)
return nullptr;
if (!finished_loading_) {
return DOMArrayBuffer::Create(
ArrayBu... | 116,395,866,476,641,250,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5786 | Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5786 |
7,722 | Chrome | fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | None | 1 | void ConfigureQuicParams(base::StringPiece quic_trial_group,
const VariationParameters& quic_trial_params,
bool is_quic_force_disabled,
bool is_quic_force_enabled,
const std::string& quic_user_agent_id,
... | 56,192,871,356,368,720,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2019-5754 | Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy. | https://nvd.nist.gov/vuln/detail/CVE-2019-5754 |
164,768 | Chrome | fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | None | 0 | void ConfigureQuicParams(base::StringPiece quic_trial_group,
const VariationParameters& quic_trial_params,
bool is_quic_force_disabled,
bool is_quic_force_enabled,
const std::string& quic_user_agent_id,
... | 282,955,031,997,550,550,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2019-5754 | Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy. | https://nvd.nist.gov/vuln/detail/CVE-2019-5754 |
7,723 | Chrome | 032c3339bfb454c65ce38e7eafe49a54bac83073 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/032c3339bfb454c65ce38e7eafe49a54bac83073 | None | 1 | bool SVGElement::HasSVGParent() const {
return ParentOrShadowHostElement() &&
ParentOrShadowHostElement()->IsSVGElement();
}
| 228,383,481,357,535,160,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2019-5757 | An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5757 |
164,769 | Chrome | 032c3339bfb454c65ce38e7eafe49a54bac83073 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/032c3339bfb454c65ce38e7eafe49a54bac83073 | None | 0 | bool SVGElement::HasSVGParent() const {
Element* parent = FlatTreeTraversal::ParentElement(*this);
return parent && parent->IsSVGElement();
}
| 165,900,516,782,268,100,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2019-5757 | An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5757 |
7,734 | Chrome | f045c704568e9cf6279b3cbccbec6d86c35f8a13 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f045c704568e9cf6279b3cbccbec6d86c35f8a13 | None | 1 | void FileSystemManagerImpl::CreateWriter(const GURL& file_path,
CreateWriterCallback callback) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
FileSystemURL url(context_->CrackURL(file_path));
base::Optional<base::File::Error> opt_error = ValidateFileSystemURL(url);
if ... | 220,704,916,600,868,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-5755 | Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5755 |
164,780 | Chrome | f045c704568e9cf6279b3cbccbec6d86c35f8a13 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f045c704568e9cf6279b3cbccbec6d86c35f8a13 | None | 0 | void FileSystemManagerImpl::CreateWriter(const GURL& file_path,
CreateWriterCallback callback) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
if (!base::FeatureList::IsEnabled(blink::features::kWritableFilesAPI)) {
bindings_.ReportBadMessage("FileSystemManager.CreateWrite... | 6,158,478,206,498,632,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-5755 | Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5755 |
7,770 | Chrome | 2f01a0cb03732fdb982dd42786d95736322d2241 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f01a0cb03732fdb982dd42786d95736322d2241 | None | 1 | bool SetExtendedFileAttribute(const char* path,
const char* name,
const char* value,
size_t value_size,
int flags) {
//// On Chrome OS, there is no component that can validate these extended
//// a... | 277,230,499,082,888,640,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-20073 | Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2018-20073 |
164,812 | Chrome | 2f01a0cb03732fdb982dd42786d95736322d2241 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f01a0cb03732fdb982dd42786d95736322d2241 | None | 0 | bool SetExtendedFileAttribute(const char* path,
const char* name,
const char* value,
size_t value_size,
int flags) {
//// On Chrome OS, there is no component that can validate these extended
//// a... | 261,562,080,479,758,000,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-20073 | Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2018-20073 |
7,792 | Chrome | 01b42e2bc2aac531b17596729ae4e5c223ae7124 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01b42e2bc2aac531b17596729ae4e5c223ae7124 | None | 1 | bool Performance::PassesTimingAllowCheck(
const ResourceResponse& response,
const SecurityOrigin& initiator_security_origin,
const AtomicString& original_timing_allow_origin,
ExecutionContext* context) {
scoped_refptr<const SecurityOrigin> resource_origin =
SecurityOrigin::Create(response.Ur... | 294,339,990,149,396,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6159 | Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6159 |
164,831 | Chrome | 01b42e2bc2aac531b17596729ae4e5c223ae7124 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01b42e2bc2aac531b17596729ae4e5c223ae7124 | None | 0 | bool Performance::PassesTimingAllowCheck(
const ResourceResponse& response,
const SecurityOrigin& initiator_security_origin,
const AtomicString& original_timing_allow_origin,
ExecutionContext* context) {
const KURL& response_url = response.WasFetchedViaServiceWorker()
... | 214,600,105,527,766,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6159 | Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6159 |
7,804 | Chrome | 303d78445257d1eec726c4ebadb3517cb16c8c09 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/303d78445257d1eec726c4ebadb3517cb16c8c09 | None | 1 | ExtensionInstallDialogView::ExtensionInstallDialogView(
Profile* profile,
content::PageNavigator* navigator,
const ExtensionInstallPrompt::DoneCallback& done_callback,
std::unique_ptr<ExtensionInstallPrompt::Prompt> prompt)
: profile_(profile),
navigator_(navigator),
done_callback_(done_... | 15,427,734,945,482,778,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6169 | Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6169 |
164,841 | Chrome | 303d78445257d1eec726c4ebadb3517cb16c8c09 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/303d78445257d1eec726c4ebadb3517cb16c8c09 | None | 0 | ExtensionInstallDialogView::ExtensionInstallDialogView(
Profile* profile,
content::PageNavigator* navigator,
const ExtensionInstallPrompt::DoneCallback& done_callback,
std::unique_ptr<ExtensionInstallPrompt::Prompt> prompt)
: profile_(profile),
navigator_(navigator),
done_callback_(done_... | 278,237,250,685,188,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6169 | Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6169 |
7,805 | Chrome | c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | None | 1 | ExtensionFunction::ResponseAction BluetoothSocketSendFunction::Run() {
DCHECK_CURRENTLY_ON(work_thread_id());
auto params = bluetooth_socket::Send::Params::Create(*args_);
EXTENSION_FUNCTION_VALIDATE(params.get());
io_buffer_size_ = params->data.size();
io_buffer_ = new net::WrappedIOBuffer(params->data... | 71,558,336,532,325,010,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6171 | Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6171 |
164,842 | Chrome | c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | None | 0 | ExtensionFunction::ResponseAction BluetoothSocketSendFunction::Run() {
DCHECK_CURRENTLY_ON(work_thread_id());
params_ = bluetooth_socket::Send::Params::Create(*args_);
EXTENSION_FUNCTION_VALIDATE(params_.get());
io_buffer_size_ = params_->data.size();
io_buffer_ = new net::WrappedIOBuffer(params_->data.... | 60,971,347,990,160,150,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6171 | Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6171 |
7,810 | Chrome | fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | None | 1 | ConfirmInfoBar::ConfirmInfoBar(std::unique_ptr<ConfirmInfoBarDelegate> delegate)
: InfoBarView(std::move(delegate)) {
auto* delegate_ptr = GetDelegate();
label_ = CreateLabel(delegate_ptr->GetMessageText());
AddChildView(label_);
const auto buttons = delegate_ptr->GetButtons();
if (buttons & Confir... | 181,759,325,539,671,600,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2018-6178 | Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6178 |
164,846 | Chrome | fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | None | 0 | ConfirmInfoBar::ConfirmInfoBar(std::unique_ptr<ConfirmInfoBarDelegate> delegate)
: InfoBarView(std::move(delegate)) {
auto* delegate_ptr = GetDelegate();
label_ = CreateLabel(delegate_ptr->GetMessageText());
label_->SetElideBehavior(delegate_ptr->GetMessageElideBehavior());
AddChildView(label_);
co... | 49,261,403,653,780,230,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2018-6178 | Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6178 |
7,811 | Chrome | a62f913109fc1566230f5963bbf69ee65274ebc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a62f913109fc1566230f5963bbf69ee65274ebc8 | None | 1 | void FetchManager::Loader::Start() {
if (!ContentSecurityPolicy::ShouldBypassMainWorld(execution_context_) &&
!execution_context_->GetContentSecurityPolicy()->AllowConnectToSource(
fetch_request_data_->Url())) {
PerformNetworkError(
"Refused to connect to '" + fetch_request_data_->Url... | 57,058,051,067,850,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-4117 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to... | https://nvd.nist.gov/vuln/detail/CVE-2018-4117 |
164,847 | Chrome | a62f913109fc1566230f5963bbf69ee65274ebc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a62f913109fc1566230f5963bbf69ee65274ebc8 | None | 0 | void FetchManager::Loader::Start() {
if (!ContentSecurityPolicy::ShouldBypassMainWorld(execution_context_) &&
!execution_context_->GetContentSecurityPolicy()->AllowConnectToSource(
fetch_request_data_->Url())) {
PerformNetworkError(
"Refused to connect to '" + fetch_request_data_->Url... | 109,946,393,790,897,940,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-4117 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to... | https://nvd.nist.gov/vuln/detail/CVE-2018-4117 |
7,826 | Chrome | ca1156974cbe707fd023a00ae62104528833a44e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ca1156974cbe707fd023a00ae62104528833a44e | None | 1 | void BaseAudioContext::Initialize() {
if (IsDestinationInitialized())
return;
FFTFrame::Initialize();
audio_worklet_ = AudioWorklet::Create(this);
if (destination_node_) {
destination_node_->Handler().Initialize();
listener_ = AudioListener::Create(*this);
}
}
| 142,671,235,725,804,310,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-16067 | A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16067 |
164,861 | Chrome | ca1156974cbe707fd023a00ae62104528833a44e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ca1156974cbe707fd023a00ae62104528833a44e | None | 0 | void BaseAudioContext::Initialize() {
if (IsDestinationInitialized())
return;
FFTFrame::Initialize();
audio_worklet_ = AudioWorklet::Create(this);
if (destination_node_) {
destination_node_->Handler().Initialize();
// TODO(crbug.com/863951). The audio thread needs some things from the
// ... | 159,979,418,332,630,380,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-16067 | A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16067 |
7,834 | Chrome | b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | None | 1 | GURL SiteInstance::GetSiteForURL(BrowserContext* browser_context,
const GURL& real_url) {
if (real_url.SchemeIs(kGuestScheme))
return real_url;
GURL url = SiteInstanceImpl::GetEffectiveURL(browser_context, real_url);
url::Origin origin = url::Origin::Create(url);
auto* pol... | 339,629,888,976,962,300,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16074 | Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16074 |
164,869 | Chrome | b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | None | 0 | GURL SiteInstance::GetSiteForURL(BrowserContext* browser_context,
const GURL& real_url) {
if (real_url.SchemeIs(kGuestScheme))
return real_url;
GURL url = SiteInstanceImpl::GetEffectiveURL(browser_context, real_url);
url::Origin origin = url::Origin::Create(url);
auto* pol... | 272,437,081,338,562,200,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16074 | Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16074 |
7,855 | Chrome | 7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | None | 1 | bool PlatformFontSkia::InitDefaultFont() {
if (g_default_font.Get())
return true;
bool success = false;
std::string family = kFallbackFontFamilyName;
int size_pixels = 12;
int style = Font::NORMAL;
Font::Weight weight = Font::Weight::NORMAL;
FontRenderParams params;
const SkiaFontDelegate* d... | 66,618,136,481,925,500,000,000,000,000,000,000,000 | None | null | [
"CWE-862"
] | CVE-2018-16081 | Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16081 |
164,889 | Chrome | 7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | None | 0 | bool PlatformFontSkia::InitDefaultFont() {
if (g_default_font.Get())
return true;
bool success = false;
std::string family = kFallbackFontFamilyName;
int size_pixels = PlatformFont::kDefaultBaseFontSize;
int style = Font::NORMAL;
Font::Weight weight = Font::Weight::NORMAL;
FontRenderParams para... | 295,136,513,857,590,340,000,000,000,000,000,000,000 | None | null | [
"CWE-862"
] | CVE-2018-16081 | Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16081 |
7,856 | Chrome | 8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | None | 1 | bool RendererPermissionsPolicyDelegate::IsRestrictedUrl(
const GURL& document_url,
std::string* error) {
if (dispatcher_->IsExtensionActive(kWebStoreAppId)) {
if (error)
*error = errors::kCannotScriptGallery;
return true;
}
if (SearchBouncer::GetInstance()->IsNewTabPage(document_url)) {
... | 264,227,214,820,471,740,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16086 | Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16086 |
164,890 | Chrome | 8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | None | 0 | bool RendererPermissionsPolicyDelegate::IsRestrictedUrl(
const GURL& document_url,
std::string* error) {
if (dispatcher_->IsExtensionActive(kWebStoreAppId)) {
if (error)
*error = errors::kCannotScriptGallery;
return true;
}
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
... | 303,800,586,969,396,400,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16086 | Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16086 |
7,893 | Chrome | a79e1bbb765af34d446e42d34cd00a312b381113 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a79e1bbb765af34d446e42d34cd00a312b381113 | None | 1 | void OnSuggestionModelAdded(UiScene* scene,
UiBrowserInterface* browser,
Model* model,
SuggestionBinding* element_binding) {
auto icon = base::MakeUnique<VectorIcon>(100);
icon->SetDrawPhase(kPhaseForeground);
icon->SetType(kTypeO... | 88,426,719,643,275,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6132 | Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6132 |
164,927 | Chrome | a79e1bbb765af34d446e42d34cd00a312b381113 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a79e1bbb765af34d446e42d34cd00a312b381113 | None | 0 | void OnSuggestionModelAdded(UiScene* scene,
UiBrowserInterface* browser,
Model* model,
SuggestionBinding* element_binding) {
auto icon = base::MakeUnique<VectorIcon>(100);
icon->SetDrawPhase(kPhaseForeground);
icon->SetType(kTypeO... | 152,686,728,102,335,660,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6132 | Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6132 |
7,897 | Chrome | 87e204e0aaf7445afbd0d50af6849d857517ae70 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/87e204e0aaf7445afbd0d50af6849d857517ae70 | None | 1 | PerformanceNavigationTiming::PerformanceNavigationTiming(
LocalFrame* frame,
ResourceTimingInfo* info,
TimeTicks time_origin,
const WebVector<WebServerTimingInfo>& server_timing)
: PerformanceResourceTiming(info ? info->InitialURL().GetString() : "",
"navigation",
... | 278,483,109,287,912,960,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6134 | Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6134 |
164,931 | Chrome | 87e204e0aaf7445afbd0d50af6849d857517ae70 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/87e204e0aaf7445afbd0d50af6849d857517ae70 | None | 0 | PerformanceNavigationTiming::PerformanceNavigationTiming(
LocalFrame* frame,
ResourceTimingInfo* info,
TimeTicks time_origin,
const WebVector<WebServerTimingInfo>& server_timing)
: PerformanceResourceTiming(
info ? info->FinalResponse().Url().GetString() : "",
"navigation",
... | 12,998,418,145,307,020,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6134 | Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6134 |
7,899 | Chrome | 67d9b414fa64448abc398ae9fc57c3ddf5de5998 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/67d9b414fa64448abc398ae9fc57c3ddf5de5998 | None | 1 | scoped_refptr<Image> CSSPaintValue::GetImage(
const ImageResourceObserver& client,
const Document& document,
const ComputedStyle&,
const FloatSize& target_size) {
if (!generator_) {
generator_ = CSSPaintImageGenerator::Create(
GetName(), document, paint_image_generator_observer_);
... | 134,061,584,196,077,550,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6137 | CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6137 |
164,933 | Chrome | 67d9b414fa64448abc398ae9fc57c3ddf5de5998 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/67d9b414fa64448abc398ae9fc57c3ddf5de5998 | None | 0 | scoped_refptr<Image> CSSPaintValue::GetImage(
const ImageResourceObserver& client,
const Document& document,
const ComputedStyle& style,
const FloatSize& target_size) {
// https://crbug.com/835589: early exit when paint target is associated with
// a link.
if (style.InsideLink() != EInsideLink... | 162,866,934,285,981,360,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6137 | CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6137 |
7,907 | Chrome | 46f5cfb6414c04b65cba4ec59ca992f338934fc9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/46f5cfb6414c04b65cba4ec59ca992f338934fc9 | None | 1 | bool RenderFrameDevToolsAgentHost::AttachSession(DevToolsSession* session) {
if (session->restricted() && !IsFrameHostAllowedForRestrictedSessions())
return false;
session->SetRenderer(frame_host_ ? frame_host_->GetProcess()->GetID()
: ChildProcessHost::kInvalidUniqueID,
... | 228,237,655,791,597,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6139 | Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6139 |
164,939 | Chrome | 46f5cfb6414c04b65cba4ec59ca992f338934fc9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/46f5cfb6414c04b65cba4ec59ca992f338934fc9 | None | 0 | bool RenderFrameDevToolsAgentHost::AttachSession(DevToolsSession* session) {
if (session->restricted() && !IsFrameHostAllowedForRestrictedSessions())
return false;
session->SetRenderer(frame_host_ ? frame_host_->GetProcess()->GetID()
: ChildProcessHost::kInvalidUniqueID,
... | 232,517,845,629,054,040,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6139 | Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6139 |
7,924 | Chrome | 1f35b6980f600ec93e167118c21959d5cbd7c5c4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1f35b6980f600ec93e167118c21959d5cbd7c5c4 | None | 1 | void CredentialManagerImpl::OnProvisionalSaveComplete() {
DCHECK(form_manager_);
DCHECK(client_->IsSavingAndFillingEnabledForCurrentPage());
const autofill::PasswordForm& form = form_manager_->pending_credentials();
if (form_manager_->IsPendingCredentialsPublicSuffixMatch()) {
form_manager_->Save();
re... | 23,707,503,991,766,110,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-6143 | Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6143 |
164,951 | Chrome | 1f35b6980f600ec93e167118c21959d5cbd7c5c4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1f35b6980f600ec93e167118c21959d5cbd7c5c4 | None | 0 | void CredentialManagerImpl::OnProvisionalSaveComplete() {
DCHECK(form_manager_);
DCHECK(client_->IsSavingAndFillingEnabledForCurrentPage());
const autofill::PasswordForm& form = form_manager_->pending_credentials();
if (form_manager_->IsPendingCredentialsPublicSuffixMatch()) {
form_manager_->Save();
re... | 143,340,219,511,106,740,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-6143 | Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6143 |
7,927 | Chrome | 7614790c80996d32a28218f4d1605b0908e9ddf6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7614790c80996d32a28218f4d1605b0908e9ddf6 | None | 1 | ExtensionNavigationThrottle::WillStartOrRedirectRequest() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
content::WebContents* web_contents = navigation_handle()->GetWebContents();
ExtensionRegistry* registry =
ExtensionRegistry::Get(web_contents->GetBrowserContext());
const GURL& url = navigation_ha... | 332,886,639,999,288,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6121 | Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6121 |
164,954 | Chrome | 7614790c80996d32a28218f4d1605b0908e9ddf6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7614790c80996d32a28218f4d1605b0908e9ddf6 | None | 0 | ExtensionNavigationThrottle::WillStartOrRedirectRequest() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
content::WebContents* web_contents = navigation_handle()->GetWebContents();
ExtensionRegistry* registry =
ExtensionRegistry::Get(web_contents->GetBrowserContext());
const GURL& url = navigation_ha... | 168,708,147,920,641,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6121 | Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6121 |
7,938 | Chrome | 75b803b1c81ed9fa5513cbff550232b4fb915e7b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/75b803b1c81ed9fa5513cbff550232b4fb915e7b | None | 1 | v8::Local<v8::Value> ModuleSystem::RequireForJsInner(
v8::Local<v8::String> module_name) {
v8::EscapableHandleScope handle_scope(GetIsolate());
v8::Local<v8::Context> v8_context = context()->v8_context();
v8::Context::Scope context_scope(v8_context);
v8::Local<v8::Object> global(context()->v8_context()->Gl... | 271,380,316,653,586,500,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1672 | The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1672 |
164,965 | Chrome | 75b803b1c81ed9fa5513cbff550232b4fb915e7b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/75b803b1c81ed9fa5513cbff550232b4fb915e7b | None | 0 | v8::Local<v8::Value> ModuleSystem::RequireForJsInner(
v8::Local<v8::String> module_name) {
v8::EscapableHandleScope handle_scope(GetIsolate());
v8::Local<v8::Context> v8_context = context()->v8_context();
v8::Context::Scope context_scope(v8_context);
v8::Local<v8::Object> global(context()->v8_context()->Gl... | 294,452,821,671,627,000,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1672 | The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1672 |
7,952 | Chrome | 5289a5d4c98681e9a0f2d28da0c7aa35e282db57 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5289a5d4c98681e9a0f2d28da0c7aa35e282db57 | None | 1 | void ServiceWorkerContainer::registerServiceWorkerImpl(ExecutionContext* executionContext, const KURL& rawScriptURL, const KURL& scope, PassOwnPtr<RegistrationCallbacks> callbacks)
{
if (!m_provider) {
callbacks->onError(WebServiceWorkerError(WebServiceWorkerError::ErrorTypeState, "Failed to register a Serv... | 8,127,412,112,075,770,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1682 | The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration. | https://nvd.nist.gov/vuln/detail/CVE-2016-1682 |
164,978 | Chrome | 5289a5d4c98681e9a0f2d28da0c7aa35e282db57 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5289a5d4c98681e9a0f2d28da0c7aa35e282db57 | None | 0 | void ServiceWorkerContainer::registerServiceWorkerImpl(ExecutionContext* executionContext, const KURL& rawScriptURL, const KURL& scope, PassOwnPtr<RegistrationCallbacks> callbacks)
{
if (!m_provider) {
callbacks->onError(WebServiceWorkerError(WebServiceWorkerError::ErrorTypeState, "Failed to register a Serv... | 17,420,054,180,367,720,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1682 | The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration. | https://nvd.nist.gov/vuln/detail/CVE-2016-1682 |
7,993 | Chrome | e3e16497d0d5639fb3257305ea369ba4ab8ba210 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e3e16497d0d5639fb3257305ea369ba4ab8ba210 | None | 1 | void InputConnectionImpl::CommitText(const base::string16& text,
int new_cursor_pos) {
StartStateUpdateTimer();
std::string error;
if (!ime_engine_->ClearComposition(input_context_id_, &error))
LOG(ERROR) << "ClearComposition failed: error=\"" << error << "\"";
if (IsC... | 305,688,989,729,893,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1686 | The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1686 |
165,019 | Chrome | e3e16497d0d5639fb3257305ea369ba4ab8ba210 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e3e16497d0d5639fb3257305ea369ba4ab8ba210 | None | 0 | void InputConnectionImpl::CommitText(const base::string16& text,
int new_cursor_pos) {
StartStateUpdateTimer();
std::string error;
if (!ime_engine_->ClearComposition(input_context_id_, &error))
LOG(ERROR) << "ClearComposition failed: error=\"" << error << "\"";
if (IsC... | 29,242,553,751,134,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1686 | The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1686 |
8,000 | Android | e68cbc3e9e66df4231e70efa3e9c41abc12aea20 | None | https://android.googlesource.com/platform/frameworks/native/+/e68cbc3e9e66df4231e70efa3e9c41abc12aea20 | None | 1 | status_t Parcel::appendFrom(const Parcel *parcel, size_t offset, size_t len)
{
const sp<ProcessState> proc(ProcessState::self());
status_t err;
const uint8_t *data = parcel->mData;
const binder_size_t *objects = parcel->mObjects;
size_t size = parcel->mObjectsSize;
int startPos = mDataPos;
int firstIndex = -1, l... | 51,133,333,841,899,130,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-3845 | The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 1731269... | https://nvd.nist.gov/vuln/detail/CVE-2015-3845 |
165,023 | Android | e68cbc3e9e66df4231e70efa3e9c41abc12aea20 | None | https://android.googlesource.com/platform/frameworks/native/+/e68cbc3e9e66df4231e70efa3e9c41abc12aea20 | None | 0 | status_t Parcel::appendFrom(const Parcel *parcel, size_t offset, size_t len)
{
const sp<ProcessState> proc(ProcessState::self());
status_t err;
const uint8_t *data = parcel->mData;
const binder_size_t *objects = parcel->mObjects;
size_t size = parcel->mObjectsSize;
int startPos = mDataPos;
int firstIndex = -1, l... | 208,409,965,600,761,860,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-3845 | The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 1731269... | https://nvd.nist.gov/vuln/detail/CVE-2015-3845 |
8,014 | Android | e999f077f6ef59d20282f1e04786816a31fb8be6 | None | https://android.googlesource.com/platform/external/sonivox/+/e999f077f6ef59d20282f1e04786816a31fb8be6 | None | 1 | static EAS_RESULT Parse_wave (SDLS_SYNTHESIZER_DATA *pDLSData, EAS_I32 pos, EAS_U16 waveIndex)
{
EAS_RESULT result;
EAS_U32 temp;
EAS_I32 size;
EAS_I32 endChunk;
EAS_I32 chunkPos;
EAS_I32 wsmpPos = 0;
EAS_I32 fmtPos = 0;
EAS_I32 dataPos = 0;
EAS_I32 dataSize = 0;
S_WSMP_DATA *p;
... | 21,319,537,981,250,110,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3836 | The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted XMF data, aka internal... | https://nvd.nist.gov/vuln/detail/CVE-2015-3836 |
165,035 | Android | e999f077f6ef59d20282f1e04786816a31fb8be6 | None | https://android.googlesource.com/platform/external/sonivox/+/e999f077f6ef59d20282f1e04786816a31fb8be6 | None | 0 | static EAS_RESULT Parse_wave (SDLS_SYNTHESIZER_DATA *pDLSData, EAS_I32 pos, EAS_U16 waveIndex)
{
EAS_RESULT result;
EAS_U32 temp;
EAS_I32 size;
EAS_I32 endChunk;
EAS_I32 chunkPos;
EAS_I32 wsmpPos = 0;
EAS_I32 fmtPos = 0;
EAS_I32 dataPos = 0;
EAS_I32 dataSize = 0;
S_WSMP_DATA *p;
... | 34,491,048,108,805,140,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3836 | The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted XMF data, aka internal... | https://nvd.nist.gov/vuln/detail/CVE-2015-3836 |
8,019 | Android | c82e31a7039a03dca7b37c65b7890ba5c1e18ced | None | https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced | None | 1 | status_t BnHDCP::onTransact(
uint32_t code, const Parcel &data, Parcel *reply, uint32_t flags) {
switch (code) {
case HDCP_SET_OBSERVER:
{
CHECK_INTERFACE(IHDCP, data, reply);
sp<IHDCPObserver> observer =
interface_cast<IHDCPObserver>(data.readStrongBinder());
r... | 100,821,162,213,020,150,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3834 | Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application that uses HDCP encryption, leading to a heap-based buffer overflow, aka internal bug 20222489. | https://nvd.nist.gov/vuln/detail/CVE-2015-3834 |
165,040 | Android | c82e31a7039a03dca7b37c65b7890ba5c1e18ced | None | https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced | None | 0 | status_t BnHDCP::onTransact(
uint32_t code, const Parcel &data, Parcel *reply, uint32_t flags) {
switch (code) {
case HDCP_SET_OBSERVER:
{
CHECK_INTERFACE(IHDCP, data, reply);
sp<IHDCPObserver> observer =
interface_cast<IHDCPObserver>(data.readStrongBinder());
r... | 45,530,985,115,847,920,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3834 | Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application that uses HDCP encryption, leading to a heap-based buffer overflow, aka internal bug 20222489. | https://nvd.nist.gov/vuln/detail/CVE-2015-3834 |
8,023 | Android | 51504928746edff6c94a1c498cf99c0a83bedaed | None | https://android.googlesource.com/platform/frameworks/av/+/51504928746edff6c94a1c498cf99c0a83bedaed | None | 1 | virtual ssize_t readAt(off64_t offset, void *buffer, size_t size) {
Parcel data, reply;
data.writeInterfaceToken(
IMediaHTTPConnection::getInterfaceDescriptor());
data.writeInt64(offset);
data.writeInt32(size);
status_t err = remote()->transact(READ_AT, data, &reply);
if (err != OK) {
... | 23,993,132,887,243,497,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3831 | Buffer overflow in the readAt function in BpMediaHTTPConnection in media/libmedia/IMediaHTTPConnection.cpp in the mediaserver service in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 19400722. | https://nvd.nist.gov/vuln/detail/CVE-2015-3831 |
165,041 | Android | 51504928746edff6c94a1c498cf99c0a83bedaed | None | https://android.googlesource.com/platform/frameworks/av/+/51504928746edff6c94a1c498cf99c0a83bedaed | None | 0 | virtual ssize_t readAt(off64_t offset, void *buffer, size_t size) {
Parcel data, reply;
data.writeInterfaceToken(
IMediaHTTPConnection::getInterfaceDescriptor());
data.writeInt64(offset);
data.writeInt32(size);
status_t err = remote()->transact(READ_AT, data, &reply);
if (err != OK) {
... | 251,764,022,256,463,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3831 | Buffer overflow in the readAt function in BpMediaHTTPConnection in media/libmedia/IMediaHTTPConnection.cpp in the mediaserver service in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 19400722. | https://nvd.nist.gov/vuln/detail/CVE-2015-3831 |
8,028 | Android | 5e751957ba692658b7f67eb03ae5ddb2cd3d970c | None | https://android.googlesource.com/platform/frameworks/av/+/5e751957ba692658b7f67eb03ae5ddb2cd3d970c | None | 1 | status_t ESDS::parseESDescriptor(size_t offset, size_t size) {
if (size < 3) {
return ERROR_MALFORMED;
}
offset += 2; // skip ES_ID
size -= 2;
unsigned streamDependenceFlag = mData[offset] & 0x80;
unsigned URL_Flag = mData[offset] & 0x40;
unsigned OCRstreamFlag = mData[offset] & 0x20;
++offset;
... | 251,778,599,478,684,270,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1539 | Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a related issue to CVE-2015-4493. | https://nvd.nist.gov/vuln/detail/CVE-2015-1539 |
165,042 | Android | 5e751957ba692658b7f67eb03ae5ddb2cd3d970c | None | https://android.googlesource.com/platform/frameworks/av/+/5e751957ba692658b7f67eb03ae5ddb2cd3d970c | None | 0 | status_t ESDS::parseESDescriptor(size_t offset, size_t size) {
if (size < 3) {
return ERROR_MALFORMED;
}
offset += 2; // skip ES_ID
size -= 2;
unsigned streamDependenceFlag = mData[offset] & 0x80;
unsigned URL_Flag = mData[offset] & 0x40;
unsigned OCRstreamFlag = mData[offset] & 0x20;
++offset;
... | 260,744,358,754,951,350,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1539 | Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a related issue to CVE-2015-4493. | https://nvd.nist.gov/vuln/detail/CVE-2015-1539 |
8,029 | Android | d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | None | https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | None | 1 | static jobject Bitmap_createFromParcel(JNIEnv* env, jobject, jobject parcel) {
if (parcel == NULL) {
SkDebugf("-------- unparcel parcel is NULL\n");
return NULL;
}
android::Parcel* p = android::parcelForJavaObject(env, parcel);
const bool isMutable = p->readInt32() != 0;
const SkColorType colorType =... | 104,165,536,811,189,070,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1536 | Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server memory-content information via a crafted application that leverages improper unmarshalling... | https://nvd.nist.gov/vuln/detail/CVE-2015-1536 |
165,043 | Android | d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | None | https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | None | 0 | static jobject Bitmap_createFromParcel(JNIEnv* env, jobject, jobject parcel) {
if (parcel == NULL) {
SkDebugf("-------- unparcel parcel is NULL\n");
return NULL;
}
android::Parcel* p = android::parcelForJavaObject(env, parcel);
const bool isMutable = p->readInt32() != 0;
const SkColorType colorType =... | 122,930,912,420,633,730,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1536 | Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server memory-content information via a crafted application that leverages improper unmarshalling... | https://nvd.nist.gov/vuln/detail/CVE-2015-1536 |
8,034 | Android | 89c03b3b9ff74a507a8b8334c50b08b334483556 | None | https://android.googlesource.com/platform/frameworks/av/+/89c03b3b9ff74a507a8b8334c50b08b334483556 | None | 1 | status_t SampleIterator::seekTo(uint32_t sampleIndex) {
ALOGV("seekTo(%d)", sampleIndex);
if (sampleIndex >= mTable->mNumSampleSizes) {
return ERROR_END_OF_STREAM;
}
if (mTable->mSampleToChunkOffset < 0
|| mTable->mChunkOffsetOffset < 0
|| mTable->mSampleSizeOffset < 0
|| mTable->mTimeToSampleCount == 0) {... | 115,645,474,102,852,160,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-6722 | An information disclosure vulnerability in libstagefright in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate becau... | https://nvd.nist.gov/vuln/detail/CVE-2016-6722 |
165,044 | Android | 89c03b3b9ff74a507a8b8334c50b08b334483556 | None | https://android.googlesource.com/platform/frameworks/av/+/89c03b3b9ff74a507a8b8334c50b08b334483556 | None | 0 | status_t SampleIterator::seekTo(uint32_t sampleIndex) {
ALOGV("seekTo(%d)", sampleIndex);
if (sampleIndex >= mTable->mNumSampleSizes) {
return ERROR_END_OF_STREAM;
}
if (mTable->mSampleToChunkOffset < 0
|| mTable->mChunkOffsetOffset < 0
|| mTable->mSampleSizeOffset < 0
|| mTable->mTimeToSampleCount == 0) {... | 267,587,265,394,064,330,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-6722 | An information disclosure vulnerability in libstagefright in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate becau... | https://nvd.nist.gov/vuln/detail/CVE-2016-6722 |
8,037 | Android | fdb1b40e7bb147c07bda988c9501ad223795d12d | None | https://android.googlesource.com/platform/external/libvpx/+/fdb1b40e7bb147c07bda988c9501ad223795d12d | None | 1 | int vp9_alloc_context_buffers(VP9_COMMON *cm, int width, int height) {
int new_mi_size;
vp9_set_mb_mi(cm, width, height);
new_mi_size = cm->mi_stride * calc_mi_size(cm->mi_rows);
if (cm->mi_alloc_size < new_mi_size) {
cm->free_mi(cm);
if (cm->alloc_mi(cm, new_mi_size))
goto fail;
}
if (cm->seg_map_alloc... | 3,857,975,046,340,091,300,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-6712 | A remote denial of service vulnerability in libvpx in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial ... | https://nvd.nist.gov/vuln/detail/CVE-2016-6712 |
165,047 | Android | fdb1b40e7bb147c07bda988c9501ad223795d12d | None | https://android.googlesource.com/platform/external/libvpx/+/fdb1b40e7bb147c07bda988c9501ad223795d12d | None | 0 | int vp9_alloc_context_buffers(VP9_COMMON *cm, int width, int height) {
int new_mi_size;
vp9_set_mb_mi(cm, width, height);
new_mi_size = cm->mi_stride * calc_mi_size(cm->mi_rows);
if (cm->mi_alloc_size < new_mi_size) {
cm->free_mi(cm);
if (cm->alloc_mi(cm, new_mi_size))
goto fail;
}
if (cm->seg_map_alloc... | 32,178,319,517,312,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-6712 | A remote denial of service vulnerability in libvpx in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial ... | https://nvd.nist.gov/vuln/detail/CVE-2016-6712 |
8,040 | Android | 3b1c9f692c4d4b7a683c2b358fc89e831a641b88 | None | https://android.googlesource.com/platform/frameworks/av/+/3b1c9f692c4d4b7a683c2b358fc89e831a641b88 | None | 1 | status_t MediaHTTP::connect(
const char *uri,
const KeyedVector<String8, String8> *headers,
off64_t /* offset */) {
if (mInitCheck != OK) {
return mInitCheck;
}
KeyedVector<String8, String8> extHeaders;
if (headers != NULL) {
extHeaders = *headers;
}
if (extHeaders.indexOfKey(String8("User-Agent")) ... | 46,246,661,838,968,125,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-6699 | A remote code execution vulnerability in libstagefright in Mediaserver in Android 7.0 before 2016-11-01 could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the con... | https://nvd.nist.gov/vuln/detail/CVE-2016-6699 |
165,050 | Android | 3b1c9f692c4d4b7a683c2b358fc89e831a641b88 | None | https://android.googlesource.com/platform/frameworks/av/+/3b1c9f692c4d4b7a683c2b358fc89e831a641b88 | None | 0 | status_t MediaHTTP::connect(
const char *uri,
const KeyedVector<String8, String8> *headers,
off64_t /* offset */) {
if (mInitCheck != OK) {
return mInitCheck;
}
KeyedVector<String8, String8> extHeaders;
if (headers != NULL) {
extHeaders = *headers;
}
if (extHeaders.indexOfKey(String8("User-Agent")) ... | 293,688,008,243,037,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-6699 | A remote code execution vulnerability in libstagefright in Mediaserver in Android 7.0 before 2016-11-01 could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the con... | https://nvd.nist.gov/vuln/detail/CVE-2016-6699 |
8,041 | Android | c894aa36be535886a8e5ff02cdbcd07dd24618f6 | None | https://android.googlesource.com/platform/frameworks/av/+/c894aa36be535886a8e5ff02cdbcd07dd24618f6 | None | 1 | status_t AudioFlinger::EffectModule::command(uint32_t cmdCode,
uint32_t cmdSize,
void *pCmdData,
uint32_t *replySize,
void *pReplyData)
{
Mutex::Autolock _l(mLock);
ALOGVV("command(), cmdCode: %d, mEffectInterface: %p", ... | 186,065,196,266,317,300,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-3924 | services/audioflinger/Effects.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 does not validate EFFECT_CMD_SET_PARAM and EFFECT_CMD_SET_PARAM_DEFERRED commands, which allows attackers to obtain sensitive information via a crafted a... | https://nvd.nist.gov/vuln/detail/CVE-2016-3924 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.