idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
184,817 | Chrome | 514f93279494ec4448b34a7aeeff27eccaae983f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/514f93279494ec4448b34a7aeeff27eccaae983f | None | 0 | bool DebugOnStart::FindArgument(wchar_t* command_line, const char* argument_c) {
wchar_t argument[50] = {};
for (int i = 0; argument_c[i]; ++i)
argument[i] = argument_c[i];
int argument_len = lstrlen(argument);
int command_line_len = lstrlen(command_line);
while (command_line_len > argument_len) {
... | 200,539,205,734,697,950,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-1301 | Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1301 |
9,784 | Chrome | ad103a1564365c95f4ee4f10261f9604f91f686a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a | None | 1 | bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format,
int width, int height,
bool init_to_zero) {
if (!IsImageDataFormatSupported(format))
return false; // Only support this one format for now.
if (width <= 0 || height <= 0)
return false;
... | 310,179,316,202,690,940,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2012-5143 | Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers. | https://nvd.nist.gov/vuln/detail/CVE-2012-5143 |
184,836 | Chrome | ad103a1564365c95f4ee4f10261f9604f91f686a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a | None | 0 | bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format,
int width, int height,
bool init_to_zero) {
if (!IsImageDataFormatSupported(format))
return false; // Only support this one format for now.
if (width <= 0 || height <= 0)
return false;
... | 318,862,062,253,316,400,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2012-5143 | Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers. | https://nvd.nist.gov/vuln/detail/CVE-2012-5143 |
9,815 | Chrome | 9939d35f9827ed0929646607cbdb071af627ac38 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9939d35f9827ed0929646607cbdb071af627ac38 | None | 1 | xsltCompileLocationPathPattern(xsltParserContextPtr ctxt, int novar) {
SKIP_BLANKS;
if ((CUR == '/') && (NXT(1) == '/')) {
/*
* since we reverse the query
* a leading // can be safely ignored
*/
NEXT;
NEXT;
ctxt->comp->priority = 0.5; /* '//' means not 0 priority */
xsltCompileRelativePathPattern(ctx... | 156,995,017,980,789,130,000,000,000,000,000,000,000 | pattern.c | 30,154,932,143,922,863,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-2870 | libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPath... | https://nvd.nist.gov/vuln/detail/CVE-2012-2870 |
184,865 | Chrome | 9939d35f9827ed0929646607cbdb071af627ac38 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9939d35f9827ed0929646607cbdb071af627ac38 | None | 0 | xsltCompileLocationPathPattern(xsltParserContextPtr ctxt, int novar) {
SKIP_BLANKS;
if ((CUR == '/') && (NXT(1) == '/')) {
/*
* since we reverse the query
* a leading // can be safely ignored
*/
NEXT;
NEXT;
ctxt->comp->priority = 0.5; /* '//' means not 0 priority */
xsltCompileRelativePathPattern(ctx... | 65,445,440,097,481,650,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2870 | libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPath... | https://nvd.nist.gov/vuln/detail/CVE-2012-2870 |
9,824 | Chrome | 9b9a9f33f0a26f40d083be85a539dd7963adfc9b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b9a9f33f0a26f40d083be85a539dd7963adfc9b | None | 1 | MediaStreamImpl::~MediaStreamImpl() {
DCHECK(!peer_connection_handler_);
if (dependency_factory_.get())
dependency_factory_->ReleasePeerConnectionFactory();
if (network_manager_) {
if (chrome_worker_thread_.IsRunning()) {
chrome_worker_thread_.message_loop()->PostTask(FROM_HERE, base::Bind(
... | 149,244,836,860,547,970,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2817 | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections. | https://nvd.nist.gov/vuln/detail/CVE-2012-2817 |
184,874 | Chrome | 9b9a9f33f0a26f40d083be85a539dd7963adfc9b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b9a9f33f0a26f40d083be85a539dd7963adfc9b | None | 0 | MediaStreamImpl::~MediaStreamImpl() {
DCHECK(!peer_connection_handler_);
if (dependency_factory_.get())
dependency_factory_->ReleasePeerConnectionFactory();
if (network_manager_) {
if (chrome_worker_thread_.IsRunning()) {
chrome_worker_thread_.message_loop()->PostTask(FROM_HERE, base::Bind(
... | 16,336,255,291,527,470,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2817 | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections. | https://nvd.nist.gov/vuln/detail/CVE-2012-2817 |
9,856 | Chrome | 4d77eed905ce1d00361282e8822a2a3be61d25c0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4d77eed905ce1d00361282e8822a2a3be61d25c0 | None | 1 | bool HTMLFormElement::prepareForSubmission(Event* event)
{
Frame* frame = document().frame();
if (m_isSubmittingOrPreparingForSubmission || !frame)
return m_isSubmittingOrPreparingForSubmission;
m_isSubmittingOrPreparingForSubmission = true;
m_shouldSubmit = false;
if (!validateIntera... | 82,440,017,099,070,620,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2927 | Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements. | https://nvd.nist.gov/vuln/detail/CVE-2013-2927 |
184,906 | Chrome | 4d77eed905ce1d00361282e8822a2a3be61d25c0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4d77eed905ce1d00361282e8822a2a3be61d25c0 | None | 0 | bool HTMLFormElement::prepareForSubmission(Event* event)
{
RefPtr<HTMLFormElement> protector(this);
Frame* frame = document().frame();
if (m_isSubmittingOrPreparingForSubmission || !frame)
return m_isSubmittingOrPreparingForSubmission;
m_isSubmittingOrPreparingForSubmission = true;
m_s... | 93,754,812,117,664,550,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2927 | Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements. | https://nvd.nist.gov/vuln/detail/CVE-2013-2927 |
9,857 | Chrome | c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | None | 1 | void RenderThreadImpl::Shutdown() {
FOR_EACH_OBSERVER(
RenderProcessObserver, observers_, OnRenderProcessShutdown());
ChildThread::Shutdown();
if (memory_observer_) {
message_loop()->RemoveTaskObserver(memory_observer_.get());
memory_observer_.reset();
}
if (webkit_platform_support_) {
... | 237,606,688,755,037,100,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c... | https://nvd.nist.gov/vuln/detail/CVE-2013-2906 |
184,907 | Chrome | c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | None | 0 | void RenderThreadImpl::Shutdown() {
FOR_EACH_OBSERVER(
RenderProcessObserver, observers_, OnRenderProcessShutdown());
ChildThread::Shutdown();
if (memory_observer_) {
message_loop()->RemoveTaskObserver(memory_observer_.get());
memory_observer_.reset();
}
if (webkit_platform_support_) {
... | 162,300,092,109,170,800,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c... | https://nvd.nist.gov/vuln/detail/CVE-2013-2906 |
9,858 | Chrome | 5b998565255a504887c6d2e90d11001a00c9d6da | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5b998565255a504887c6d2e90d11001a00c9d6da | None | 1 | ExtensionBookmarksTest()
: client_(NULL), model_(NULL), node_(NULL), folder_(NULL) {}
| 155,261,079,591,022,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2913 | Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document. | https://nvd.nist.gov/vuln/detail/CVE-2013-2913 |
184,908 | Chrome | 5b998565255a504887c6d2e90d11001a00c9d6da | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5b998565255a504887c6d2e90d11001a00c9d6da | None | 0 | ExtensionBookmarksTest()
| 156,773,453,156,468,330,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2913 | Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document. | https://nvd.nist.gov/vuln/detail/CVE-2013-2913 |
9,884 | Chrome | 0a57375ad73780e61e1770a9d88b0529b0dbd33b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b | None | 1 | WebNavigationPolicy RenderViewImpl::decidePolicyForNavigation(
WebFrame* frame, const WebURLRequest& request, WebNavigationType type,
const WebNode&, WebNavigationPolicy default_policy, bool is_redirect) {
if (request.url() != GURL(kSwappedOutURL) &&
GetContentClient()->renderer()->HandleNavigation(fram... | 270,273,416,564,137,120,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0918 | Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0918 |
184,932 | Chrome | 0a57375ad73780e61e1770a9d88b0529b0dbd33b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b | None | 0 | WebNavigationPolicy RenderViewImpl::decidePolicyForNavigation(
WebFrame* frame, const WebURLRequest& request, WebNavigationType type,
const WebNode&, WebNavigationPolicy default_policy, bool is_redirect) {
if (request.url() != GURL(kSwappedOutURL) &&
GetContentClient()->renderer()->HandleNavigation(fram... | 275,625,445,309,191,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0918 | Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0918 |
9,888 | Chrome | 85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | None | 1 | void TabSpecificContentSettings::OnContentBlocked(
ContentSettingsType type,
const std::string& resource_identifier) {
DCHECK(type != CONTENT_SETTINGS_TYPE_GEOLOCATION)
<< "Geolocation settings handled by OnGeolocationPermissionSet";
content_accessed_[type] = true;
std::string identifier;
if (... | 49,248,163,557,894,240,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0841 | Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0841 |
184,936 | Chrome | 85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | None | 0 | void TabSpecificContentSettings::OnContentBlocked(
ContentSettingsType type,
const std::string& resource_identifier) {
DCHECK(type != CONTENT_SETTINGS_TYPE_GEOLOCATION)
<< "Geolocation settings handled by OnGeolocationPermissionSet";
if (type < 0 || type >= CONTENT_SETTINGS_NUM_TYPES)
return;
... | 267,172,561,251,828,800,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0841 | Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0841 |
9,889 | Chrome | f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | None | 1 | bool WebRtcAudioRenderer::Initialize(WebRtcAudioRendererSource* source) {
base::AutoLock auto_lock(lock_);
DCHECK_EQ(state_, UNINITIALIZED);
DCHECK(source);
DCHECK(!sink_);
DCHECK(!source_);
sink_ = AudioDeviceFactory::NewOutputDevice();
DCHECK(sink_);
int sample_rate = GetAudioOutputSampleRate();
D... | 158,651,565,407,137,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0843 | content/renderer/media/webrtc_audio_renderer.cc in Google Chrome before 24.0.1312.56 on Mac OS X does not use an appropriate buffer size for the 96 kHz sampling rate, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a web ... | https://nvd.nist.gov/vuln/detail/CVE-2013-0843 |
184,937 | Chrome | f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | None | 0 | bool WebRtcAudioRenderer::Initialize(WebRtcAudioRendererSource* source) {
base::AutoLock auto_lock(lock_);
DCHECK_EQ(state_, UNINITIALIZED);
DCHECK(source);
DCHECK(!sink_);
DCHECK(!source_);
sink_ = AudioDeviceFactory::NewOutputDevice();
DCHECK(sink_);
int sample_rate = GetAudioOutputSampleRate();
D... | 121,415,379,684,960,490,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0843 | content/renderer/media/webrtc_audio_renderer.cc in Google Chrome before 24.0.1312.56 on Mac OS X does not use an appropriate buffer size for the 96 kHz sampling rate, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a web ... | https://nvd.nist.gov/vuln/detail/CVE-2013-0843 |
9,901 | Chrome | 137458c8680c51fe9d3984ded2ef50a45a667b8b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/137458c8680c51fe9d3984ded2ef50a45a667b8b | None | 1 | bool DoTouchScroll(const gfx::Point& point,
const gfx::Vector2d& distance,
bool wait_until_scrolled) {
EXPECT_EQ(0, GetScrollTop());
int scrollHeight = ExecuteScriptAndExtractInt(
"document.documentElement.scrollHeight");
EXPECT_EQ(1200, scrollHeight);
... | 328,679,834,534,134,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7903 | Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image. | https://nvd.nist.gov/vuln/detail/CVE-2014-7903 |
184,949 | Chrome | 137458c8680c51fe9d3984ded2ef50a45a667b8b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/137458c8680c51fe9d3984ded2ef50a45a667b8b | None | 0 | bool DoTouchScroll(const gfx::Point& point,
const gfx::Vector2d& distance,
bool wait_until_scrolled) {
EXPECT_EQ(0, GetScrollTop());
int scrollHeight = ExecuteScriptAndExtractInt(
"document.documentElement.scrollHeight");
EXPECT_EQ(1200, scrollHeight);
... | 226,150,079,611,267,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7903 | Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image. | https://nvd.nist.gov/vuln/detail/CVE-2014-7903 |
9,903 | Chrome | b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | None | 1 | static bool CheckMov(const uint8* buffer, int buffer_size) {
RCHECK(buffer_size > 8);
int offset = 0;
while (offset + 8 < buffer_size) {
int atomsize = Read32(buffer + offset);
uint32 atomtype = Read32(buffer + offset + 4);
switch (atomtype) {
case TAG('f','t','y','p'):
case TAG('p',... | 82,572,215,792,595,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7908 | Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7908 |
184,951 | Chrome | b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | None | 0 | static bool CheckMov(const uint8* buffer, int buffer_size) {
RCHECK(buffer_size > 8);
int offset = 0;
while (offset + 8 < buffer_size) {
uint32 atomsize = Read32(buffer + offset);
uint32 atomtype = Read32(buffer + offset + 4);
switch (atomtype) {
case TAG('f','t','y','p'):
case TAG('... | 96,388,809,046,961,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7908 | Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7908 |
9,912 | Chrome | 0b694217046d6b2bfa5814676e8615c18e6a45ff | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b694217046d6b2bfa5814676e8615c18e6a45ff | None | 1 | void SystemClipboard::WriteImage(Image* image,
const KURL& url,
const String& title) {
DCHECK(image);
PaintImage paint_image = image->PaintImageForCurrentFrame();
SkBitmap bitmap;
if (sk_sp<SkImage> sk_image = paint_image.GetSkImage())
sk_im... | 187,180,540,660,422,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3156 | Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard... | https://nvd.nist.gov/vuln/detail/CVE-2014-3156 |
184,960 | Chrome | 0b694217046d6b2bfa5814676e8615c18e6a45ff | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b694217046d6b2bfa5814676e8615c18e6a45ff | None | 0 | void SystemClipboard::WriteImage(Image* image,
const KURL& url,
const String& title) {
DCHECK(image);
PaintImage paint_image = image->PaintImageForCurrentFrame();
SkBitmap bitmap;
if (sk_sp<SkImage> sk_image = paint_image.GetSkImage())
sk_im... | 312,681,032,287,860,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3156 | Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard... | https://nvd.nist.gov/vuln/detail/CVE-2014-3156 |
9,937 | Chrome | f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | None | 1 | bool GetNetworkList(NetworkInterfaceList* networks, int policy) {
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s <= 0) {
PLOG(ERROR) << "socket";
return false;
}
uint32_t num_ifs = 0;
if (ioctl_netc_get_num_ifs(s, &num_ifs) < 0) {
PLOG(ERROR) << "ioctl_netc_get_num_ifs";
PCHECK(close(s) == 0);... | 249,454,725,959,250,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-6764 | The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impac... | https://nvd.nist.gov/vuln/detail/CVE-2015-6764 |
184,985 | Chrome | f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | None | 0 | bool GetNetworkList(NetworkInterfaceList* networks, int policy) {
IPAddress NetAddressToIPAddress(const netstack::NetAddress& addr) {
if (addr.ipv4) {
return IPAddress(addr.ipv4->addr.data(), addr.ipv4->addr.count());
}
if (addr.ipv6) {
return IPAddress(addr.ipv6->addr.data(), addr.ipv6->addr.count());
... | 272,553,924,910,865,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-6764 | The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impac... | https://nvd.nist.gov/vuln/detail/CVE-2015-6764 |
9,941 | Chrome | e1e0c4301aaa8228e362f2409dbde2d4d1896866 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e1e0c4301aaa8228e362f2409dbde2d4d1896866 | None | 1 | void Document::open()
{
ASSERT(!importLoader());
if (m_frame) {
if (ScriptableDocumentParser* parser = scriptableDocumentParser()) {
if (parser->isParsing()) {
if (parser->isExecutingScript())
return;
if (!parser->wasCreatedByScript() && ... | 33,649,530,546,418,673,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6782 | The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2015-6782 |
184,989 | Chrome | e1e0c4301aaa8228e362f2409dbde2d4d1896866 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e1e0c4301aaa8228e362f2409dbde2d4d1896866 | None | 0 | void Document::open()
{
ASSERT(!importLoader());
if (m_frame) {
if (ScriptableDocumentParser* parser = scriptableDocumentParser()) {
if (parser->isParsing()) {
if (parser->isExecutingScript())
return;
if (!parser->wasCreatedByScript() && ... | 251,712,596,827,305,220,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6782 | The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2015-6782 |
9,968 | Chrome | fc81fcf38edd250876cc384a6ed5567e1b2999e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc81fcf38edd250876cc384a6ed5567e1b2999e4 | None | 1 | void V8LazyEventListener::prepareListenerObject(ExecutionContext* executionContext)
{
if (!executionContext)
return;
v8::HandleScope handleScope(toIsolate(executionContext));
v8::Local<v8::Context> v8Context = toV8Context(executionContext, world());
if (v8Context.IsEmpty())
return;
... | 124,785,778,898,912,590,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1217 | The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2015-1217 |
185,016 | Chrome | fc81fcf38edd250876cc384a6ed5567e1b2999e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc81fcf38edd250876cc384a6ed5567e1b2999e4 | None | 0 | void V8LazyEventListener::prepareListenerObject(ExecutionContext* executionContext)
{
if (!executionContext)
return;
v8::HandleScope handleScope(toIsolate(executionContext));
v8::Local<v8::Context> v8Context = toV8Context(executionContext, world());
if (v8Context.IsEmpty())
return;
... | 171,705,154,288,949,950,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1217 | The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2015-1217 |
9,972 | Chrome | 5472db1c7eca35822219d03be5c817d9a9258c11 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5472db1c7eca35822219d03be5c817d9a9258c11 | None | 1 | void PaintLayerScrollableArea::UpdateCompositingLayersAfterScroll() {
PaintLayerCompositor* compositor = GetLayoutBox()->View()->Compositor();
if (!compositor->InCompositingMode())
return;
if (UsesCompositedScrolling()) {
DCHECK(Layer()->HasCompositedLayerMapping());
ScrollingCoordinator* scrolling... | 254,694,208,352,117,680,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5147 | Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-5147 |
185,020 | Chrome | 5472db1c7eca35822219d03be5c817d9a9258c11 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5472db1c7eca35822219d03be5c817d9a9258c11 | None | 0 | void PaintLayerScrollableArea::UpdateCompositingLayersAfterScroll() {
PaintLayerCompositor* compositor = GetLayoutBox()->View()->Compositor();
if (!compositor->InCompositingMode())
return;
if (UsesCompositedScrolling()) {
DCHECK(Layer()->HasCompositedLayerMapping());
ScrollingCoordinator* scrolling... | 147,086,886,053,235,660,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5147 | Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-5147 |
9,998 | Chrome | 7c5aa07be11cd63d953fbe66370c5869a52170bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c5aa07be11cd63d953fbe66370c5869a52170bf | None | 1 | std::string GetUploadData(const std::string& brand) {
DCHECK(!brand.empty());
std::string data(kPostXml);
const std::string placeholder("__BRANDCODE_PLACEHOLDER__");
size_t placeholder_pos = data.find(placeholder);
DCHECK(placeholder_pos != std::string::npos);
data.replace(placeholder_pos, placeholder.siz... | 208,654,258,749,662,370,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-1652 | Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-1652 |
185,046 | Chrome | 7c5aa07be11cd63d953fbe66370c5869a52170bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c5aa07be11cd63d953fbe66370c5869a52170bf | None | 0 | std::string GetUploadData(const std::string& brand) {
std::string app_id(kDefaultAppID);
#if defined(OS_WIN)
app_id = install_static::UTF16ToUTF8(install_static::GetAppGuid());
#endif // defined(OS_WIN)
DCHECK(!brand.empty());
return base::StringPrintf(kPostXml, app_id.c_str(), brand.c_str());
}
| 151,896,745,740,394,500,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-1652 | Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-1652 |
10,007 | Chrome | 48a13696977c4bd082341ac85d942128ba2638e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/48a13696977c4bd082341ac85d942128ba2638e4 | None | 1 | const service_manager::Manifest& GetChromeContentBrowserOverlayManifest() {
static base::NoDestructor<service_manager::Manifest> manifest {
service_manager::ManifestBuilder()
.ExposeCapability("gpu",
service_manager::Manifest::InterfaceList<
metrics:... | 173,432,205,096,925,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5110 | Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5110 |
185,055 | Chrome | 48a13696977c4bd082341ac85d942128ba2638e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/48a13696977c4bd082341ac85d942128ba2638e4 | None | 0 | const service_manager::Manifest& GetChromeContentBrowserOverlayManifest() {
static base::NoDestructor<service_manager::Manifest> manifest {
service_manager::ManifestBuilder()
.ExposeCapability("gpu",
service_manager::Manifest::InterfaceList<
metrics:... | 199,865,085,034,589,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5110 | Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5110 |
10,008 | Chrome | ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 331,452,579,950,378,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5086 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5086 |
185,056 | Chrome | ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | None | 0 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 27,588,666,680,895,794,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5086 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5086 |
10,041 | Chrome | 7da6c3419fd172405bcece1ae4ec6ec8316cd345 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7da6c3419fd172405bcece1ae4ec6ec8316cd345 | None | 1 | void RenderWidgetHostImpl::DidNavigate(uint32_t next_source_id) {
current_content_source_id_ = next_source_id;
did_receive_first_frame_after_navigation_ = false;
if (enable_surface_synchronization_) {
visual_properties_ack_pending_ = false;
viz::LocalSurfaceId old_surface_id = view_->GetLocalSurfaceId()... | 179,967,799,219,761,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17467 | Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17467 |
185,087 | Chrome | 7da6c3419fd172405bcece1ae4ec6ec8316cd345 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7da6c3419fd172405bcece1ae4ec6ec8316cd345 | None | 0 | void RenderWidgetHostImpl::DidNavigate(uint32_t next_source_id) {
current_content_source_id_ = next_source_id;
did_receive_first_frame_after_navigation_ = false;
if (enable_surface_synchronization_) {
visual_properties_ack_pending_ = false;
if (view_)
view_->DidNavigate();
} else {
if (la... | 226,730,376,119,314,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17467 | Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17467 |
10,044 | Chrome | e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | None | 1 | void MimeHandlerViewContainer::OnReady() {
if (!render_frame() || !is_embedded_)
return;
blink::WebLocalFrame* frame = render_frame()->GetWebFrame();
blink::WebAssociatedURLLoaderOptions options;
DCHECK(!loader_);
loader_.reset(frame->CreateAssociatedURLLoader(options));
blink::WebURLRequest request... | 136,943,128,534,837,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6089 | A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6089 |
185,090 | Chrome | e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | None | 0 | void MimeHandlerViewContainer::OnReady() {
if (!render_frame() || !is_embedded_)
return;
blink::WebLocalFrame* frame = render_frame()->GetWebFrame();
blink::WebAssociatedURLLoaderOptions options;
DCHECK(!loader_);
loader_.reset(frame->CreateAssociatedURLLoader(options));
blink::WebURLRequest request... | 228,866,619,255,488,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6089 | A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6089 |
10,057 | Chrome | e56aee6473486fdfac0429747284fda7cdd3aae5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e56aee6473486fdfac0429747284fda7cdd3aae5 | None | 1 | void ImageLoader::DoUpdateFromElement(BypassMainWorldBehavior bypass_behavior,
UpdateFromElementBehavior update_behavior,
const KURL& url,
ReferrerPolicy referrer_policy,
... | 101,908,932,034,635,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6114 | Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6114 |
185,099 | Chrome | e56aee6473486fdfac0429747284fda7cdd3aae5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e56aee6473486fdfac0429747284fda7cdd3aae5 | None | 0 | void ImageLoader::DoUpdateFromElement(BypassMainWorldBehavior bypass_behavior,
UpdateFromElementBehavior update_behavior,
const KURL& url,
ReferrerPolicy referrer_policy,
... | 221,517,846,296,424,040,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6114 | Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6114 |
10,067 | Chrome | 9d81094d7b0bfc8be6bba2f5084e790677e527c8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d81094d7b0bfc8be6bba2f5084e790677e527c8 | None | 1 | ProfilingProcessHost::Mode ProfilingProcessHost::GetCurrentMode() {
const base::CommandLine* cmdline = base::CommandLine::ForCurrentProcess();
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
if (cmdline->HasSwitch(switches::kMemlog) ||
base::FeatureList::IsEnabled(kOOPHeapProfilingFeature)) {
if (cmdline->HasSwitch(swi... | 46,622,500,276,925,110,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-15411 | Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-15411 |
185,110 | Chrome | 9d81094d7b0bfc8be6bba2f5084e790677e527c8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d81094d7b0bfc8be6bba2f5084e790677e527c8 | None | 0 | ProfilingProcessHost::Mode ProfilingProcessHost::GetCurrentMode() {
const base::CommandLine* cmdline = base::CommandLine::ForCurrentProcess();
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
if (cmdline->HasSwitch(switches::kMemlog) ||
base::FeatureList::IsEnabled(kOOPHeapProfilingFeature)) {
if (cmdline->HasSwitch(swi... | 41,782,381,066,019,450,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-15411 | Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-15411 |
10,079 | Chrome | cfb022640b5eec337b06f88a485487dc92ca1ac1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cfb022640b5eec337b06f88a485487dc92ca1ac1 | None | 1 | void MediaStreamDispatcherHost::DoOpenDevice(
int32_t page_request_id,
const std::string& device_id,
blink::MediaStreamType type,
OpenDeviceCallback callback,
MediaDeviceSaltAndOrigin salt_and_origin) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
if (!MediaStreamManager::IsOriginAllowed(render_proce... | 16,333,236,676,002,740,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-5824 | Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5824 |
185,122 | Chrome | cfb022640b5eec337b06f88a485487dc92ca1ac1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cfb022640b5eec337b06f88a485487dc92ca1ac1 | None | 0 | void MediaStreamDispatcherHost::DoOpenDevice(
int32_t page_request_id,
const std::string& device_id,
blink::MediaStreamType type,
OpenDeviceCallback callback,
MediaDeviceSaltAndOrigin salt_and_origin) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
if (!MediaStreamManager::IsOriginAllowed(render_proce... | 183,612,039,891,775,650,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-5824 | Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5824 |
10,086 | Chrome | 56b512399a5c2221ba4812f5170f3f8dc352cd74 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/56b512399a5c2221ba4812f5170f3f8dc352cd74 | None | 1 | void NavigationRequest::OnRequestRedirected(
const net::RedirectInfo& redirect_info,
const scoped_refptr<network::ResourceResponse>& response) {
response_ = response;
ssl_info_ = response->head.ssl_info;
#if defined(OS_ANDROID)
base::WeakPtr<NavigationRequest> this_ptr(weak_factory_.GetWeakPtr());
bool... | 215,499,437,441,416,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5794 | Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5794 |
185,128 | Chrome | 56b512399a5c2221ba4812f5170f3f8dc352cd74 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/56b512399a5c2221ba4812f5170f3f8dc352cd74 | None | 0 | void NavigationRequest::OnRequestRedirected(
const net::RedirectInfo& redirect_info,
const scoped_refptr<network::ResourceResponse>& response) {
response_ = response;
ssl_info_ = response->head.ssl_info;
#if defined(OS_ANDROID)
base::WeakPtr<NavigationRequest> this_ptr(weak_factory_.GetWeakPtr());
bool... | 10,093,742,297,545,974,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5794 | Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5794 |
10,093 | Chrome | af38308b7112bdfbc0cfcc27f966314accc471d0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/af38308b7112bdfbc0cfcc27f966314accc471d0 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 204,381,263,566,259,550,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5775 | Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2019-5775 |
185,134 | Chrome | af38308b7112bdfbc0cfcc27f966314accc471d0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/af38308b7112bdfbc0cfcc27f966314accc471d0 | None | 0 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 25,503,097,910,400,883,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5775 | Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2019-5775 |
10,095 | Chrome | 0328261c41b1b7495e1d4d4cf958f41a08aff38b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0328261c41b1b7495e1d4d4cf958f41a08aff38b | None | 1 | bool BrowserCommandController::ExecuteCommandWithDisposition(
int id, WindowOpenDisposition disposition) {
if (!SupportsCommand(id) || !IsCommandEnabled(id))
return false;
if (browser_->tab_strip_model()->active_index() == TabStripModel::kNoTab)
return true;
DCHECK(command_updater_.IsCommandEnabled(... | 331,955,434,778,726,970,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5780 | Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events. | https://nvd.nist.gov/vuln/detail/CVE-2019-5780 |
185,135 | Chrome | 0328261c41b1b7495e1d4d4cf958f41a08aff38b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0328261c41b1b7495e1d4d4cf958f41a08aff38b | None | 0 | bool BrowserCommandController::ExecuteCommandWithDisposition(
int id, WindowOpenDisposition disposition) {
if (!SupportsCommand(id) || !IsCommandEnabled(id))
return false;
if (browser_->tab_strip_model()->active_index() == TabStripModel::kNoTab)
return true;
DCHECK(command_updater_.IsCommandEnabled(... | 316,521,169,799,423,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5780 | Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events. | https://nvd.nist.gov/vuln/detail/CVE-2019-5780 |
10,116 | Chrome | b276d0570cc816bfe25b431f2ee9bc265a6ad478 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b276d0570cc816bfe25b431f2ee9bc265a6ad478 | None | 1 | std::string TestURLLoader::TestUntendedLoad() {
pp::URLRequestInfo request(instance_);
request.SetURL("test_url_loader_data/hello.txt");
request.SetRecordDownloadProgress(true);
TestCompletionCallback callback(instance_->pp_instance(), callback_type());
pp::URLLoader loader(instance_);
callback.WaitForResu... | 59,372,771,345,167,270,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1675 | Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2016-1675 |
185,154 | Chrome | b276d0570cc816bfe25b431f2ee9bc265a6ad478 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b276d0570cc816bfe25b431f2ee9bc265a6ad478 | None | 0 | std::string TestURLLoader::TestUntendedLoad() {
pp::URLRequestInfo request(instance_);
request.SetURL("test_url_loader_data/hello.txt");
request.SetRecordDownloadProgress(true);
TestCompletionCallback callback(instance_->pp_instance(), callback_type());
pp::URLLoader loader(instance_);
callback.WaitForResu... | 26,342,260,794,598,460,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1675 | Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2016-1675 |
10,125 | Android | 6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968 | None | https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968 | None | 1 | status_t MPEG4Extractor::parseChunk(off64_t *offset, int depth) {
ALOGV("entering parseChunk %lld/%d", *offset, depth);
uint32_t hdr[2];
if (mDataSource->readAt(*offset, hdr, 8) < 8) {
return ERROR_IO;
}
uint64_t chunk_size = ntohl(hdr[0]);
uint32_t chunk_type = ntohl(hdr[1]);
off64_t data_offset = *offset +... | 36,800,442,274,222,180,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3864 | Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2... | https://nvd.nist.gov/vuln/detail/CVE-2015-3864 |
185,163 | Android | 6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968 | None | https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968 | None | 0 | status_t MPEG4Extractor::parseChunk(off64_t *offset, int depth) {
ALOGV("entering parseChunk %lld/%d", *offset, depth);
uint32_t hdr[2];
if (mDataSource->readAt(*offset, hdr, 8) < 8) {
return ERROR_IO;
}
uint64_t chunk_size = ntohl(hdr[0]);
uint32_t chunk_type = ntohl(hdr[1]);
off64_t data_offset = *offset +... | 294,719,024,040,317,040,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-3864 | Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2... | https://nvd.nist.gov/vuln/detail/CVE-2015-3864 |
10,127 | Android | 2434839bbd168469f80dd9a22f1328bc81046398 | None | https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398 | None | 1 | status_t SampleTable::setSampleToChunkParams(
off64_t data_offset, size_t data_size) {
if (mSampleToChunkOffset >= 0) {
return ERROR_MALFORMED;
}
mSampleToChunkOffset = data_offset;
if (data_size < 8) {
return ERROR_MALFORMED;
}
uint8_t header[8];
if (mDataSource->readAt(
data_offset, he... | 257,356,045,235,322,370,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1538 | Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | https://nvd.nist.gov/vuln/detail/CVE-2015-1538 |
185,164 | Android | 2434839bbd168469f80dd9a22f1328bc81046398 | None | https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398 | None | 0 | status_t SampleTable::setSampleToChunkParams(
off64_t data_offset, size_t data_size) {
if (mSampleToChunkOffset >= 0) {
return ERROR_MALFORMED;
}
mSampleToChunkOffset = data_offset;
if (data_size < 8) {
return ERROR_MALFORMED;
}
uint8_t header[8];
if (mDataSource->readAt(
data_offset, he... | 237,927,794,663,070,930,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1538 | Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | https://nvd.nist.gov/vuln/detail/CVE-2015-1538 |
10,128 | Android | 38803268570f90e97452cd9a30ac831661829091 | None | https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091 | None | 1 | status_t GraphicBuffer::unflatten(
void const*& buffer, size_t& size, int const*& fds, size_t& count) {
if (size < 8*sizeof(int)) return NO_MEMORY;
int const* buf = static_cast<int const*>(buffer);
if (buf[0] != 'GBFR') return BAD_TYPE;
const size_t numFds = buf[8];
const size_t numInts = buf[9];
... | 340,179,419,665,331,340,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1474 | Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values. | https://nvd.nist.gov/vuln/detail/CVE-2015-1474 |
185,165 | Android | 38803268570f90e97452cd9a30ac831661829091 | None | https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091 | None | 0 | status_t GraphicBuffer::unflatten(
void const*& buffer, size_t& size, int const*& fds, size_t& count) {
if (size < 8*sizeof(int)) return NO_MEMORY;
int const* buf = static_cast<int const*>(buffer);
if (buf[0] != 'GBFR') return BAD_TYPE;
const size_t numFds = buf[8];
const size_t numInts = buf[9];
... | 252,873,766,568,007,960,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-1474 | Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values. | https://nvd.nist.gov/vuln/detail/CVE-2015-1474 |
10,168 | Android | a583270e1c96d307469c83dc42bd3c5f1b9ef63f | None | https://android.googlesource.com/platform/external/libavc/+/a583270e1c96d307469c83dc42bd3c5f1b9ef63f | None | 1 | WORD32 ih264d_process_intra_mb(dec_struct_t * ps_dec,
dec_mb_info_t * ps_cur_mb_info,
UWORD8 u1_mb_num)
{
UWORD8 u1_mb_type = ps_cur_mb_info->u1_mb_type;
UWORD8 uc_temp = ps_cur_mb_info->u1_mb_ngbr_availablity;
UWORD8 u1_top_available = BOOLEAN(uc_temp & TOP_MB_AVAILABLE_MASK... | 83,408,354,466,152,660,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-3742 | decoder/ih264d_process_intra_mb.c in mediaserver in Android 6.x before 2016-07-01 mishandles intra mode, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28165659. | https://nvd.nist.gov/vuln/detail/CVE-2016-3742 |
185,202 | Android | a583270e1c96d307469c83dc42bd3c5f1b9ef63f | None | https://android.googlesource.com/platform/external/libavc/+/a583270e1c96d307469c83dc42bd3c5f1b9ef63f | None | 0 | WORD32 ih264d_process_intra_mb(dec_struct_t * ps_dec,
dec_mb_info_t * ps_cur_mb_info,
UWORD8 u1_mb_num)
{
UWORD8 u1_mb_type = ps_cur_mb_info->u1_mb_type;
UWORD8 uc_temp = ps_cur_mb_info->u1_mb_ngbr_availablity;
UWORD8 u1_top_available = BOOLEAN(uc_temp & TOP_MB_AVAILABLE_MASK... | 127,619,695,752,148,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-3742 | decoder/ih264d_process_intra_mb.c in mediaserver in Android 6.x before 2016-07-01 mishandles intra mode, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28165659. | https://nvd.nist.gov/vuln/detail/CVE-2016-3742 |
10,169 | Android | e248db02fbab2ee9162940bc19f087fd7d96cb9d | None | https://android.googlesource.com/platform/frameworks/av/+/e248db02fbab2ee9162940bc19f087fd7d96cb9d | None | 1 | status_t DRMSource::read(MediaBuffer **buffer, const ReadOptions *options) {
Mutex::Autolock autoLock(mDRMLock);
status_t err;
if ((err = mOriginalMediaSource->read(buffer, options)) != OK) {
return err;
}
size_t len = (*buffer)->range_length();
char *src = (char *)(*buffer)->data() + (*buffer)->range_offset()... | 317,110,456,785,772,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2506 | DRMExtractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate a certain offset value, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, ak... | https://nvd.nist.gov/vuln/detail/CVE-2016-2506 |
185,203 | Android | e248db02fbab2ee9162940bc19f087fd7d96cb9d | None | https://android.googlesource.com/platform/frameworks/av/+/e248db02fbab2ee9162940bc19f087fd7d96cb9d | None | 0 | status_t DRMSource::read(MediaBuffer **buffer, const ReadOptions *options) {
Mutex::Autolock autoLock(mDRMLock);
status_t err;
if ((err = mOriginalMediaSource->read(buffer, options)) != OK) {
return err;
}
size_t len = (*buffer)->range_length();
char *src = (char *)(*buffer)->data() + (*buffer)->range_offset()... | 62,440,969,443,711,090,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2506 | DRMExtractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate a certain offset value, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, ak... | https://nvd.nist.gov/vuln/detail/CVE-2016-2506 |
10,185 | Android | a2d1d85726aa2a3126e9c331a8e00a8c319c9e2b | None | https://android.googlesource.com/platform/frameworks/av/+/a2d1d85726aa2a3126e9c331a8e00a8c319c9e2b | None | 1 | ssize_t NuPlayer::NuPlayerStreamListener::read(
void *data, size_t size, sp<AMessage> *extra) {
CHECK_GT(size, 0u);
extra->clear();
Mutex::Autolock autoLock(mLock);
if (mEOS) {
return 0;
}
if (mQueue.empty()) {
mSendDataNotification = true;
return -EWOULDBLOCK;
}
QueueEntry *entry = &*mQu... | 3,147,867,885,793,062,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-2448 | media/libmediaplayerservice/nuplayer/NuPlayerStreamListener.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not properly validate entry data structures, which allows attackers to gain privileges via a crafted application, as demonstrated by obtainin... | https://nvd.nist.gov/vuln/detail/CVE-2016-2448 |
185,211 | Android | a2d1d85726aa2a3126e9c331a8e00a8c319c9e2b | None | https://android.googlesource.com/platform/frameworks/av/+/a2d1d85726aa2a3126e9c331a8e00a8c319c9e2b | None | 0 | ssize_t NuPlayer::NuPlayerStreamListener::read(
void *data, size_t size, sp<AMessage> *extra) {
CHECK_GT(size, 0u);
extra->clear();
Mutex::Autolock autoLock(mLock);
if (mEOS) {
return 0;
}
if (mQueue.empty()) {
mSendDataNotification = true;
return -EWOULDBLOCK;
}
QueueEntry *entry = &*mQu... | 206,041,574,279,074,960,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-2448 | media/libmediaplayerservice/nuplayer/NuPlayerStreamListener.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not properly validate entry data structures, which allows attackers to gain privileges via a crafted application, as demonstrated by obtainin... | https://nvd.nist.gov/vuln/detail/CVE-2016-2448 |
10,186 | Android | ad54cfed4516292654c997910839153264ae00a0 | None | https://android.googlesource.com/platform/system/core/+/ad54cfed4516292654c997910839153264ae00a0 | None | 1 | std::string Backtrace::GetFunctionName(uintptr_t pc, uintptr_t* offset) {
std::string func_name = GetFunctionNameRaw(pc, offset);
if (!func_name.empty()) {
#if defined(__APPLE__)
if (func_name[0] != '_') {
return func_name;
}
#endif
char* name = __cxa_demangle(func_name.c_str(), 0, 0, 0);
if... | 70,660,019,768,018,670,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-2430 | libbacktrace/Backtrace.cpp in debuggerd in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to gain privileges via an application containing a crafted symbol name, aka internal bug 27299236. | https://nvd.nist.gov/vuln/detail/CVE-2016-2430 |
185,212 | Android | ad54cfed4516292654c997910839153264ae00a0 | None | https://android.googlesource.com/platform/system/core/+/ad54cfed4516292654c997910839153264ae00a0 | None | 0 | std::string Backtrace::GetFunctionName(uintptr_t pc, uintptr_t* offset) {
std::string func_name = GetFunctionNameRaw(pc, offset);
return func_name;
}
| 316,889,346,664,368,070,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-2430 | libbacktrace/Backtrace.cpp in debuggerd in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to gain privileges via an application containing a crafted symbol name, aka internal bug 27299236. | https://nvd.nist.gov/vuln/detail/CVE-2016-2430 |
10,194 | Android | d834160d9759f1098df692b34e6eeb548f9e317b | None | https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692b34e6eeb548f9e317b | None | 1 | OMX_ERRORTYPE SimpleSoftOMXComponent::useBuffer(
OMX_BUFFERHEADERTYPE **header,
OMX_U32 portIndex,
OMX_PTR appPrivate,
OMX_U32 size,
OMX_U8 *ptr) {
Mutex::Autolock autoLock(mLock);
CHECK_LT(portIndex, mPorts.size());
*header = new OMX_BUFFERHEADERTYPE;
(*he... | 242,578,536,736,749,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-0817 | An information disclosure vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63522430. | https://nvd.nist.gov/vuln/detail/CVE-2017-0817 |
185,219 | Android | d834160d9759f1098df692b34e6eeb548f9e317b | None | https://android.googlesource.com/platform/frameworks/av/+/d834160d9759f1098df692b34e6eeb548f9e317b | None | 0 | OMX_ERRORTYPE SimpleSoftOMXComponent::useBuffer(
OMX_BUFFERHEADERTYPE **header,
OMX_U32 portIndex,
OMX_PTR appPrivate,
OMX_U32 size,
OMX_U8 *ptr) {
Mutex::Autolock autoLock(mLock);
CHECK_LT(portIndex, mPorts.size());
PortInfo *port = &mPorts.editItemAt(portIndex)... | 239,695,224,633,021,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-0817 | An information disclosure vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63522430. | https://nvd.nist.gov/vuln/detail/CVE-2017-0817 |
10,196 | Android | 552a3b5df2a6876d10da20f72e4cc0d44ac2c790 | None | https://android.googlesource.com/platform/frameworks/av/+/552a3b5df2a6876d10da20f72e4cc0d44ac2c790 | None | 1 | sp<ABuffer> decodeBase64(const AString &s) {
size_t n = s.size();
if ((n % 4) != 0) {
return NULL;
}
size_t padding = 0;
if (n >= 1 && s.c_str()[n - 1] == '=') {
padding = 1;
if (n >= 2 && s.c_str()[n - 2] == '=') {
padding = 2;
if (n >= 3 && s.c_str()[n - 3] == '=') {
pad... | 307,431,912,424,634,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-0809 | A remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62673128. | https://nvd.nist.gov/vuln/detail/CVE-2017-0809 |
185,220 | Android | 552a3b5df2a6876d10da20f72e4cc0d44ac2c790 | None | https://android.googlesource.com/platform/frameworks/av/+/552a3b5df2a6876d10da20f72e4cc0d44ac2c790 | None | 0 | sp<ABuffer> decodeBase64(const AString &s) {
size_t n = s.size();
if ((n % 4) != 0) {
return NULL;
}
size_t padding = 0;
if (n >= 1 && s.c_str()[n - 1] == '=') {
padding = 1;
if (n >= 2 && s.c_str()[n - 2] == '=') {
padding = 2;
if (n >= 3 && s.c_str()[n - 3] == '=') {
pad... | 11,830,313,940,481,348,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-0809 | A remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62673128. | https://nvd.nist.gov/vuln/detail/CVE-2017-0809 |
10,205 | Android | b9096dc | None | https://android.googlesource.com/platform/frameworks/av/+/b9096dc | None | 1 | status_t BnSoundTriggerHwService::onTransact(
uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags)
{
switch(code) {
case LIST_MODULES: {
CHECK_INTERFACE(ISoundTriggerHwService, data, reply);
unsigned int numModulesReq = data.readInt32();
unsigned int numMo... | 192,776,366,035,545,800,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-1529 | Integer overflow in soundtrigger/ISoundTriggerHwService.cpp in Android allows attacks to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-1529 |
185,229 | Android | b9096dc | None | https://android.googlesource.com/platform/frameworks/av/+/b9096dc | None | 0 | status_t BnSoundTriggerHwService::onTransact(
uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags)
{
switch(code) {
case LIST_MODULES: {
CHECK_INTERFACE(ISoundTriggerHwService, data, reply);
unsigned int numModulesReq = data.readInt32();
if (numModulesReq >... | 259,596,940,933,616,530,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-1529 | Integer overflow in soundtrigger/ISoundTriggerHwService.cpp in Android allows attacks to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-1529 |
10,206 | Android | 931418b16c7197ca2df34c2a5609e49791125abe | None | https://android.googlesource.com/platform/system/netd/+/931418b16c7197ca2df34c2a5609e49791125abe | None | 1 | netdutils::Status XfrmController::ipSecSetEncapSocketOwner(const android::base::unique_fd& socket,
int newUid, uid_t callerUid) {
ALOGD("XfrmController:%s, line=%d", __FUNCTION__, __LINE__);
const int fd = socket.get();
struct stat info;
if (fstat(fd, &info)) {
return netdutils::statusFromErrno(errno, "Failed... | 130,669,169,359,316,210,000,000,000,000,000,000,000 | None | null | [
"CWE-909"
] | CVE-2018-9511 | In ipSecSetEncapSocketOwner of XfrmController.cpp, there is a possible failure to initialize a security feature due to uninitialized data. This could lead to local denial of service of IPsec on sockets with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Vers... | https://nvd.nist.gov/vuln/detail/CVE-2018-9511 |
185,230 | Android | 931418b16c7197ca2df34c2a5609e49791125abe | None | https://android.googlesource.com/platform/system/netd/+/931418b16c7197ca2df34c2a5609e49791125abe | None | 0 | netdutils::Status XfrmController::ipSecSetEncapSocketOwner(const android::base::unique_fd& socket,
int newUid, uid_t callerUid) {
ALOGD("XfrmController:%s, line=%d", __FUNCTION__, __LINE__);
const int fd = socket.get();
struct stat info;
if (fstat(fd, &info)) {
return netdutils::statusFromErrno(errno, "Failed... | 39,275,675,402,731,883,000,000,000,000,000,000,000 | None | null | [
"CWE-909"
] | CVE-2018-9511 | In ipSecSetEncapSocketOwner of XfrmController.cpp, there is a possible failure to initialize a security feature due to uninitialized data. This could lead to local denial of service of IPsec on sockets with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Vers... | https://nvd.nist.gov/vuln/detail/CVE-2018-9511 |
10,207 | Android | 830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 | None | https://android.googlesource.com/platform/system/bt/+/830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 | None | 1 | static void avrc_msg_cback(uint8_t handle, uint8_t label, uint8_t cr,
BT_HDR* p_pkt) {
uint8_t opcode;
tAVRC_MSG msg;
uint8_t* p_data;
uint8_t* p_begin;
bool drop = false;
bool do_free = true;
BT_HDR* p_rsp = NULL;
uint8_t* p_rsp_data;
int xx;
bool reject = false;
const char* p_d... | 236,312,995,652,713,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-9506 | In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 And... | https://nvd.nist.gov/vuln/detail/CVE-2018-9506 |
185,231 | Android | 830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 | None | https://android.googlesource.com/platform/system/bt/+/830cb39cb2a0f1bf6704d264e2a5c5029c175dd7 | None | 0 | static void avrc_msg_cback(uint8_t handle, uint8_t label, uint8_t cr,
BT_HDR* p_pkt) {
uint8_t opcode;
tAVRC_MSG msg;
uint8_t* p_data;
uint8_t* p_begin;
bool drop = false;
bool do_free = true;
BT_HDR* p_rsp = NULL;
uint8_t* p_rsp_data;
int xx;
bool reject = false;
const char* p_d... | 242,242,338,601,200,800,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-9506 | In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 And... | https://nvd.nist.gov/vuln/detail/CVE-2018-9506 |
10,209 | Android | 42cf02965b11c397dd37a0063e683cef005bc0ae | None | https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae | None | 1 | WORD32 ih264d_parse_sps(dec_struct_t *ps_dec, dec_bit_stream_t *ps_bitstrm)
{
UWORD8 i;
dec_seq_params_t *ps_seq = NULL;
UWORD8 u1_profile_idc, u1_level_idc, u1_seq_parameter_set_id;
UWORD16 i2_max_frm_num;
UWORD32 *pu4_bitstrm_buf = ps_bitstrm->pu4_buffer;
UWORD32 *pu4_bitstrm_ofst = &ps... | 152,275,460,707,939,230,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-13204 | An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380237. | https://nvd.nist.gov/vuln/detail/CVE-2017-13204 |
185,233 | Android | 42cf02965b11c397dd37a0063e683cef005bc0ae | None | https://android.googlesource.com/platform/external/libavc/+/42cf02965b11c397dd37a0063e683cef005bc0ae | None | 0 | WORD32 ih264d_parse_sps(dec_struct_t *ps_dec, dec_bit_stream_t *ps_bitstrm)
{
UWORD8 i;
dec_seq_params_t *ps_seq = NULL;
UWORD8 u1_profile_idc, u1_level_idc, u1_seq_parameter_set_id, u1_mb_aff_flag = 0;
UWORD16 i2_max_frm_num;
UWORD32 *pu4_bitstrm_buf = ps_bitstrm->pu4_buffer;
UWORD32 *pu... | 133,938,258,388,701,850,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-13204 | An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380237. | https://nvd.nist.gov/vuln/detail/CVE-2017-13204 |
10,259 | php | c1224573c773b6845e83505f717fbf820fc18415 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415 | None | 1 | static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */
{
/*
This is how the time string is formatted:
snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100,
ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec);
*/
time_t ret;
struct tm thetime;
char * strbuf;
... | 313,253,356,362,298,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-6420 | The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... | https://nvd.nist.gov/vuln/detail/CVE-2013-6420 |
194,590 | php | c1224573c773b6845e83505f717fbf820fc18415 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415 | None | 0 | static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */
{
/*
This is how the time string is formatted:
snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100,
ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec);
*/
time_t ret;
struct tm thetime;
char * strbuf;
... | 232,869,155,072,899,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-6420 | The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... | https://nvd.nist.gov/vuln/detail/CVE-2013-6420 |
10,260 | php | 1ddf72180a52d247db88ea42a3e35f824a8fbda1 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=1ddf72180a52d247db88ea42a3e35f824a8fbda1 | None | 1 | static php_stream *phar_make_dirstream(char *dir, HashTable *manifest TSRMLS_DC) /* {{{ */
{
HashTable *data;
int dirlen = strlen(dir);
phar_zstr key;
char *entry, *found, *save, *str_key;
uint keylen;
ulong unused;
ALLOC_HASHTABLE(data);
zend_hash_init(data, 64, zend_get_hash_value, NULL, 0);
if ((*dir == '... | 196,906,810,819,803,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-7804 | Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-7804 |
194,591 | php | 1ddf72180a52d247db88ea42a3e35f824a8fbda1 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=1ddf72180a52d247db88ea42a3e35f824a8fbda1 | None | 0 | static php_stream *phar_make_dirstream(char *dir, HashTable *manifest TSRMLS_DC) /* {{{ */
{
HashTable *data;
int dirlen = strlen(dir);
phar_zstr key;
char *entry, *found, *save, *str_key;
uint keylen;
ulong unused;
ALLOC_HASHTABLE(data);
zend_hash_init(data, 64, zend_get_hash_value, NULL, 0);
if ((*dir == '... | 320,716,089,711,288,250,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-7804 | Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-7804 |
10,261 | php | 1ddf72180a52d247db88ea42a3e35f824a8fbda2 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=1ddf72180a52d247db88ea42a3e35f824a8fbda1 | None | 1 | void phar_add_virtual_dirs(phar_archive_data *phar, char *filename, int filename_len TSRMLS_DC) /* {{{ */
{
const char *s;
while ((s = zend_memrchr(filename, '/', filename_len))) {
filename_len = s - filename;
if (FAILURE == zend_hash_add_empty_element(&phar->virtual_dirs, file... | 191,317,651,340,703,260,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-7804 | Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-7804 |
194,592 | php | 1ddf72180a52d247db88ea42a3e35f824a8fbda2 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=1ddf72180a52d247db88ea42a3e35f824a8fbda1 | None | 0 | void phar_add_virtual_dirs(phar_archive_data *phar, char *filename, int filename_len TSRMLS_DC) /* {{{ */
{
const char *s;
while ((s = zend_memrchr(filename, '/', filename_len))) {
filename_len = s - filename;
if (!filename_len || FAILURE == zend_hash_add_empty_element(&phar->v... | 126,121,217,362,549,980,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-7804 | Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-7804 |
10,263 | xcursor | 4794b5dd34688158fb51a2943032569d3780c4b8 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 | None | 1 | XcursorCommentCreate (XcursorUInt comment_type, int length)
{
XcursorComment *comment;
if (length > XCURSOR_COMMENT_MAX_LEN)
return NULL;
{
XcursorComment *comment;
if (length > XCURSOR_COMMENT_MAX_LEN)
return NULL;
comment = malloc (sizeof (XcursorComment) + length + 1);
comment->c... | 115,904,642,290,960,520,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-16612 | libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0. | https://nvd.nist.gov/vuln/detail/CVE-2017-16612 |
194,594 | xcursor | 4794b5dd34688158fb51a2943032569d3780c4b8 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 | None | 0 | XcursorCommentCreate (XcursorUInt comment_type, int length)
{
XcursorComment *comment;
if (length > XCURSOR_COMMENT_MAX_LEN)
return NULL;
{
XcursorComment *comment;
if (length < 0 || length > XCURSOR_COMMENT_MAX_LEN)
return NULL;
comment = malloc (sizeof (XcursorComment) + length + 1);
... | 22,517,343,770,094,463,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-16612 | libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0. | https://nvd.nist.gov/vuln/detail/CVE-2017-16612 |
10,264 | qemu | 1d20398694a3b67a388d955b7a945ba4aa90a8a8 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1d20398694a3b67a388d955b7a945ba4aa90a8a8 | 9p: fix QEMU crash when renaming files
When using the 9P2000.u version of the protocol, the following shell
command line in the guest can cause QEMU to crash:
while true; do rm -rf aa; mkdir -p a/b & touch a/b/c & mv a aa; done
With 9P2000.u, file renaming is handled by the WSTAT command. The
v9fs_wstat() functi... | 1 | static void coroutine_fn v9fs_wstat(void *opaque)
{
int32_t fid;
int err = 0;
int16_t unused;
V9fsStat v9stat;
size_t offset = 7;
struct stat stbuf;
V9fsFidState *fidp;
V9fsPDU *pdu = opaque;
v9fs_stat_init(&v9stat);
err = pdu_unmarshal(pdu, offset, "dwS", &fid, &unused, &... | 16,541,529,706,646,080,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2018-19489 | v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming. | https://nvd.nist.gov/vuln/detail/CVE-2018-19489 |
194,595 | qemu | 1d20398694a3b67a388d955b7a945ba4aa90a8a8 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1d20398694a3b67a388d955b7a945ba4aa90a8a8 | 9p: fix QEMU crash when renaming files
When using the 9P2000.u version of the protocol, the following shell
command line in the guest can cause QEMU to crash:
while true; do rm -rf aa; mkdir -p a/b & touch a/b/c & mv a aa; done
With 9P2000.u, file renaming is handled by the WSTAT command. The
v9fs_wstat() functi... | 0 | static void coroutine_fn v9fs_wstat(void *opaque)
{
int32_t fid;
int err = 0;
int16_t unused;
V9fsStat v9stat;
size_t offset = 7;
struct stat stbuf;
V9fsFidState *fidp;
V9fsPDU *pdu = opaque;
V9fsState *s = pdu->s;
v9fs_stat_init(&v9stat);
err = pdu_unmarshal(pdu, offs... | 328,112,657,912,858,870,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2018-19489 | v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming. | https://nvd.nist.gov/vuln/detail/CVE-2018-19489 |
10,269 | qemu | bfc56535f793c557aa754c50213fc5f882e6482d | https://github.com/bonzini/qemu | https://git.qemu.org/gitweb.cgi?p=qemu.git;a=commit;h=bfc56535f793c557aa754c50213fc5f882e6482d | vga: fix display update region calculation
vga display update mis-calculated the region for the dirty bitmap
snapshot in case the scanlines are padded. This can triggere an
assert in cpu_physical_memory_snapshot_get_dirty().
Fixes: fec5e8c92becad223df9d972770522f64aafdb72
Reported-by: Kevin Wolf <kwolf@redhat.com>
R... | 1 | static void vga_draw_graphic(VGACommonState *s, int full_update)
{
DisplaySurface *surface = qemu_console_surface(s->con);
int y1, y, update, linesize, y_start, double_scan, mask, depth;
int width, height, shift_control, line_offset, bwidth, bits;
ram_addr_t page0, page1;
DirtyBitmapSnapshot *snap =... | 248,065,639,524,337,940,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-13673 | The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function. | https://nvd.nist.gov/vuln/detail/CVE-2017-13673 |
194,600 | qemu | bfc56535f793c557aa754c50213fc5f882e6482d | https://github.com/bonzini/qemu | https://git.qemu.org/gitweb.cgi?p=qemu.git;a=commit;h=bfc56535f793c557aa754c50213fc5f882e6482d | vga: fix display update region calculation
vga display update mis-calculated the region for the dirty bitmap
snapshot in case the scanlines are padded. This can triggere an
assert in cpu_physical_memory_snapshot_get_dirty().
Fixes: fec5e8c92becad223df9d972770522f64aafdb72
Reported-by: Kevin Wolf <kwolf@redhat.com>
R... | 0 | static void vga_draw_graphic(VGACommonState *s, int full_update)
{
DisplaySurface *surface = qemu_console_surface(s->con);
int y1, y, update, linesize, y_start, double_scan, mask, depth;
int width, height, shift_control, line_offset, bwidth, bits;
ram_addr_t page0, page1;
DirtyBitmapSnapshot *snap =... | 314,124,518,506,787,970,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-13673 | The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function. | https://nvd.nist.gov/vuln/detail/CVE-2017-13673 |
10,273 | qemu | de594e47659029316bbf9391efb79da0a1a08e08 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08 | scsi: lsi: exit infinite loop while executing script (CVE-2019-12068)
When executing script in lsi_execute_script(), the LSI scsi adapter
emulator advances 's->dsp' index to read next opcode. This can lead
to an infinite loop if the next opcode is empty. Move the existing
loop exit after 10k iterations so that it cove... | 1 | static void lsi_execute_script(LSIState *s)
{
PCIDevice *pci_dev = PCI_DEVICE(s);
uint32_t insn;
uint32_t addr, addr_high;
int opcode;
int insn_processed = 0;
s->istat1 |= LSI_ISTAT1_SRUN;
again:
s->istat1 |= LSI_ISTAT1_SRUN;
again:
insn_processed++;
insn = read_dword(s, s->dsp... | 244,108,805,153,871,260,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2019-12068 | In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is emp... | https://nvd.nist.gov/vuln/detail/CVE-2019-12068 |
194,603 | qemu | de594e47659029316bbf9391efb79da0a1a08e08 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=de594e47659029316bbf9391efb79da0a1a08e08 | scsi: lsi: exit infinite loop while executing script (CVE-2019-12068)
When executing script in lsi_execute_script(), the LSI scsi adapter
emulator advances 's->dsp' index to read next opcode. This can lead
to an infinite loop if the next opcode is empty. Move the existing
loop exit after 10k iterations so that it cove... | 0 | static void lsi_execute_script(LSIState *s)
{
PCIDevice *pci_dev = PCI_DEVICE(s);
uint32_t insn;
uint32_t addr, addr_high;
int opcode;
int insn_processed = 0;
s->istat1 |= LSI_ISTAT1_SRUN;
again:
s->istat1 |= LSI_ISTAT1_SRUN;
again:
if (++insn_processed > LSI_MAX_INSN) {
/* ... | 236,061,065,339,146,800,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2019-12068 | In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is emp... | https://nvd.nist.gov/vuln/detail/CVE-2019-12068 |
10,274 | qemu | c689b4f1bac352dcfd6ecb9a1d45337de0f1de67 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c689b4f1bac352dcfd6ecb9a1d45337de0f1de67 | qga: set umask 0077 when daemonizing (CVE-2013-2007)
The qemu guest agent creates a bunch of files with insecure permissions
when started in daemon mode. For example:
-rw-rw-rw- 1 root root /var/log/qemu-ga.log
-rw-rw-rw- 1 root root /var/run/qga.state
-rw-rw-rw- 1 root root /var/log/qga-fsfreeze-hook.log
In a... | 1 | static void become_daemon(const char *pidfile)
{
#ifndef _WIN32
pid_t pid, sid;
pid = fork();
if (pid < 0) {
exit(EXIT_FAILURE);
}
if (pid > 0) {
exit(EXIT_SUCCESS);
}
if (pidfile) {
if (!ga_open_pidfile(pidfile)) {
g_critical("failed to create pidfile")... | 38,956,668,855,577,330,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-2007 | The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files. | https://nvd.nist.gov/vuln/detail/CVE-2013-2007 |
194,604 | qemu | c689b4f1bac352dcfd6ecb9a1d45337de0f1de67 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c689b4f1bac352dcfd6ecb9a1d45337de0f1de67 | qga: set umask 0077 when daemonizing (CVE-2013-2007)
The qemu guest agent creates a bunch of files with insecure permissions
when started in daemon mode. For example:
-rw-rw-rw- 1 root root /var/log/qemu-ga.log
-rw-rw-rw- 1 root root /var/run/qga.state
-rw-rw-rw- 1 root root /var/log/qga-fsfreeze-hook.log
In a... | 0 | static void become_daemon(const char *pidfile)
{
#ifndef _WIN32
pid_t pid, sid;
pid = fork();
if (pid < 0) {
exit(EXIT_FAILURE);
}
if (pid > 0) {
exit(EXIT_SUCCESS);
}
if (pidfile) {
if (!ga_open_pidfile(pidfile)) {
g_critical("failed to create pidfile")... | 213,282,018,139,193,340,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-2007 | The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files. | https://nvd.nist.gov/vuln/detail/CVE-2013-2007 |
10,275 | php | 188c196d4da60bdde9190d2fc532650d17f7af2d | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=188c196d4da60bdde9190d2fc532650d17f7af2d | None | 1 | xmlDocPtr soap_xmlParseFile(const char *filename TSRMLS_DC)
{
xmlParserCtxtPtr ctxt = NULL;
xmlDocPtr ret;
zend_bool old_allow_url_fopen;
/*
xmlInitParser();
*/
old_allow_url_fopen = PG(allow_url_fopen);
PG(allow_url_fopen) = 1;
ctxt = xmlCreateFileParserCtxt(filename);
PG(allow_url_fopen) = old_allow_... | 172,553,444,095,414,970,000,000,000,000,000,000,000 | php_xml.c | 183,773,485,480,076,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2013-1824 | The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory function... | https://nvd.nist.gov/vuln/detail/CVE-2013-1824 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.