idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6,804 | Chrome | 4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4c9b553ae124ed9bb60356e2ecff9106abddd0 | None | 1 | void RemoveActionCallback(const ActionCallback& callback) {
DCHECK(g_task_runner.Get());
DCHECK(g_task_runner.Get()->BelongsToCurrentThread());
std::vector<ActionCallback>* callbacks = g_callbacks.Pointer();
for (size_t i = 0; i < callbacks->size(); ++i) {
if ((*callbacks)[i].Equals(callback)) {
c... | 321,198,076,601,606,140,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5187 | Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5187 |
6,808 | Chrome | fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fa34e547d6ee25ea0692436ba7462ed0a0ef45f4 | None | 1 | base::string16 FormatBookmarkURLForDisplay(const GURL& url) {
return url_formatter::FormatUrl(
url, url_formatter::kFormatUrlOmitAll &
~url_formatter::kFormatUrlOmitUsernamePassword,
net::UnescapeRule::SPACES, nullptr, nullptr, nullptr);
}
| 148,653,877,527,532,850,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5191 | Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo a... | https://nvd.nist.gov/vuln/detail/CVE-2016-5191 |
6,874 | Chrome | dd77c2a41c72589d929db0592565125ca629fb2c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dd77c2a41c72589d929db0592565125ca629fb2c | None | 1 | int32_t PPB_Flash_MessageLoop_Impl::InternalRun(
const RunFromHostProxyCallback& callback) {
if (state_->run_called()) {
if (!callback.is_null())
callback.Run(PP_ERROR_FAILED);
return PP_ERROR_FAILED;
}
state_->set_run_called();
state_->set_run_callback(callback);
scoped_refptr<State> state... | 169,066,781,763,766,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2016-1631 | The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1631 |
6,931 | Chrome | 7f3d85b096f66870a15b37c2f40b219b2e292693 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7f3d85b096f66870a15b37c2f40b219b2e292693 | None | 1 | png_set_PLTE(png_structp png_ptr, png_infop info_ptr,
png_colorp palette, int num_palette)
{
png_debug1(1, "in %s storage function", "PLTE");
if (png_ptr == NULL || info_ptr == NULL)
return;
if (num_palette < 0 || num_palette > PNG_MAX_PALETTE_LENGTH)
{
if (info_ptr->color_type =... | 304,007,704,134,051,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ... | https://nvd.nist.gov/vuln/detail/CVE-2015-8126 |
6,979 | Chrome | 297ae873b471a46929ea39697b121c0b411434ee | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/297ae873b471a46929ea39697b121c0b411434ee | None | 1 | bool CustomButton::AcceleratorPressed(const ui::Accelerator& accelerator) {
SetState(STATE_NORMAL);
ui::MouseEvent synthetic_event(
ui::ET_MOUSE_RELEASED, gfx::Point(), gfx::Point(), ui::EventTimeForNow(),
ui::EF_LEFT_MOUSE_BUTTON, ui::EF_LEFT_MOUSE_BUTTON);
NotifyClick(synthetic_event);
return t... | 303,261,665,525,374,700,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1616 | The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button. | https://nvd.nist.gov/vuln/detail/CVE-2016-1616 |
6,980 | Chrome | 568075bbc5d16239a5cbdeb579a8768f9836f13e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/568075bbc5d16239a5cbdeb579a8768f9836f13e | None | 1 | bool CSPSource::schemeMatches(const KURL& url) const
{
if (m_scheme.isEmpty())
return m_policy->protocolMatchesSelf(url);
return equalIgnoringCase(url.protocol(), m_scheme);
}
| 197,561,278,237,525,340,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-1617 | The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attacker... | https://nvd.nist.gov/vuln/detail/CVE-2016-1617 |
6,981 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 1 | void TestingPlatformSupport::cryptographicallyRandomValues(unsigned char* buffer, size_t length)
{
}
| 135,052,527,899,353,880,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
6,998 | Chrome | 1948aefa8901dca0ccb993753fca00b15d2a6e25 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1948aefa8901dca0ccb993753fca00b15d2a6e25 | None | 1 | void FrameLoader::startLoad(FrameLoadRequest& frameLoadRequest, FrameLoadType type, NavigationPolicy navigationPolicy)
{
ASSERT(client()->hasWebView());
if (m_frame->document()->pageDismissalEventBeingDispatched() != Document::NoDismissal)
return;
NavigationType navigationType = determineNavigation... | 91,912,671,201,154,680,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-1697 | The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2016-1697 |
6,999 | Chrome | 5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5fb2548448bd1b76a59d941b729d7a7f90d53bc8 | None | 1 | v8::Local<v8::Object> V8SchemaRegistry::GetSchema(const std::string& api) {
if (schema_cache_ != NULL) {
v8::Local<v8::Object> cached_schema = schema_cache_->Get(api);
if (!cached_schema.IsEmpty()) {
return cached_schema;
}
}
v8::Isolate* isolate = v8::Isolate::GetCurrent();
v8::EscapableHan... | 312,257,934,248,800,170,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-1698 | The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition. | https://nvd.nist.gov/vuln/detail/CVE-2016-1698 |
7,010 | Chrome | 1af4fada49c4f3890f16daac31d38379a9d782b2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1af4fada49c4f3890f16daac31d38379a9d782b2 | None | 1 | void ResourceDispatcherHostImpl::BeginRequest(
int request_id,
const ResourceHostMsg_Request& request_data,
IPC::Message* sync_result, // only valid for sync
int route_id) {
int process_type = filter_->process_type();
int child_id = filter_->child_id();
if (IsBrowserSideNavigationEnabled() &... | 37,454,385,498,734,345,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2016-1670 | Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID. | https://nvd.nist.gov/vuln/detail/CVE-2016-1670 |
7,017 | Chrome | 8355de453bb4014b74b2db5d7ca38c5664d65d83 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8355de453bb4014b74b2db5d7ca38c5664d65d83 | None | 1 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 153,325,502,741,300,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-1654 | The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1654 |
7,018 | Chrome | f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f5ad97cbf2b2b465dc61d8f93820c7e6cab49e4e | None | 1 | void SetUpFontconfig() {
std::unique_ptr<Environment> env = Environment::Create();
if (!env->HasVar("FONTCONFIG_FILE")) {
FilePath dir_module;
PathService::Get(DIR_MODULE, &dir_module);
FilePath font_cache = dir_module.Append("fontconfig_caches");
FilePath test_fonts = dir_module.Append("test_fonts... | 271,007,301,915,850,960,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1657 | The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL. | https://nvd.nist.gov/vuln/detail/CVE-2016-1657 |
7,022 | Chrome | 2386a6a49ea992a1e859eb0296c1cc53e5772cdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2386a6a49ea992a1e859eb0296c1cc53e5772cdb | None | 1 | void ImageInputType::ensurePrimaryContent()
{
if (!m_useFallbackContent)
return;
m_useFallbackContent = false;
reattachFallbackContent();
}
| 173,363,941,087,375,970,000,000,000,000,000,000,000 | None | null | [
"CWE-361"
] | CVE-2016-1643 | The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2016-1643 |
7,025 | Chrome | 7716418a27d561ee295a99f11fd3865580748de2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7716418a27d561ee295a99f11fd3865580748de2 | None | 1 | static BROTLI_INLINE BrotliResult ProcessCommandsInternal(int safe,
BrotliState* s) {
int pos = s->pos;
int i = s->loop_counter;
BrotliResult result = BROTLI_RESULT_SUCCESS;
BrotliBitReader* br = &s->br;
if (!CheckInputAmount(safe, br, 28) || !WarmupBitReader(safe, br)) {
result = BROTLI_RESULT_NEEDS... | 9,320,645,353,081,902,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-1624 | Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression. | https://nvd.nist.gov/vuln/detail/CVE-2016-1624 |
7,050 | Chrome | 41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/41f5b55ab27da6890af96f2f8f0f6dd5bc6cc93c | None | 1 | void SkiaOutputSurfaceImpl::Reshape(const gfx::Size& size,
float device_scale_factor,
const gfx::ColorSpace& color_space,
bool has_alpha,
bool use_stencil) {
DCHECK_CALLED_O... | 60,093,522,846,727,510,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5094 | Type confusion in extensions JavaScript bindings in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5094 |
7,051 | Chrome | 29734f46c6dc9362783091180c2ee279ad53637f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/29734f46c6dc9362783091180c2ee279ad53637f | None | 1 | V4L2JpegEncodeAccelerator::JobRecord::JobRecord(
scoped_refptr<VideoFrame> input_frame,
scoped_refptr<VideoFrame> output_frame,
int quality,
int32_t task_id,
BitstreamBuffer* exif_buffer)
: input_frame(input_frame),
output_frame(output_frame),
quality(quality),
task_id(task_... | 213,676,667,209,846,170,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5101 | Inappropriate implementation in Omnibox in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5101 |
7,068 | Chrome | 536f72f4eeb63af895ee489c7244ccf2437cd157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/536f72f4eeb63af895ee489c7244ccf2437cd157 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 175,286,993,609,359,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5105 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5105 |
7,078 | Chrome | 5cb799a393ba9e732f89f687ff3a322b4514ebfb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cb799a393ba9e732f89f687ff3a322b4514ebfb | None | 1 | static bool ShouldAutofocus(const HTMLFormControlElement* element) {
if (!element->isConnected())
return false;
if (!element->IsAutofocusable())
return false;
Document& doc = element->GetDocument();
if (doc.IsSandboxed(WebSandboxFlags::kAutomaticFeatures)) {
doc.AddConsoleMessage(ConsoleMess... | 103,762,075,407,255,680,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2017-5108 | Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5108 |
7,111 | Chrome | cbc5d5153b18ea387f4769caa01d1339261f6ed6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6 | None | 1 | void FeatureInfo::EnableOESTextureHalfFloatLinear() {
if (!oes_texture_half_float_linear_available_)
return;
AddExtensionString("GL_OES_texture_half_float_linear");
feature_flags_.enable_texture_half_float_linear = true;
feature_flags_.gpu_memory_buffer_formats.Add(gfx::BufferFormat::RGBA_F16);
}
| 178,900,952,203,591,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5057 | Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5057 |
7,120 | Chrome | 83588d6ed473f923a46484958d440da0b8a51b1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/83588d6ed473f923a46484958d440da0b8a51b1b | None | 1 | scoped_refptr<VideoFrame> CloneVideoFrameWithLayout(
const VideoFrame* const src_frame,
const VideoFrameLayout& dst_layout) {
LOG_ASSERT(src_frame->IsMappable());
LOG_ASSERT(src_frame->format() == dst_layout.format());
auto dst_frame = VideoFrame::CreateFrameWithLayout(
dst_layout, src_frame->visibl... | 273,563,293,085,518,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5067 | An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5067 |
7,121 | Chrome | 7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a0dee9d17d0ee7fd1b40b017442f4952384a7c2 | None | 1 | SessionStartupPref StartupBrowserCreator::GetSessionStartupPref(
const base::CommandLine& command_line,
Profile* profile) {
DCHECK(profile);
PrefService* prefs = profile->GetPrefs();
SessionStartupPref pref = SessionStartupPref::GetStartupPref(prefs);
#if defined(OS_CHROMEOS)
const bool is_first_run =
... | 278,754,199,857,462,470,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5069 | Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5069 |
7,128 | Chrome | 2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2ad6b02cbf13d8f9dce50340e966ba413cb66b1c | None | 1 | void InputEngine::ProcessText(const std::string& message,
ProcessTextCallback callback) {
NOTIMPLEMENTED(); // Text message not used in the rulebased engine.
}
| 120,056,686,304,310,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5056 | A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5056 |
7,129 | Chrome | 5c895ed26b096468eea6baa6584f2df65905b76b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5c895ed26b096468eea6baa6584f2df65905b76b | None | 1 | bool PasswordAutofillAgent::TryToShowTouchToFill(
const WebFormControlElement& control_element) {
const WebInputElement* element = ToWebInputElement(&control_element);
if (!element || (!base::Contains(web_input_to_password_info_, *element) &&
!base::Contains(password_to_username_, *element... | 230,707,109,267,248,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-5053 | An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf. | https://nvd.nist.gov/vuln/detail/CVE-2017-5053 |
7,171 | Chrome | c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c093b7a74ddce32dd3b0e0be60f31becc6ce32f9 | None | 1 | static v8::Local<v8::Value> compileAndRunPrivateScript(ScriptState* scriptState,
String scriptClassName,
const char* source,
size_t size) {
v8::Isolate* ... | 43,321,180,124,893,950,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-5008 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5008 |
7,206 | Chrome | a8e17a3031b6ad69c399e5e04dd0084e577097fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc | None | 1 | void HTMLFormControlElement::updateVisibleValidationMessage() {
Page* page = document().page();
if (!page)
return;
String message;
if (layoutObject() && willValidate())
message = validationMessage().stripWhiteSpace();
m_hasValidationMessage = true;
ValidationMessageClient* client = &page->vali... | 149,198,302,204,706,460,000,000,000,000,000,000,000 | None | null | [
"CWE-1021"
] | CVE-2017-5016 | Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5016 |
7,229 | Chrome | bf6a6765d44b09c64b8c75d749efb84742a250e7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bf6a6765d44b09c64b8c75d749efb84742a250e7 | None | 1 | int PDFiumEngine::GetMostVisiblePage() {
if (in_flight_visible_page_)
return *in_flight_visible_page_;
CalculateVisiblePages();
return most_visible_page_;
}
| 335,911,838,455,914,530,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5216 | A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5216 |
7,255 | Chrome | c6f0d22d508a551a40fc8bd7418941b77435aac3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c6f0d22d508a551a40fc8bd7418941b77435aac3 | None | 1 | bool OmniboxViewViews::ShouldShowPlaceholderText() const {
return Textfield::ShouldShowPlaceholderText() &&
!model()->is_caret_visible() && !model()->is_keyword_selected();
}
| 8,362,373,834,993,374,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5220 | PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5220 |
7,256 | Chrome | e4ebe078840e65d673722e94f8251b334030b5e8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e4ebe078840e65d673722e94f8251b334030b5e8 | None | 1 | bool NavigatorImpl::NavigateToEntry(
FrameTreeNode* frame_tree_node,
const FrameNavigationEntry& frame_entry,
const NavigationEntryImpl& entry,
ReloadType reload_type,
bool is_same_document_history_load,
bool is_history_navigation_in_new_child,
bool is_pending_entry,
const scoped_refptr<... | 11,271,315,131,120,144,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-5222 | Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5222 |
7,257 | Chrome | 4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4ac4aff49c4c539bce6d8a0d8800c01324bb6bc0 | None | 1 | void HTMLFormElement::scheduleFormSubmission(FormSubmission* submission) {
DCHECK(submission->method() == FormSubmission::PostMethod ||
submission->method() == FormSubmission::GetMethod);
DCHECK(submission->data());
DCHECK(submission->form());
if (submission->action().isEmpty())
return;
if (docum... | 60,890,742,356,783,270,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-5225 | Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5225 |
7,258 | Chrome | a4acc2991a60408f2044b2a3b19817074c04b751 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a4acc2991a60408f2044b2a3b19817074c04b751 | None | 1 | void SetBuildInfoAnnotations(std::map<std::string, std::string>* annotations) {
base::android::BuildInfo* info = base::android::BuildInfo::GetInstance();
(*annotations)["android_build_id"] = info->android_build_id();
(*annotations)["android_build_fp"] = info->android_build_fp();
(*annotations)["device"] = ... | 231,354,713,576,835,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-5224 | A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5224 |
7,271 | Chrome | 2f19869af13bbfdcfd682a55c0d2c61c6e102475 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f19869af13bbfdcfd682a55c0d2c61c6e102475 | None | 1 | base::string16 GetRelyingPartyIdString(
AuthenticatorRequestDialogModel* dialog_model) {
static constexpr char kRpIdUrlPrefix[] = "https://";
static constexpr int kDialogWidth = 300;
const auto& rp_id = dialog_model->relying_party_id();
DCHECK(!rp_id.empty());
GURL rp_id_url(kRpIdUrlPrefix + rp_id);
... | 287,909,333,433,410,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5200 | V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-5200 |
7,280 | Chrome | bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bb3548ef2fcdb58f9bc638bb5a3c379320fdd0e0 | None | 1 | void HistoryController::UpdateForCommit(RenderFrameImpl* frame,
const WebHistoryItem& item,
WebHistoryCommitType commit_type,
bool navigation_within_page) {
switch (commit_type) {
case blink::W... | 123,660,876,161,276,620,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-1664 | The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2016-1664 |
7,299 | Chrome | 2f8e481c12c9e8de107b73508b6c283569d4df5b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f8e481c12c9e8de107b73508b6c283569d4df5b | None | 1 | Node::InsertionNotificationRequest HTMLLinkElement::InsertedInto(
ContainerNode& insertion_point) {
HTMLElement::InsertedInto(insertion_point);
LogAddElementIfIsolatedWorldAndInDocument("link", relAttr, hrefAttr);
if (!insertion_point.isConnected())
return kInsertionDone;
DCHECK(isConnected());
if... | 302,743,156,411,312,450,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-18337 | Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18337 |
7,313 | Chrome | e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e34e01b1b0987e418bc22e3ef1cf2e4ecaead264 | None | 1 | void RendererSchedulerImpl::OnShutdownTaskQueue(
const scoped_refptr<MainThreadTaskQueue>& task_queue) {
if (main_thread_only().was_shutdown)
return;
if (task_queue_throttler_)
task_queue_throttler_->ShutdownTaskQueue(task_queue.get());
if (task_runners_.erase(task_queue)) {
switch (task_queue->... | 318,747,477,006,032,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-18339 | Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18339 |
7,316 | Chrome | dae5b388b44dae4dc11668dba210bbb92d72d969 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dae5b388b44dae4dc11668dba210bbb92d72d969 | None | 1 | String TextCodecUTF8::Decode(const char* bytes,
wtf_size_t length,
FlushBehavior flush,
bool stop_on_error,
bool& saw_error) {
const bool do_flush = flush != FlushBehavior::kDoNotFlush;
StringBuffer<L... | 258,282,673,784,096,970,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-18341 | An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18341 |
7,318 | Chrome | c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | None | 1 | Response PageHandler::SetDownloadBehavior(const std::string& behavior,
Maybe<std::string> download_path) {
WebContentsImpl* web_contents = GetWebContents();
if (!web_contents)
return Response::InternalError();
if (behavior == Page::SetDownloadBehavior::BehaviorE... | 316,483,507,304,812,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18344 | Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18344 |
7,322 | Chrome | 9004be20a4cfde70456579489258c3aca4ed45a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9004be20a4cfde70456579489258c3aca4ed45a4 | None | 1 | void OnReadAllMetadata(
const SessionStore::SessionInfo& session_info,
SessionStore::FactoryCompletionCallback callback,
std::unique_ptr<ModelTypeStore> store,
std::unique_ptr<ModelTypeStore::RecordList> record_list,
const base::Optional<syncer::ModelError>& error,
std::unique_p... | 158,754,708,407,809,220,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18346 | Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18346 |
7,323 | Chrome | 0aa576040704401ae28ea73b862d0b5d84262d51 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0aa576040704401ae28ea73b862d0b5d84262d51 | None | 1 | void NavigatorImpl::DiscardPendingEntryIfNeeded(int expected_pending_entry_id) {
NavigationEntry* pending_entry = controller_->GetPendingEntry();
bool pending_matches_fail_msg =
pending_entry &&
expected_pending_entry_id == pending_entry->GetUniqueID();
if (!pending_matches_fail_msg)
return;
bo... | 86,982,784,795,579,680,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18347 | Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18347 |
7,324 | Chrome | 5f8671e7667b8b133bd3664100012a3906e92d65 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5f8671e7667b8b133bd3664100012a3906e92d65 | None | 1 | void RemoteFrame::ScheduleNavigation(Document& origin_document,
const KURL& url,
WebFrameLoadType frame_load_type,
UserGestureStatus user_gesture_status) {
FrameLoadRequest frame_request(&origin_document... | 82,778,449,170,609,700,000,000,000,000,000,000,000 | None | null | [
"CWE-732"
] | CVE-2018-18349 | Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-18349 |
7,328 | Chrome | 07fbae50670ea44e35e1d554db1bbece7fe3711f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/07fbae50670ea44e35e1d554db1bbece7fe3711f | None | 1 | void NavigationRequest::OnStartChecksComplete(
NavigationThrottle::ThrottleCheckResult result) {
DCHECK(result.action() != NavigationThrottle::DEFER);
DCHECK(result.action() != NavigationThrottle::BLOCK_RESPONSE);
if (on_start_checks_complete_closure_)
on_start_checks_complete_closure_.Run();
if (resul... | 130,348,220,011,088,760,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18351 | Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-18351 |
7,344 | Chrome | 4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4e4fec21ebd26d2ef20ac9f1ca0d2a16329f22bd | None | 1 | void IDNSpoofChecker::SetAllowedUnicodeSet(UErrorCode* status) {
if (U_FAILURE(*status))
return;
const icu::UnicodeSet* recommended_set =
uspoof_getRecommendedUnicodeSet(status);
icu::UnicodeSet allowed_set;
allowed_set.addAll(*recommended_set);
const icu::UnicodeSet* inclusion_set = uspoof_getIncl... | 203,276,699,258,571,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18355 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18355 |
7,345 | Chrome | 01e16ef252070f81b5f61ef4bfc0442422fd5d16 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01e16ef252070f81b5f61ef4bfc0442422fd5d16 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 186,379,375,530,314,070,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-18357 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-18357 |
7,352 | Chrome | cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cabd5a9c5b2cc447ba34f464de1c8c9dea207077 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 219,759,752,202,148,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-20070 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-20070 |
7,355 | Chrome | 9d2ead1650a1c901754dd1a68705006a6934cffc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d2ead1650a1c901754dd1a68705006a6934cffc | None | 1 | void AppCacheGroup::RemoveCache(AppCache* cache) {
DCHECK(cache->associated_hosts().empty());
if (cache == newest_complete_cache_) {
CancelUpdate();
AppCache* tmp_cache = newest_complete_cache_;
newest_complete_cache_ = nullptr;
tmp_cache->set_owning_group(nullptr); // may cause this group to... | 138,055,724,054,737,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17462 | Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17462 |
7,363 | Chrome | 3983030c2ee3e54afa60fe24f23e4c98067a3634 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3983030c2ee3e54afa60fe24f23e4c98067a3634 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 234,687,996,016,746,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17473 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-17473 |
7,364 | Chrome | 54139dd9a60d8fb63d2379a08e2f2750eac2d959 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/54139dd9a60d8fb63d2379a08e2f2750eac2d959 | None | 1 | void HTMLImportsController::Dispose() {
for (const auto& loader : loaders_)
loader->Dispose();
loaders_.clear();
if (root_) {
root_->Dispose();
root_.Clear();
}
}
| 6,103,124,948,907,307,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-17474 | Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17474 |
7,365 | Chrome | 3d41e77125f3de8d722b6d8303599abaf2a91667 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3d41e77125f3de8d722b6d8303599abaf2a91667 | None | 1 | void Browser::SetWebContentsBlocked(content::WebContents* web_contents,
bool blocked) {
int index = tab_strip_model_->GetIndexOfWebContents(web_contents);
if (index == TabStripModel::kNoTab) {
return;
}
tab_strip_model_->SetTabBlocked(index, blocked);
bool browser... | 211,797,006,234,735,850,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17476 | Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17476 |
7,366 | Chrome | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | None | 1 | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... | 338,198,694,062,496,940,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6031 | Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6031 |
7,367 | Chrome | a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8d6ae61d266d8bc44c3dd2d08bda32db701e359 | None | 1 | bool DownloadItemImpl::CanOpenDownload() {
const bool is_complete = GetState() == DownloadItem::COMPLETE;
return (!IsDone() || is_complete) && !IsTemporary() &&
!file_externally_removed_;
}
| 238,820,870,745,881,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6033 | Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6033 |
7,383 | Chrome | 209f225b2d51334eaf69ffdf002e25eaa1e0d448 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/209f225b2d51334eaf69ffdf002e25eaa1e0d448 | None | 1 | void Document::InitContentSecurityPolicy(
ContentSecurityPolicy* csp,
const ContentSecurityPolicy* policy_to_inherit) {
SetContentSecurityPolicy(csp ? csp : ContentSecurityPolicy::Create());
if (policy_to_inherit) {
GetContentSecurityPolicy()->CopyStateFrom(policy_to_inherit);
} else if (frame_) {... | 166,503,627,627,196,560,000,000,000,000,000,000,000 | None | null | [
"CWE-732"
] | CVE-2018-6040 | Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6040 |
7,384 | Chrome | 5cd363bc34f508c63b66e653bc41bd1783a4b711 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5cd363bc34f508c63b66e653bc41bd1783a4b711 | None | 1 | RenderFrameHostImpl* RenderFrameHostManager::GetFrameHostForNavigation(
const NavigationRequest& request) {
DCHECK(!request.common_params().url.SchemeIs(url::kJavaScriptScheme))
<< "Don't call this method for JavaScript URLs as those create a "
"temporary NavigationRequest and we don't want to res... | 328,808,169,727,114,960,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6041 | Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6041 |
7,388 | Chrome | 24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/24bbdc5f95f80a7700e232a272a6ea1811c0dcaf | None | 1 | GURL SanitizeFrontendURL(const GURL& url,
const std::string& scheme,
const std::string& host,
const std::string& path,
bool allow_query_and_fragment) {
std::vector<std::string> query_parts;
std::string fragment;
if... | 172,431,416,603,395,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6046 | Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6046 |
7,389 | Chrome | fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fae4d7b7d7e5c8a04a8b7a3258c0fc8362afa24c | None | 1 | bool WebGLRenderingContextBase::ValidateHTMLImageElement(
const SecurityOrigin* security_origin,
const char* function_name,
HTMLImageElement* image,
ExceptionState& exception_state) {
if (!image || !image->CachedImage()) {
SynthesizeGLError(GL_INVALID_VALUE, function_name, "no image");
return ... | 255,972,174,539,003,430,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6047 | Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user redirect URL via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6047 |
7,390 | Chrome | 931711135c90568f677cf42d94f2591a7eeced2e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/931711135c90568f677cf42d94f2591a7eeced2e | None | 1 | void Document::open(Document* entered_document,
ExceptionState& exception_state) {
if (ImportLoader()) {
exception_state.ThrowDOMException(
kInvalidStateError, "Imported document doesn't support open().");
return;
}
if (!IsHTMLDocument()) {
exception_state.ThrowDOMExceptio... | 161,090,578,992,451,160,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6048 | Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak referrer information via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6048 |
7,391 | Chrome | a30f64b4ae13255535a4947616fce484c54207df | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a30f64b4ae13255535a4947616fce484c54207df | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), nullptr, &status);
i... | 308,391,636,262,837,550,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6050 | Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6050 |
7,392 | Chrome | 0da6dcdbe8e34740133773d20cc466b89d399d0a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0da6dcdbe8e34740133773d20cc466b89d399d0a | None | 1 | void XSSAuditor::Init(Document* document,
XSSAuditorDelegate* auditor_delegate) {
DCHECK(IsMainThread());
if (state_ != kUninitialized)
return;
state_ = kFilteringTokens;
if (Settings* settings = document->GetSettings())
is_enabled_ = settings->GetXSSAuditorEnabled();
if (!is_e... | 174,848,119,607,278,600,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6051 | XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6051 |
7,393 | Chrome | 6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c6888565ff1fde9ef21ef17c27ad4c8304643d2 | None | 1 | void TopSitesImpl::SetTopSites(const MostVisitedURLList& new_top_sites,
const CallLocation location) {
DCHECK(thread_checker_.CalledOnValidThread());
MostVisitedURLList top_sites(new_top_sites);
size_t num_forced_urls = MergeCachedForcedURLs(&top_sites);
AddPrepopulatedPages(&top... | 268,250,571,136,774,840,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6053 | Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a local attacker to view website thumbnail images after clearing browser data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6053 |
7,394 | Chrome | 90585e657db48f93bd73bc45d4caa975323da41b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/90585e657db48f93bd73bc45d4caa975323da41b | None | 1 | void WebUIExtension::Send(gin::Arguments* args) {
blink::WebLocalFrame* frame;
RenderFrame* render_frame;
if (!ShouldRespondToRequest(&frame, &render_frame))
return;
std::string message;
if (!args->GetNext(&message)) {
args->ThrowError();
return;
}
if (base::EndsWith(message, "RequiringGestu... | 164,307,740,332,095,210,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6054 | Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6054 |
7,399 | Chrome | c9d673b54832afde658f214d7da7d0453fa89774 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c9d673b54832afde658f214d7da7d0453fa89774 | None | 1 | void MemBackendImpl::EvictIfNeeded() {
if (current_size_ <= max_size_)
return;
int target_size = std::max(0, max_size_ - kDefaultEvictionSize);
base::LinkNode<MemEntryImpl>* entry = lru_list_.head();
while (current_size_ > target_size && entry != lru_list_.end()) {
MemEntryImpl* to_doom = entry->va... | 315,799,070,500,799,380,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6086 | A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6086 |
7,400 | Chrome | 94b3728a2836da335a10085d4089c9d8e1c9d225 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/94b3728a2836da335a10085d4089c9d8e1c9d225 | None | 1 | int PDFiumEngine::GetVisiblePageIndex(FPDF_PAGE page) {
for (int page_index : visible_pages_) {
if (pages_[page_index]->GetPage() == page)
return page_index;
}
return -1;
}
| 306,739,967,883,605,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6088 | An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6088 |
7,425 | Chrome | ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba1513223e47b62ed53b61518b7f7b82ad1d8ccd | None | 1 | void ServerWrapper::OnHttpRequest(int connection_id,
const net::HttpServerRequestInfo& info) {
server_->SetSendBufferSize(connection_id, kSendBufferSizeForDevTools);
if (base::StartsWith(info.path, "/json", base::CompareCase::SENSITIVE)) {
BrowserThread::PostTask(BrowserT... | 212,957,148,344,421,130,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6101 | A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server. | https://nvd.nist.gov/vuln/detail/CVE-2018-6101 |
7,426 | Chrome | d52b8375cfe5b56194d3df09c18e7b64e5838369 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d52b8375cfe5b56194d3df09c18e7b64e5838369 | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 266,538,480,458,293,870,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6102 | Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6102 |
7,478 | Chrome | bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bd0fde2518644eea1cc53a01e3e3cce1c70e7157 | None | 1 | bool NavigateToUrlWithEdge(const base::string16& url) {
base::string16 protocol_url = L"microsoft-edge:" + url;
SHELLEXECUTEINFO info = { sizeof(info) };
info.fMask = SEE_MASK_NOASYNC | SEE_MASK_FLAG_NO_UI;
info.lpVerb = L"open";
info.lpFile = protocol_url.c_str();
info.nShow = SW_SHOWNORMAL;
if (::... | 9,734,627,333,286,498,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6115 | Inappropriate setting of the SEE_MASK_FLAG_NO_UI flag in file downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially bypass OS malware checks via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6115 |
7,479 | Chrome | 52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52f6eb4221430b6248fd5a59bec53bfef9fdd9a7 | None | 1 | void AddPasswordsAndFormsStrings(content::WebUIDataSource* html_source) {
LocalizedString localized_strings[] = {
{"passwordsAndAutofillPageTitle",
IDS_SETTINGS_PASSWORDS_AND_AUTOFILL_PAGE_TITLE},
{"autofill", IDS_SETTINGS_AUTOFILL},
{"googlePayments", IDS_SETTINGS_GOOGLE_PAYMENTS},
... | 36,426,098,985,734,715,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6117 | Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6117 |
7,480 | Chrome | fd6a5115103b3e6a52ce15858c5ad4956df29300 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd6a5115103b3e6a52ce15858c5ad4956df29300 | None | 1 | void AudioNode::Dispose() {
DCHECK(IsMainThread());
#if DEBUG_AUDIONODE_REFERENCES
fprintf(stderr, "[%16p]: %16p: %2d: AudioNode::dispose %16p\n", context(),
this, Handler().GetNodeType(), handler_.get());
#endif
BaseAudioContext::GraphAutoLocker locker(context());
Handler().Dispose();
if (contex... | 224,602,300,920,060,400,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6060 | Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6060 |
7,563 | Chrome | 673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | None | 1 | ScopedSharedBufferHandle WrapSharedMemoryHandle(
const base::SharedMemoryHandle& memory_handle,
size_t size,
bool read_only) {
if (!memory_handle.IsValid())
return ScopedSharedBufferHandle();
MojoPlatformHandle platform_handle;
platform_handle.struct_size = sizeof(MojoPlatformHandle);
plat... | 72,164,664,479,411,620,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-6063 | Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6063 |
7,574 | Chrome | f283cdf7c850f3db923a5303c7e01bd929d4117f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f283cdf7c850f3db923a5303c7e01bd929d4117f | None | 1 | bool VaapiJpegDecoder::Initialize(const base::RepeatingClosure& error_uma_cb) {
vaapi_wrapper_ = VaapiWrapper::Create(VaapiWrapper::kDecode,
VAProfileJPEGBaseline, error_uma_cb);
if (!vaapi_wrapper_) {
VLOGF(1) << "Failed initializing VAAPI";
return false;
}
retur... | 3,272,268,027,632,531,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6070 | Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6070 |
7,581 | Chrome | f8f6ed59949be4451ee2f5443d8a313f102fde60 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f8f6ed59949be4451ee2f5443d8a313f102fde60 | None | 1 | void DoCanonicalizeRef(const CHAR* spec,
const Component& ref,
CanonOutput* output,
Component* out_ref) {
if (ref.len < 0) {
*out_ref = Component();
return;
}
output->push_back('#');
out_ref->begin = output->length();
int end = ref... | 267,438,556,305,741,560,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2018-6076 | Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6076 |
7,587 | Chrome | fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fe3c71592ccc6fd6f3909215e326ffc8fe0c35ce | None | 1 | IDNSpoofChecker::IDNSpoofChecker() {
UErrorCode status = U_ZERO_ERROR;
checker_ = uspoof_open(&status);
if (U_FAILURE(status)) {
checker_ = nullptr;
return;
}
uspoof_setRestrictionLevel(checker_, USPOOF_HIGHLY_RESTRICTIVE);
SetAllowedUnicodeSet(&status);
int32_t checks = uspoof_getChecks(check... | 195,566,591,690,515,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6078 | Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2018-6078 |
7,597 | Chrome | a96567f02a0881561c964e5c11afe9c1af17a5f7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a96567f02a0881561c964e5c11afe9c1af17a5f7 | None | 1 | QuicErrorCode QuicStreamSequencerBuffer::OnStreamData(
QuicStreamOffset starting_offset,
QuicStringPiece data,
QuicTime timestamp,
size_t* const bytes_buffered,
std::string* error_details) {
CHECK_EQ(destruction_indicator_, 123456) << "This object has been destructed";
*bytes_buffered = 0;
Qui... | 195,459,414,426,763,180,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-15407 | Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15407 |
7,600 | Chrome | 11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11bd4bc92f3fe704631e3e6ad1dd1a4351641f7c | None | 1 | BlobStorageContext::BlobFlattener::BlobFlattener(
const BlobDataBuilder& input_builder,
BlobEntry* output_blob,
BlobStorageRegistry* registry) {
const std::string& uuid = input_builder.uuid_;
std::set<std::string> dependent_blob_uuids;
size_t num_files_with_unknown_size = 0;
size_t num_building_dep... | 159,071,568,910,807,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15416 | Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2017-15416 |
7,609 | Chrome | 16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/16c719e0e275d2ee5d5c69e4962b744bcaf0fe40 | None | 1 | int OmniboxViewViews::OnDrop(const ui::OSExchangeData& data) {
if (HasTextBeingDragged())
return ui::DragDropTypes::DRAG_NONE;
if (data.HasURL(ui::OSExchangeData::CONVERT_FILENAMES)) {
GURL url;
base::string16 title;
if (data.GetURLAndTitle(
ui::OSExchangeData::CONVERT_FILENAMES, &url, ... | 116,048,407,286,939,860,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2017-15427 | Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar. | https://nvd.nist.gov/vuln/detail/CVE-2017-15427 |
7,612 | Chrome | 7a6484fa7b7f86ea06749bfc9d10bb67b145140b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7a6484fa7b7f86ea06749bfc9d10bb67b145140b | None | 1 | void QuicClientPromisedInfo::OnPromiseHeaders(const SpdyHeaderBlock& headers) {
SpdyHeaderBlock::const_iterator it = headers.find(kHttp2MethodHeader);
DCHECK(it != headers.end());
if (!(it->second == "GET" || it->second == "HEAD")) {
QUIC_DVLOG(1) << "Promise for stream " << id_ << " has invalid method "
... | 210,233,707,268,975,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-15398 | A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server. | https://nvd.nist.gov/vuln/detail/CVE-2017-15398 |
7,615 | Chrome | 783c28d59c4c748ef9b787d4717882c90c5b227b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/783c28d59c4c748ef9b787d4717882c90c5b227b | None | 1 | void ScriptProcessorHandler::Process(size_t frames_to_process) {
AudioBus* input_bus = Input(0).Bus();
AudioBus* output_bus = Output(0).Bus();
unsigned double_buffer_index = this->DoubleBufferIndex();
bool is_double_buffer_index_good =
double_buffer_index < 2 && double_buffer_index < input_buffers_.size... | 39,757,271,478,211,367,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-5129 | A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5129 |
7,624 | Chrome | 5788690fb1395dc672ff9b3385dbfb1180ed710a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5788690fb1395dc672ff9b3385dbfb1180ed710a | None | 1 | void DelegatedFrameHost::ClearDelegatedFrame() {
EvictDelegatedFrame();
}
| 28,748,284,513,977,893,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15389 | An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-15389 |
7,625 | Chrome | 1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1f6acd54ee3765d5c1a6f14fc31ddd4a74145314 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 104,852,595,640,074,470,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15390 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-15390 |
7,630 | Chrome | a8ef19900d003ff7078fe4fcec8f63496b18f0dc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a8ef19900d003ff7078fe4fcec8f63496b18f0dc | None | 1 | WebContents* DevToolsWindow::OpenURLFromTab(
WebContents* source,
const content::OpenURLParams& params) {
DCHECK(source == main_web_contents_);
if (!params.url.SchemeIs(content::kChromeDevToolsScheme)) {
WebContents* inspected_web_contents = GetInspectedWebContents();
return inspected_web_content... | 223,302,603,119,110,200,000,000,000,000,000,000,000 | None | null | [
"CWE-668"
] | CVE-2017-15393 | Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak. | https://nvd.nist.gov/vuln/detail/CVE-2017-15393 |
7,631 | Chrome | 504e0c45030f76bffda93f0857e7595216d6e7a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/504e0c45030f76bffda93f0857e7595216d6e7a4 | None | 1 | std::set<std::string> GetDistinctHosts(const URLPatternSet& host_patterns,
bool include_rcd,
bool exclude_file_scheme) {
typedef base::StringPairs HostVector;
HostVector hosts_best_rcd;
for (const URLPattern& pattern : host_patterns) {
... | 127,460,476,047,306,420,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15394 | Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2017-15394 |
7,633 | Chrome | 761d65ebcac0cdb730fd27b87e207201ac38e3b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/761d65ebcac0cdb730fd27b87e207201ac38e3b4 | None | 1 | void ServiceWorkerPaymentInstrument::OnPaymentAppInvoked(
mojom::PaymentHandlerResponsePtr response) {
DCHECK(delegate_);
if (delegate_ != nullptr) {
delegate_->OnInstrumentDetailsReady(response->method_name,
response->stringified_details);
delegate_ = nullpt... | 124,123,857,466,942,320,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5828 | Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5828 |
7,680 | Chrome | 37a0e90a956194a066dd31edd5b5ac5045701d31 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/37a0e90a956194a066dd31edd5b5ac5045701d31 | None | 1 | ChildProcessTerminationInfo ChildProcessLauncherHelper::GetTerminationInfo(
const ChildProcessLauncherHelper::Process& process,
bool known_dead) {
ChildProcessTerminationInfo info;
if (!java_peer_avaiable_on_client_thread_)
return info;
Java_ChildProcessLauncherHelperImpl_getTerminationInfo(
... | 333,289,139,968,551,200,000,000,000,000,000,000,000 | None | null | [
"CWE-664"
] | CVE-2019-5816 | Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5816 |
7,690 | Chrome | b38064dbb21aaf32151073dcb7d594b240c68f73 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b38064dbb21aaf32151073dcb7d594b240c68f73 | None | 1 | OperationID FileSystemOperationRunner::BeginOperation(
std::unique_ptr<FileSystemOperation> operation) {
OperationID id = next_operation_id_++;
operations_.emplace(id, std::move(operation));
return id;
}
| 307,301,560,034,915,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-5788 | An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5788 |
7,718 | Chrome | 12348a12a8b108baedee2ddbda99948029d363ed | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12348a12a8b108baedee2ddbda99948029d363ed | None | 1 | UseCounterPageLoadMetricsObserver::GetAllowedUkmFeatures() {
static base::NoDestructor<UseCounterPageLoadMetricsObserver::UkmFeatureList>
opt_in_features(std::initializer_list<WebFeature>({
WebFeature::kNavigatorVibrate,
WebFeature::kNavigatorVibrateSubFrame,
WebFeature::kTouchEven... | 57,277,998,242,963,050,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5802 | Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5802 |
7,719 | Chrome | 0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0e3b0c22a5c596bdc24a391b3f02952c1c3e4f1b | None | 1 | void Location::SetLocation(const String& url,
LocalDOMWindow* current_window,
LocalDOMWindow* entered_window,
ExceptionState* exception_state,
SetLocationPolicy set_location_policy) {
if (!IsAttached())
ret... | 167,749,381,289,571,010,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-5803 | Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5803 |
7,720 | Chrome | 08965161257ab9aeef9a3548c1cd1a44525dc562 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08965161257ab9aeef9a3548c1cd1a44525dc562 | None | 1 | std::wstring GetSwitchValueFromCommandLine(const std::wstring& command_line,
const std::wstring& switch_name) {
assert(!command_line.empty());
assert(!switch_name.empty());
std::vector<std::wstring> as_array = TokenizeCommandLineToArray(command_line);
std::wstr... | 171,910,779,797,819,600,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-5804 | Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2019-5804 |
7,721 | Chrome | ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba9748e78ec7e9c0d594e7edf7b2c07ea2a90449 | None | 1 | DOMArrayBuffer* FileReaderLoader::ArrayBufferResult() {
DCHECK_EQ(read_type_, kReadAsArrayBuffer);
if (array_buffer_result_)
return array_buffer_result_;
if (!raw_data_ || error_code_ != FileErrorCode::kOK)
return nullptr;
DOMArrayBuffer* result = DOMArrayBuffer::Create(raw_data_->ToArrayBuffer());... | 122,522,782,558,913,250,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-5786 | Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5786 |
7,722 | Chrome | fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fd2335678e96c34d14f4b20f0d9613dfbd1ccdb4 | None | 1 | void ConfigureQuicParams(base::StringPiece quic_trial_group,
const VariationParameters& quic_trial_params,
bool is_quic_force_disabled,
bool is_quic_force_enabled,
const std::string& quic_user_agent_id,
... | 56,192,871,356,368,720,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2019-5754 | Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy. | https://nvd.nist.gov/vuln/detail/CVE-2019-5754 |
7,723 | Chrome | 032c3339bfb454c65ce38e7eafe49a54bac83073 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/032c3339bfb454c65ce38e7eafe49a54bac83073 | None | 1 | bool SVGElement::HasSVGParent() const {
return ParentOrShadowHostElement() &&
ParentOrShadowHostElement()->IsSVGElement();
}
| 228,383,481,357,535,160,000,000,000,000,000,000,000 | None | null | [
"CWE-704"
] | CVE-2019-5757 | An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5757 |
7,734 | Chrome | f045c704568e9cf6279b3cbccbec6d86c35f8a13 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f045c704568e9cf6279b3cbccbec6d86c35f8a13 | None | 1 | void FileSystemManagerImpl::CreateWriter(const GURL& file_path,
CreateWriterCallback callback) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
FileSystemURL url(context_->CrackURL(file_path));
base::Optional<base::File::Error> opt_error = ValidateFileSystemURL(url);
if ... | 220,704,916,600,868,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-5755 | Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5755 |
7,770 | Chrome | 2f01a0cb03732fdb982dd42786d95736322d2241 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2f01a0cb03732fdb982dd42786d95736322d2241 | None | 1 | bool SetExtendedFileAttribute(const char* path,
const char* name,
const char* value,
size_t value_size,
int flags) {
//// On Chrome OS, there is no component that can validate these extended
//// a... | 277,230,499,082,888,640,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-20073 | Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2018-20073 |
7,773 | Chrome | 18c5c5dcef9cfccff64f0c23f920ef22822271a9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/18c5c5dcef9cfccff64f0c23f920ef22822271a9 | None | 1 | void ChromeContentBrowserClient::OpenURL(
content::BrowserContext* browser_context,
const content::OpenURLParams& params,
const base::Callback<void(content::WebContents*)>& callback) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
#if defined(OS_ANDROID)
ServiceTabLauncher::GetInstance()->LaunchTab(bro... | 16,021,253,388,225,898,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2019-5779 | Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5779 |
7,792 | Chrome | 01b42e2bc2aac531b17596729ae4e5c223ae7124 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01b42e2bc2aac531b17596729ae4e5c223ae7124 | None | 1 | bool Performance::PassesTimingAllowCheck(
const ResourceResponse& response,
const SecurityOrigin& initiator_security_origin,
const AtomicString& original_timing_allow_origin,
ExecutionContext* context) {
scoped_refptr<const SecurityOrigin> resource_origin =
SecurityOrigin::Create(response.Ur... | 294,339,990,149,396,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6159 | Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6159 |
7,804 | Chrome | 303d78445257d1eec726c4ebadb3517cb16c8c09 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/303d78445257d1eec726c4ebadb3517cb16c8c09 | None | 1 | ExtensionInstallDialogView::ExtensionInstallDialogView(
Profile* profile,
content::PageNavigator* navigator,
const ExtensionInstallPrompt::DoneCallback& done_callback,
std::unique_ptr<ExtensionInstallPrompt::Prompt> prompt)
: profile_(profile),
navigator_(navigator),
done_callback_(done_... | 15,427,734,945,482,778,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6169 | Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6169 |
7,805 | Chrome | c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c5c6320f80159dc41dffc3cfbf0298925c7dcf1b | None | 1 | ExtensionFunction::ResponseAction BluetoothSocketSendFunction::Run() {
DCHECK_CURRENTLY_ON(work_thread_id());
auto params = bluetooth_socket::Send::Params::Create(*args_);
EXTENSION_FUNCTION_VALIDATE(params.get());
io_buffer_size_ = params->data.size();
io_buffer_ = new net::WrappedIOBuffer(params->data... | 71,558,336,532,325,010,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-6171 | Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6171 |
7,810 | Chrome | fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fbeba958bb83c05ec8cc54e285a4a9ca10d1b311 | None | 1 | ConfirmInfoBar::ConfirmInfoBar(std::unique_ptr<ConfirmInfoBarDelegate> delegate)
: InfoBarView(std::move(delegate)) {
auto* delegate_ptr = GetDelegate();
label_ = CreateLabel(delegate_ptr->GetMessageText());
AddChildView(label_);
const auto buttons = delegate_ptr->GetButtons();
if (buttons & Confir... | 181,759,325,539,671,600,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2018-6178 | Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-6178 |
7,811 | Chrome | a62f913109fc1566230f5963bbf69ee65274ebc8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a62f913109fc1566230f5963bbf69ee65274ebc8 | None | 1 | void FetchManager::Loader::Start() {
if (!ContentSecurityPolicy::ShouldBypassMainWorld(execution_context_) &&
!execution_context_->GetContentSecurityPolicy()->AllowConnectToSource(
fetch_request_data_->Url())) {
PerformNetworkError(
"Refused to connect to '" + fetch_request_data_->Url... | 57,058,051,067,850,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-4117 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to... | https://nvd.nist.gov/vuln/detail/CVE-2018-4117 |
7,826 | Chrome | ca1156974cbe707fd023a00ae62104528833a44e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ca1156974cbe707fd023a00ae62104528833a44e | None | 1 | void BaseAudioContext::Initialize() {
if (IsDestinationInitialized())
return;
FFTFrame::Initialize();
audio_worklet_ = AudioWorklet::Create(this);
if (destination_node_) {
destination_node_->Handler().Initialize();
listener_ = AudioListener::Create(*this);
}
}
| 142,671,235,725,804,310,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-16067 | A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16067 |
7,834 | Chrome | b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b1f87486936ca0d6d9abf4d3b9b423a9c976fd59 | None | 1 | GURL SiteInstance::GetSiteForURL(BrowserContext* browser_context,
const GURL& real_url) {
if (real_url.SchemeIs(kGuestScheme))
return real_url;
GURL url = SiteInstanceImpl::GetEffectiveURL(browser_context, real_url);
url::Origin origin = url::Origin::Create(url);
auto* pol... | 339,629,888,976,962,300,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16074 | Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-16074 |
7,855 | Chrome | 7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c3bb2970fd0890df611b1d8b345b60b1978c2d7 | None | 1 | bool PlatformFontSkia::InitDefaultFont() {
if (g_default_font.Get())
return true;
bool success = false;
std::string family = kFallbackFontFamilyName;
int size_pixels = 12;
int style = Font::NORMAL;
Font::Weight weight = Font::Weight::NORMAL;
FontRenderParams params;
const SkiaFontDelegate* d... | 66,618,136,481,925,500,000,000,000,000,000,000,000 | None | null | [
"CWE-862"
] | CVE-2018-16081 | Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16081 |
7,856 | Chrome | 8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/8247b125c7b6888dc1c3932e19d6d8fe5a74a460 | None | 1 | bool RendererPermissionsPolicyDelegate::IsRestrictedUrl(
const GURL& document_url,
std::string* error) {
if (dispatcher_->IsExtensionActive(kWebStoreAppId)) {
if (error)
*error = errors::kCannotScriptGallery;
return true;
}
if (SearchBouncer::GetInstance()->IsNewTabPage(document_url)) {
... | 264,227,214,820,471,740,000,000,000,000,000,000,000 | None | null | [
"CWE-285"
] | CVE-2018-16086 | Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | https://nvd.nist.gov/vuln/detail/CVE-2018-16086 |
7,893 | Chrome | a79e1bbb765af34d446e42d34cd00a312b381113 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a79e1bbb765af34d446e42d34cd00a312b381113 | None | 1 | void OnSuggestionModelAdded(UiScene* scene,
UiBrowserInterface* browser,
Model* model,
SuggestionBinding* element_binding) {
auto icon = base::MakeUnique<VectorIcon>(100);
icon->SetDrawPhase(kPhaseForeground);
icon->SetType(kTypeO... | 88,426,719,643,275,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-6132 | Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6132 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.