prompt
stringclasses
1 value
completions
listlengths
1
1.33k
labels
listlengths
1
1.33k
source
stringclasses
1 value
other_info
dict
index
int64
0
151k
Determine whether the code is vulnerable or not.
[ "gpc_gb16(Pixel *out, const Pixel *in, const Background *back)\n{\n if (in->a <= 0)\n out->r = out->g = out->b = back->ig;", " else if (in->a >= 65535)\n out->r = out->g = out->b = isRGB(in->g);", " else\n {\n double a = in->a / 65535.;\n double a1 = 1-a;", " a /= 65535;\n out->r = out->g ...
[ 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-3751", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-3751/", "CWE ID": null, "codeLink": "https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca", "commit_id": "9d4853418ab2f754c2b63e091c29c5529b8b86ca", "commit_message": "DO NOT MER...
189
Determine whether the code is vulnerable or not.
[ " void StartExtractFileFeatures() {\n DCHECK_CURRENTLY_ON(BrowserThread::UI);\n DCHECK(item_); // Called directly from Start(), item should still exist.\n BrowserThread::GetBlockingPool()->PostWorkerTaskWithShutdownBehavior(\n FROM_HERE,\n base::Bind(&CheckClientDownloadRequest::ExtractFile...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-6661", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-6661/", "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/23cbfc1d685fa7389e88588584e02786820d4d26", "commit_id": "23cbfc1d685fa7389e88588584e02786820d4d26", "commit_message": "Add the SandboxedDMGParser...
190
Determine whether the code is vulnerable or not.
[ "void LayerTreeHost::RateLimit() {\n proxy_->ForceSerializeOnSwapBuffers();\n client_->RateLimitSharedMainThreadContext();\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-2902", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-2902/", "CWE ID": "CWE-399", "codeLink": "https://github.com/chromium/chromium/commit/87a082c5137a63dedb3fe5b1f48f75dcd1fd780c", "commit_id": "87a082c5137a63dedb3fe5b1f48f75dcd1fd780c", "commit_message": "Removed pinch viewpor...
191
Determine whether the code is vulnerable or not.
[ "nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,\n\t\t\t\t\tstruct nfsd_writeargs *args)\n{\n\tunsigned int len, hdr, dlen;\n\tstruct kvec *head = rqstp->rq_arg.head;\n\tint v;", "\tp = decode_fh(p, &args->fh);\n\tif (!p)\n\t\treturn 0;", "\tp++;\t\t\t\t/* beginoffset */\n\targs->offset = ntohl(*p++)...
[ 1, 1, 1, 1, 0, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-7895", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7895/", "CWE ID": "CWE-119", "codeLink": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "commit_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "commit_message": "nfsd: stricter decoding ...
192
Determine whether the code is vulnerable or not.
[ "nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,\n\t\t\t\t\tstruct nfsd_writeargs *args)\n{\n\tunsigned int len, hdr, dlen;\n\tstruct kvec *head = rqstp->rq_arg.head;\n\tint v;", "\tp = decode_fh(p, &args->fh);\n\tif (!p)\n\t\treturn 0;", "\tp++;\t\t\t\t/* beginoffset */\n\targs->offset = ntohl(*p++)...
[ 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-7895", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7895/", "CWE ID": "CWE-119", "codeLink": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "commit_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "commit_message": "nfsd: stricter decoding ...
192
Determine whether the code is vulnerable or not.
[ "static void hugetlbfs_i_callback(struct rcu_head *head)\n{\n\tstruct inode *inode = container_of(head, struct inode, i_rcu);\n\tkmem_cache_free(hugetlbfs_inode_cachep, HUGETLBFS_I(inode));\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2012-2133", "CVE Page": "https://www.cvedetails.com/cve/CVE-2012-2133/", "CWE ID": "CWE-399", "codeLink": "https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe516029", "commit_id": "90481622d75715bfcb68501280a917dbfe516029", "commit_message": "hugepages: fix use after...
193
Determine whether the code is vulnerable or not.
[ "static int __init setup_slub_max_order(char *str)\n{\n\tget_option(&str, &slub_max_order);", "\treturn 1;\n}\n" ]
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-3209", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3209/", "CWE ID": "CWE-189", "codeLink": "https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d", "commit_id": "f8bd2258e2d520dff28c855658bd24bdafb5102d", "commit_message": "remove div_long_long_rem...
194
Determine whether the code is vulnerable or not.
[ "const std::string& BluetoothSocketListenUsingRfcommFunction::uuid() const {\n return params_->uuid;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-6171", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6171/", "CWE ID": "CWE-416", "codeLink": "https://github.com/chromium/chromium/commit/c5c6320f80159dc41dffc3cfbf0298925c7dcf1b", "commit_id": "c5c6320f80159dc41dffc3cfbf0298925c7dcf1b", "commit_message": "chrome.bluetoothSocke...
195
Determine whether the code is vulnerable or not.
[ "static void mntput_no_expire(struct mount *mnt)\n{\n\trcu_read_lock();\n\tmnt_add_count(mnt, -1);\n\tif (likely(mnt->mnt_ns)) { /* shouldn't be the last one */\n\t\trcu_read_unlock();\n\t\treturn;\n\t}\n\tlock_mount_hash();\n\tif (mnt_get_count(mnt)) {\n\t\trcu_read_unlock();\n\t\tunlock_mount_hash();\n\t\treturn;...
[ 1, 0, 1 ]
BIGVUL
{ "CVE ID": "CVE-2014-9717", "CVE Page": "https://www.cvedetails.com/cve/CVE-2014-9717/", "CWE ID": "CWE-284", "codeLink": "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", "commit_id": "ce07d891a0891d3c0d0c2d73d577490486b809e1", "commit_message": "mnt: Honor MNT_LOCKED wh...
196
Determine whether the code is vulnerable or not.
[ "static void mntput_no_expire(struct mount *mnt)\n{\n\trcu_read_lock();\n\tmnt_add_count(mnt, -1);\n\tif (likely(mnt->mnt_ns)) { /* shouldn't be the last one */\n\t\trcu_read_unlock();\n\t\treturn;\n\t}\n\tlock_mount_hash();\n\tif (mnt_get_count(mnt)) {\n\t\trcu_read_unlock();\n\t\tunlock_mount_hash();\n\t\treturn;...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2014-9717", "CVE Page": "https://www.cvedetails.com/cve/CVE-2014-9717/", "CWE ID": "CWE-284", "codeLink": "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", "commit_id": "ce07d891a0891d3c0d0c2d73d577490486b809e1", "commit_message": "mnt: Honor MNT_LOCKED wh...
196
Determine whether the code is vulnerable or not.
[ "void RenderProcessHostImpl::ProcessDied(bool already_dead,\n RendererClosedDetails* known_details) {", " DCHECK(!within_process_died_observer_);", " DCHECK(!deleting_soon_);", " base::TerminationStatus status = base::TERMINATION_STATUS_NORMAL_TERMINATION;\n int exit...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-1265", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1265/", "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/04ff52bb66284467ccb43d90800013b89ee8db75", "commit_id": "04ff52bb66284467ccb43d90800013b89ee8db75", "commit_message": "Switching AudioOutputAutho...
197
Determine whether the code is vulnerable or not.
[ "void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)\n{\n EAS_PCM *pAudioBuffer;\n EAS_I32 k;\n EAS_I32 b1;\n EAS_I32 b2;\n EAS_I32 z1;\n EAS_I32 z2;\n EAS_I32 acc0;\n EAS_I32 acc1;\n EAS_I32 numSamples;", " \n /* initialize some local variables */\n num...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-0838", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-0838/", "CWE ID": "CWE-119", "codeLink": "https://android.googlesource.com/platform/external/sonivox/+/3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49", "commit_id": "3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49", "commit_message": "Soni...
198
Determine whether the code is vulnerable or not.
[ "void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)\n{\n EAS_PCM *pAudioBuffer;\n EAS_I32 k;\n EAS_I32 b1;\n EAS_I32 b2;\n EAS_I32 z1;\n EAS_I32 z2;\n EAS_I32 acc0;\n EAS_I32 acc1;\n EAS_I32 numSamples;", " \n /* initialize some local variables */\n num...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-0838", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-0838/", "CWE ID": "CWE-119", "codeLink": "https://android.googlesource.com/platform/external/sonivox/+/3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49", "commit_id": "3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49", "commit_message": "Soni...
198
Determine whether the code is vulnerable or not.
[ "static int setup_proc_entry( struct net_device *dev,\n\t\t\t struct airo_info *apriv ) {\n\tstruct proc_dir_entry *entry;\n\t/* First setup the device directory */\n\tstrcpy(apriv->proc_name,dev->name);\n\tapriv->proc_entry = proc_mkdir_mode(apriv->proc_name, airo_perm,\n\t\t\t\t\t airo_entry);\n\tif (!apri...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-4112", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/", "CWE ID": "CWE-264", "codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162", "commit_id": "550fd08c2cebad61c548def135f67aba284c6162", "commit_message": "net: Audit drivers to id...
199
Determine whether the code is vulnerable or not.
[ "ofputil_capabilities_mask(enum ofp_version ofp_version)\n{\n /* Handle capabilities whose bit is unique for all OpenFlow versions */\n switch (ofp_version) {\n case OFP10_VERSION:\n case OFP11_VERSION:\n return OFPC_COMMON | OFPC_ARP_MATCH_IP;\n case OFP12_VERSION:\n case OFP13_VERSION:\n ...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-17204", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-17204/", "CWE ID": "CWE-617", "codeLink": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde", "commit_id": "4af6da3b275b764b1afe194df6499b33d2bf4cde", "commit_message": "ofp-group: Don't asse...
200
Determine whether the code is vulnerable or not.
[ "void EncoderTest::InitializeConfig() {\n const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);", "", " ASSERT_EQ(VPX_CODEC_OK, res);\n }" ]
[ 1, 0, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1621", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1621/", "CWE ID": "CWE-119", "codeLink": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426", "commit_id": "5a9753fca56f0eeb9f61e342b2fccffc364f9426", "commit_message": "Merge...
201
Determine whether the code is vulnerable or not.
[ "void EncoderTest::InitializeConfig() {\n const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);", " dec_cfg_ = vpx_codec_dec_cfg_t();", " ASSERT_EQ(VPX_CODEC_OK, res);\n }" ]
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1621", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1621/", "CWE ID": "CWE-119", "codeLink": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426", "commit_id": "5a9753fca56f0eeb9f61e342b2fccffc364f9426", "commit_message": "Merge...
201
Determine whether the code is vulnerable or not.
[ "void CanvasSurfaceLayerBridgeClientImpl::asyncSatisfy(const cc::SurfaceSequence& sequence)\n{\n m_service->Satisfy(sequence);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/a3987c8b93d3abbba6ea4e438493bf996fff66b7", "commit_id": "a3987c8b93d3abbba6ea4e438493bf996fff66b7", "commit_message": "Make Surface creation lazy for OffscreenCanvasFrameReceiverImpl\n\nThis CL shift...
202
Determine whether the code is vulnerable or not.
[ " TestEntryInfo& SetEntryFolderFeature(\n const EntryFolderFeature& new_folder_feature) {\n folder_feature = new_folder_feature;\n return *this;\n }\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-5194", "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251", "commit_id": "d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251", "commit_message": "Clear Shill stub config in offline file manager tests\n\nThe Shill st...
203
Determine whether the code is vulnerable or not.
[ "void WebContentsImpl::DidStartNavigationToPendingEntry(\n const GURL& url,\n NavigationController::ReloadType reload_type) {\n FOR_EACH_OBSERVER(\n WebContentsObserver,\n observers_,\n DidStartNavigationToPendingEntry(url, reload_type));\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1641", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1641/", "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/75ca8ffd7bd7c58ace1144df05e1307d8d707662", "commit_id": "75ca8ffd7bd7c58ace1144df05e1307d8d707662", "commit_message": "Don't call WebContents::Do...
204
Determine whether the code is vulnerable or not.
[ "static Sdb *store_versioninfo_gnu_verneed(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {\n\tut8 *end, *need = NULL;\n\tconst char *section_name = \"\";\n\tElf_(Shdr) *link_shdr = NULL;\n\tconst char *link_section_name = \"\";\n\tSdb *sdb_vernaux = NULL;\n\tSdb *sdb_version = NULL;\n\tSdb *sdb = NULL;\n\tint i, cnt;", ...
[ 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-15932", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-15932/", "CWE ID": "CWE-125", "codeLink": "https://github.com/radare/radare2/commit/44ded3ff35b8264f54b5a900cab32ec489d9e5b9", "commit_id": "44ded3ff35b8264f54b5a900cab32ec489d9e5b9", "commit_message": "Fix #8743 - Crash in E...
205
Determine whether the code is vulnerable or not.
[ "RenderProcessHost* RenderProcessHostImpl::FindReusableProcessHostForSite(\n BrowserContext* browser_context,\n const GURL& site_url) {\n if (!ShouldFindReusableProcessHostForSite(browser_context, site_url))\n return nullptr;", " std::set<RenderProcessHost*> eligible_foreground_hosts;\n std::set<Rende...
[ 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-6063", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6063/", "CWE ID": "CWE-787", "codeLink": "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608", "commit_id": "673ce95d481ea9368c4d4d43ac756ba1d6d9e608", "commit_message": "Correct mojo::WrapSha...
206
Determine whether the code is vulnerable or not.
[ "gfx::Rect RenderWidgetHostViewAura::GetViewBounds() const {\n return window_->GetBoundsInScreen();\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0886", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0886/", "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/18d67244984a574ba2dd8779faabc0e3e34f4b76", "commit_id": "18d67244984a574ba2dd8779faabc0e3e34f4b76", "commit_message": "Implement TextureImageTran...
207
Determine whether the code is vulnerable or not.
[ "void ChromeContentBrowserClient::BrowserURLHandlerCreated(\n BrowserURLHandler* handler) {\n handler->AddHandlerPair(&ExtensionWebUI::HandleChromeURLOverride,\n BrowserURLHandler::null_handler());\n handler->AddHandlerPair(BrowserURLHandler::null_handler(),\n ...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0921", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0921/", "CWE ID": "CWE-264", "codeLink": "https://github.com/chromium/chromium/commit/e9841fbdaf41b4a2baaa413f94d5c0197f9261f4", "commit_id": "e9841fbdaf41b4a2baaa413f94d5c0197f9261f4", "commit_message": "Ensure extensions and...
208
Determine whether the code is vulnerable or not.
[ "vcard_init_buffer_response(VCard *card, unsigned char *buf, int len)\n{\n VCardResponse *response;\n VCardBufferResponse *buffer_response;", " buffer_response = vcard_get_buffer_response(card);\n if (buffer_response) {\n vcard_set_buffer_response(card, NULL);\n vcard_buffer_response_del...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-6414", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-6414/", "CWE ID": "CWE-772", "codeLink": "https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c", "commit_id": "9113dc6a303604a2d9812ac70c17d076ef11886c", "commit_message": null, "l...
209
Determine whether the code is vulnerable or not.
[ "static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)\n{\n Image *image, *image2=NULL,\n *rotated_image;\n PixelPacket *q;", " unsigned int status;\n MATHeader MATLAB_HDR;\n size_t size;\n size_t CellType;\n QuantumInfo *quantum_info;\n ImageInfo *clone_info;\n int i;\n ssi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-13658", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-13658/", "CWE ID": "CWE-617", "codeLink": "https://github.com/ImageMagick/ImageMagick/commit/e5c063a1007506ba69e97a35effcdef944421c89", "commit_id": "e5c063a1007506ba69e97a35effcdef944421c89", "commit_message": "https://githu...
210
Determine whether the code is vulnerable or not.
[ "static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)\n{\n Image *image, *image2=NULL,\n *rotated_image;\n PixelPacket *q;", " unsigned int status;\n MATHeader MATLAB_HDR;\n size_t size;\n size_t CellType;\n QuantumInfo *quantum_info;\n ImageInfo *clone_info;\n int i;\n ssi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-13658", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-13658/", "CWE ID": "CWE-617", "codeLink": "https://github.com/ImageMagick/ImageMagick/commit/e5c063a1007506ba69e97a35effcdef944421c89", "commit_id": "e5c063a1007506ba69e97a35effcdef944421c89", "commit_message": "https://githu...
210
Determine whether the code is vulnerable or not.
[ "void DatabaseMessageFilter::OnDatabaseScheduledForDeletion(\n const string16& origin_identifier,\n const string16& database_name) {\n DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));\n Send(new DatabaseMsg_CloseImmediately(origin_identifier, database_name));\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0911", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0911/", "CWE ID": "CWE-22", "codeLink": "https://github.com/chromium/chromium/commit/ccfb891dc0c936a8806d663fe6581bf659761819", "commit_id": "ccfb891dc0c936a8806d663fe6581bf659761819", "commit_message": "WebDatabase: check pat...
211
Determine whether the code is vulnerable or not.
[ " virtual bool GetWifiAccessPoints(WifiAccessPointVector* result) {\n if (!EnsureCrosLoaded())\n return false;\n DeviceNetworkList* network_list = GetDeviceNetworkList();\n if (network_list == NULL)\n return false;\n result->clear();\n result->reserve(network_list->network_size);\n cons...
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/a3e2afaedd8190398ae45ccef34fcdee00fb19aa", "commit_id": "a3e2afaedd8190398ae45ccef34fcdee00fb19aa", "commit_message": "Fixed crash related to cellular network payment plan retreival.\n\nBUG=chromium-...
212
Determine whether the code is vulnerable or not.
[ "bool EventConverterEvdevImpl::HasCapsLockLed() const {\n return has_caps_lock_led_;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/c4363d1ca65494cb7b271625e1ff6541a9f593c9", "commit_id": "c4363d1ca65494cb7b271625e1ff6541a9f593c9", "commit_message": "ozone: evdev: Add a couple more trace events\n\nAdd trace event inside each read...
213
Determine whether the code is vulnerable or not.
[ "SPR_ListEntry(struct rx_call *call, afs_int32 aid, struct prcheckentry *aentry)\n{\n afs_int32 code;\n afs_int32 cid = ANONYMOUSID;", " code = listEntry(call, aid, aentry, &cid);\n osi_auditU(call, PTS_LstEntEvent, code, AUD_ID, aid, AUD_END);\n ViceLog(125, (\"PTS_ListEntry: code %d cid %d aid %d...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-2860", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2860/", "CWE ID": "CWE-284", "codeLink": "http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0", "commit_id": "396240cf070a806b91fea81131d034e1399af1e0", "commit_message": null, "lang...
214
Determine whether the code is vulnerable or not.
[ "TransportDIB::Id TransportDIB::id() const {\n return key_;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0838", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0838/", "CWE ID": "CWE-264", "codeLink": "https://github.com/chromium/chromium/commit/0bd1a6ddb5fb23dfea3e72d60e5e8df4cf5826bc", "commit_id": "0bd1a6ddb5fb23dfea3e72d60e5e8df4cf5826bc", "commit_message": "Make shared memory se...
215
Determine whether the code is vulnerable or not.
[ "static unsigned int Sys_CountFileList( char **list ) {\n\tint i = 0;", "\tif (list)\n\t{\n\t\twhile (*list)\n\t\t{\n\t\t\tlist++;\n\t\t\ti++;\n\t\t}\n\t}\n\treturn i;\n}\n" ]
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-6903", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-6903/", "CWE ID": "CWE-269", "codeLink": "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20", "commit_id": "b6ff2bcb1e4e6976d61e316175c6d7c99860fe20", "commit_message": "All: Don't load .pk3s as ...
216
Determine whether the code is vulnerable or not.
[ "void start_application(int no_sandbox, FILE *fp) {\n\tif (no_sandbox == 0) {\n\t\tenv_defaults();\n\t\tenv_apply();\n\t}\n\tumask(orig_umask);", "\tif (arg_debug) {\n\t\tprintf(\"starting application\\n\");\n\t\tprintf(\"LD_PRELOAD=%s\\n\", getenv(\"LD_PRELOAD\"));\n\t}", "\tif (arg_audit) {\n\t\tassert(arg_au...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2019-12589", "CVE Page": "https://www.cvedetails.com/cve/CVE-2019-12589/", "CWE ID": "CWE-284", "codeLink": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134", "commit_id": "eecf35c2f8249489a1d3e512bb07f0d427183134", "commit_message": "mount runtime secc...
217
Determine whether the code is vulnerable or not.
[ "ModuleExport void UnregisterAAIImage(void)\n{\n (void) UnregisterMagickInfo(\"AAI\");\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-10066", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10066/", "CWE ID": "CWE-119", "codeLink": "https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6", "commit_id": "f6e9d0d9955e85bdd7540b251cd50d598dacc5e6", "commit_message": null, "lang"...
218
Determine whether the code is vulnerable or not.
[ "bfd_rt_priority_handler(vector_t *strvec)\n{\n\tint priority = get_realtime_priority(strvec, \"BFD\");", "\tif (priority >= 0)\n\t\tglobal_data->bfd_realtime_priority = priority;\n}\n" ]
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-19045", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-19045/", "CWE ID": "CWE-200", "codeLink": "https://github.com/acassen/keepalived/commit/c6247a9ef2c7b33244ab1d3aa5d629ec49f0a067", "commit_id": "c6247a9ef2c7b33244ab1d3aa5d629ec49f0a067", "commit_message": "Add command line a...
219
Determine whether the code is vulnerable or not.
[ "ReadUserLogStateAccess::ReadUserLogStateAccess(\n\tconst ReadUserLog::FileState &state)\n{\n\tm_state = new ReadUserLogFileState(state);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-4930", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4930/", "CWE ID": "CWE-134", "codeLink": "https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867", "commit_id": "5e5571d1a431eb3c61977b6dd6ec90186ef79867", "commit_message": null...
220
Determine whether the code is vulnerable or not.
[ "static void __init hugetlb_register_all_nodes(void)\n{\n\tint nid;", "\tfor_each_node_state(nid, N_MEMORY) {\n\t\tstruct node *node = node_devices[nid];\n\t\tif (node->dev.id == nid)\n\t\t\thugetlb_register_node(node);\n\t}", "\t/*\n\t * Let the node device driver know we're here so it can\n\t * [un]register h...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-15128", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-15128/", "CWE ID": "CWE-119", "codeLink": "https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df", "commit_id": "1e3921471354244f70fe268586ff94a97a6dd4df", "commit_message": "userfaultfd: hugetlbfs...
221
Determine whether the code is vulnerable or not.
[ "static struct kvm *vmx_vm_alloc(void)\n{\n\tstruct kvm_vmx *kvm_vmx = vzalloc(sizeof(struct kvm_vmx));\n\treturn &kvm_vmx->kvm;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-12904", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-12904/", "CWE ID": null, "codeLink": "https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8", "commit_id": "727ba748e110b4de50d142edca9d6a9b7e6111d8", "commit_message": "kvm: nVMX: Enforce cpl=0 fo...
222
Determine whether the code is vulnerable or not.
[ "static int ldump_writer(lua_State *L, const void *b, size_t size, void *B)\n{\n (void) L;\n luaL_addlstring((luaL_Buffer *) B, (const char *) b, size);\n return 0;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2014-8109", "CVE Page": "https://www.cvedetails.com/cve/CVE-2014-8109/", "CWE ID": "CWE-264", "codeLink": "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb", "commit_id": "3f1693d558d0758f829c8b53993f1749ddf6ffcb", "commit_message": "Merge r1642499 from trunk:...
223
Determine whether the code is vulnerable or not.
[ "HB_Bool HB_MyanmarShape(HB_ShaperItem *item)\n{\n HB_Bool openType = FALSE;\n unsigned short *logClusters = item->log_clusters;", " HB_ShaperItem syllable = *item;\n int first_glyph = 0;", " int sstart = item->item.pos;\n int end = sstart + item->item.length;\n int i = 0;", " assert(i...
[ 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/2953a669ec0a32a25c6250d34bf895ec0eb63d27", "commit_id": "2953a669ec0a32a25c6250d34bf895ec0eb63d27", "commit_message": "Avoid an overflow in harfbuzz-myanmar.c\n\nAdds a guard to prevent invalid assig...
224
Determine whether the code is vulnerable or not.
[ "void ChromePasswordManagerClient::PasswordFormsParsed(\n const std::vector<autofill::PasswordForm>& forms) {\n if (!password_manager::bad_message::CheckChildProcessSecurityPolicy(\n password_manager_driver_bindings_.GetCurrentTargetFrame(), forms,\n BadMessageReason::CPMD_BAD_ORIGIN_FORMS_PAR...
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/961d0cda4cfc3bcf04aa48ccc32772d63af12d9b", "commit_id": "961d0cda4cfc3bcf04aa48ccc32772d63af12d9b", "commit_message": "Extract generation logic from the accessory controller into a separate one\n\nTh...
225
Determine whether the code is vulnerable or not.
[ "bool btif_av_is_connected(void) {\n btif_sm_state_t state = btif_sm_get_state(btif_av_cb.sm_handle);\n return ((state == BTIF_AV_STATE_OPENED) || (state == BTIF_AV_STATE_STARTED));\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-9476", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-9476/", "CWE ID": "CWE-416", "codeLink": "https://android.googlesource.com/platform/system/bt/+/dd28d8ddf2985d654781770c691c60b45d7f32b4", "commit_id": "dd28d8ddf2985d654781770c691c60b45d7f32b4", "commit_message": "DO NOT MERG...
226
Determine whether the code is vulnerable or not.
[ "void disable_progress_bar()\n{\n\tpthread_mutex_lock(&screen_mutex);\n\tif(progress_enabled) {\n\t\tprogress_bar(sym_count + dev_count + fifo_count + cur_blocks,\n\t\t\ttotal_inodes - total_files + total_blocks, columns);\n\t\tprintf(\"\\n\");\n\t}\n\tprogress_enabled = FALSE;\n\tpthread_mutex_unlock(&screen_mutex...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-4645", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-4645/", "CWE ID": "CWE-190", "codeLink": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1", "commit_id": "f95864afe8833fe3ad782d714b41378e860977b1", "commit_message": "unsquashfs-4: A...
227
Determine whether the code is vulnerable or not.
[ "static inline struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,\n\t\t\tstruct shmem_inode_info *info, pgoff_t index)\n{\n\treturn swapin_readahead(swap, gfp, NULL, 0);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-1767", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-1767/", "CWE ID": "CWE-399", "codeLink": "https://github.com/torvalds/linux/commit/5f00110f7273f9ff04ac69a5f85bb535a4fd0987", "commit_id": "5f00110f7273f9ff04ac69a5f85bb535a4fd0987", "commit_message": "tmpfs: fix use-after-fre...
228
Determine whether the code is vulnerable or not.
[ "mainloop_add_trigger(int priority, int(*dispatch) (gpointer user_data), gpointer userdata)\n{\n GSource *source = NULL;", " CRM_ASSERT(sizeof(crm_trigger_t) > sizeof(GSource));\n source = g_source_new(&crm_trigger_funcs, sizeof(crm_trigger_t));\n CRM_ASSERT(source != NULL);", " return mainloop_s...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0281", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0281/", "CWE ID": "CWE-399", "codeLink": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93", "commit_id": "564f7cc2a51dcd2f28ab12a13394f31be5aa3c93", "commit_message": "High: core: Inter...
229
Determine whether the code is vulnerable or not.
[ "bool xmp_get_property_bool(XmpPtr xmp, const char *schema, const char *name,\n bool *property, uint32_t *propsBits)\n{\n CHECK_PTR(xmp, false);\n RESET_ERROR;", " bool ret = false;\n try {\n auto txmp = reinterpret_cast<const SXMPMeta *>(xmp);\n XMP_OptionBits ...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-18234", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-18234/", "CWE ID": "CWE-416", "codeLink": "https://cgit.freedesktop.org/exempi/commit/?id=c26d5beb60a5a85f76259f50ed3e08c8169b0a0c", "commit_id": "c26d5beb60a5a85f76259f50ed3e08c8169b0a0c", "commit_message": null, "lang": "...
230
Determine whether the code is vulnerable or not.
[ "static inline void address_space_stw_internal(AddressSpace *as,\n hwaddr addr, uint32_t val,\n MemTxAttrs attrs,\n MemTxResult *result,\n ...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-8818", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-8818/", "CWE ID": "CWE-20", "codeLink": "https://git.qemu.org/?p=qemu.git;a=commit;h=b242e0e0e2969c044a318e56f7988bbd84de1f63", "commit_id": "b242e0e0e2969c044a318e56f7988bbd84de1f63", "commit_message": null, "lang": "C", ...
231
Determine whether the code is vulnerable or not.
[ "bool SiteInstanceImpl::IsSameWebSite(BrowserContext* browser_context,\n const GURL& real_src_url,\n const GURL& real_dest_url,\n bool should_compare_effective_urls) {\n GURL src_url =\n should_compare_...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1678", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1678/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/1f5ad409dbf5334523931df37598ea49e9849c87", "commit_id": "1f5ad409dbf5334523931df37598ea49e9849c87", "commit_message": "Allow origin lock for...
232
Determine whether the code is vulnerable or not.
[ "string16 Browser::GetWindowTitleForCurrentTab() const {\n TabContents* contents = GetSelectedTabContents();\n string16 title;", " if (contents) {\n title = contents->GetTitle();\n FormatTitleForDisplay(&title);\n }\n if (title.empty())\n title = TabContentsWrapper::GetDefaultTitle();", "#if defin...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-3896", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3896/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d", "commit_id": "5925dff83699508b5e2735afb0297dfb310e159d", "commit_message": "Implement a bubble th...
233
Determine whether the code is vulnerable or not.
[ "CSSRule *CSSStyleSheet::ownerRule() const\n{\n return (parent() && parent()->isRule()) ? static_cast<CSSRule*>(parent()) : 0;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/3eb1f512d8646db3a70aaef108a8f5ad8b3f013d", "commit_id": "3eb1f512d8646db3a70aaef108a8f5ad8b3f013d", "commit_message": "2010-06-18 Adam Barth <abarth@webkit.org>\n\n Reviewed by Darin Adler.\...
234
Determine whether the code is vulnerable or not.
[ "static void queue_interrupt(struct fuse_iqueue *fiq, struct fuse_req *req)\n{\n\tspin_lock(&fiq->waitq.lock);\n\tif (test_bit(FR_FINISHED, &req->flags)) {\n\t\tspin_unlock(&fiq->waitq.lock);\n\t\treturn;\n\t}\n\tif (list_empty(&req->intr_entry)) {\n\t\tlist_add_tail(&req->intr_entry, &fiq->interrupts);\n\t\twake_u...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2019-11487", "CVE Page": "https://www.cvedetails.com/cve/CVE-2019-11487/", "CWE ID": "CWE-416", "codeLink": "https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb", "commit_id": "15fab63e1e57be9fdb5eec1bbc5916e9825e9acb", "commit_message": "fs: prevent page refco...
235
Determine whether the code is vulnerable or not.
[ "void FeatureInfo::InitializeForTesting(ContextType context_type) {\n initialized_ = false;\n Initialize(context_type, false /* is_passthrough_cmd_decoder */,\n DisallowedFeatures());\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-5057", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5057/", "CWE ID": "CWE-125", "codeLink": "https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6", "commit_id": "cbc5d5153b18ea387f4769caa01d1339261f6ed6", "commit_message": "gpu: Disallow use of ...
236
Determine whether the code is vulnerable or not.
[ "int sanity_check_ckpt(struct f2fs_sb_info *sbi)\n{\n\tunsigned int total, fsmeta;\n\tstruct f2fs_super_block *raw_super = F2FS_RAW_SUPER(sbi);\n\tstruct f2fs_checkpoint *ckpt = F2FS_CKPT(sbi);\n\tunsigned int ovp_segments, reserved_segments;\n\tunsigned int main_segs, blocks_per_seg;\n\tint i;", "\ttotal = le32_...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-18200", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-18200/", "CWE ID": "CWE-20", "codeLink": "https://github.com/torvalds/linux/commit/638164a2718f337ea224b747cf5977ef143166a4", "commit_id": "638164a2718f337ea224b747cf5977ef143166a4", "commit_message": "f2fs: fix potential pan...
237
Determine whether the code is vulnerable or not.
[ "static void sigShutdownHandler(int sig) {\n char *msg;", " switch (sig) {\n case SIGINT:\n msg = \"Received SIGINT scheduling shutdown...\";\n break;\n case SIGTERM:\n msg = \"Received SIGTERM scheduling shutdown...\";\n break;\n default:\n msg = \"Received shutd...
[ 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-10517", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10517/", "CWE ID": "CWE-254", "codeLink": "https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50", "commit_id": "874804da0c014a7d704b3d285aa500098a931f50", "commit_message": "Security: Cross Protoco...
238
Determine whether the code is vulnerable or not.
[ "void CSoundFile::ExtendedS3MCommands(CHANNELINDEX nChn, ModCommand::PARAM param)\n{\n\tModChannel *pChn = &m_PlayState.Chn[nChn];\n\tuint8 command = param & 0xF0;\n\tparam &= 0x0F;\n\tswitch(command)\n\t{\n\tcase 0x10:\tpChn->dwFlags.set(CHN_GLISSANDO, param != 0); break;\n\tcase 0x20:\tif(!m_SongFlags[SONG_FIRSTT...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-10017", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-10017/", "CWE ID": "CWE-125", "codeLink": "https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76", "commit_id": "492022c7297ede682161d9c0ec2de15526424e76", "commit_message": "[Fix] Possible out-of...
239
Determine whether the code is vulnerable or not.
[ " void CheckHeaderFails(const char* header_field) {\n CheckHeaderFails(header_field, \"foo\");\n }\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-6148", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6148/", "CWE ID": "CWE-93", "codeLink": "https://github.com/chromium/chromium/commit/fa68dcfd12e376aa880b3193a77b896e6c54efdf", "commit_id": "fa68dcfd12e376aa880b3193a77b896e6c54efdf", "commit_message": "Verify that header val...
240
Determine whether the code is vulnerable or not.
[ "exsltDateHourInDay (const xmlChar *dateTime)\n{\n exsltDateValPtr dt;\n double ret;", " if (dateTime == NULL) {\n#ifdef WITH_TIME\n\tdt = exsltDateCurrent();\n\tif (dt == NULL)\n#endif\n\t return xmlXPathNAN;\n } else {\n\tdt = exsltDateParse(dateTime);\n\tif (dt == NULL)\n\t return xmlXPathNAN...
[ 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1683", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1683/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab", "commit_id": "96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab", "commit_message": "Roll libxslt to 89168...
241
Determine whether the code is vulnerable or not.
[ "file_ms_alloc(int flags)\n{\n\tstruct magic_set *ms;\n\tsize_t i, len;", "\tif ((ms = CAST(struct magic_set *, calloc((size_t)1,\n\t sizeof(struct magic_set)))) == NULL)\n\t\treturn NULL;", "\tif (magic_setflags(ms, flags) == -1) {\n\t\terrno = EINVAL;\n\t\tgoto free;\n\t}", "\tms->o.buf = ms->o.pbuf = NU...
[ 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2014-3538", "CVE Page": "https://www.cvedetails.com/cve/CVE-2014-3538/", "CWE ID": "CWE-399", "codeLink": "https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320", "commit_id": "4a284c89d6ef11aca34da65da7d673050a5ea320", "commit_message": "* Enforce limit of 8K on rege...
242
Determine whether the code is vulnerable or not.
[ "sparse_scan_file (struct tar_sparse_file *file)\n{\n /* always check for completely sparse files */\n if (sparse_scan_file_wholesparse (file))\n return true;", " switch (hole_detection)\n {\n case HOLE_DETECTION_DEFAULT:\n case HOLE_DETECTION_SEEK:\n#ifdef SEEK_HOLE\n if (sparse_scan_file_see...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-20482", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-20482/", "CWE ID": "CWE-835", "codeLink": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454", "commit_id": "c15c42ccd1e2377945fd0414eca1a49294bff454", "commit_message": null, "la...
243
Determine whether the code is vulnerable or not.
[ "void BrowserView::Paste() {\n if (!DoCutCopyPaste(&content::RenderWidgetHost::Paste)) {\n ui_controls::SendKeyPress(GetNativeWindow(), ui::VKEY_V,\n true, false, false, false);\n }\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2012-5148", "CVE Page": "https://www.cvedetails.com/cve/CVE-2012-5148/", "CWE ID": "CWE-20", "codeLink": "https://github.com/chromium/chromium/commit/e89cfcb9090e8c98129ae9160c513f504db74599", "commit_id": "e89cfcb9090e8c98129ae9160c513f504db74599", "commit_message": "Remove TabContents fro...
244
Determine whether the code is vulnerable or not.
[ "MediaControlPlayButtonElement::MediaControlPlayButtonElement(\n MediaControls& mediaControls)\n : MediaControlInputElement(mediaControls, MediaPlayButton) {}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-1271", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1271/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/74fce5949bdf05a92c2bc0bd98e6e3e977c55376", "commit_id": "74fce5949bdf05a92c2bc0bd98e6e3e977c55376", "commit_message": "Fixed volume slider e...
245
Determine whether the code is vulnerable or not.
[ "static void mmtimer_setup_int_0(int cpu, u64 expires)\n{\n\tu64 val;", "\t/* Disable interrupt */\n\tHUB_S((u64 *)LOCAL_MMR_ADDR(SH_RTC1_INT_ENABLE), 0UL);", "\t/* Initialize comparator value */\n\tHUB_S((u64 *)LOCAL_MMR_ADDR(SH_INT_CMPB), -1L);", "\t/* Clear pending bit */\n\tmmtimer_clr_int_pending(0);", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-3209", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3209/", "CWE ID": "CWE-189", "codeLink": "https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d", "commit_id": "f8bd2258e2d520dff28c855658bd24bdafb5102d", "commit_message": "remove div_long_long_rem...
246
Determine whether the code is vulnerable or not.
[ "asmlinkage long sys_oabi_semop(int semid, struct oabi_sembuf __user *tsops,\n\t\t\t unsigned nsops)\n{\n\treturn sys_oabi_semtimedop(semid, tsops, nsops, NULL);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-1759", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-1759/", "CWE ID": "CWE-189", "codeLink": "https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9", "commit_id": "0f22072ab50cac7983f9660d33974b45184da4f9", "commit_message": "ARM: 6891/1: prevent hea...
247
Determine whether the code is vulnerable or not.
[ " static void RegisterJSONConverter(\n base::JSONValueConverter<ExpectFileTasksMessage>* converter) {\n converter->RegisterCustomField(\n \"openType\", &ExpectFileTasksMessage::open_type, &MapStringToOpenType);\n converter->RegisterRepeatedString(\"fileNames\",\n ...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-5194", "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251", "commit_id": "d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251", "commit_message": "Clear Shill stub config in offline file manager tests\n\nThe Shill st...
248
Determine whether the code is vulnerable or not.
[ "Response EmulationHandler::ClearDeviceMetricsOverride() {\n if (!device_emulation_enabled_)\n return Response::OK();\n if (GetWebContents())\n GetWebContents()->ClearDeviceEmulationSize();\n else\n return Response::Error(\"Can't find the associated web contents\");\n device_emulation_enabled_ = false;...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-6111", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6111/", "CWE ID": "CWE-20", "codeLink": "https://github.com/chromium/chromium/commit/3c8e4852477d5b1e2da877808c998dc57db9460f", "commit_id": "3c8e4852477d5b1e2da877808c998dc57db9460f", "commit_message": "DevTools: speculative ...
249
Determine whether the code is vulnerable or not.
[ "void DevToolsClient::OnDispatchOnInspectorFrontend(const std::string& message) {\n web_tools_frontend_->dispatchOnInspectorFrontend(\n WebString::fromUTF8(message));\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-2861", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2861/", "CWE ID": "CWE-20", "codeLink": "https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce", "commit_id": "8262245d384be025f13e2a5b3a03b7e5c98374ce", "commit_message": "DevTools: move DevTool...
250
Determine whether the code is vulnerable or not.
[ "bool NavigationController::IsURLInPageNavigation(const GURL& url) const {\n NavigationEntry* last_committed = GetLastCommittedEntry();\n if (!last_committed)\n return false;\n return AreURLsInPageNavigation(last_committed->url(), url);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/b9e2ecab97a8a7f3cce06951ab92a3eaef559206", "commit_id": "b9e2ecab97a8a7f3cce06951ab92a3eaef559206", "commit_message": "Do not discount a MANUAL_SUBFRAME load just because it involved\nsome redirects....
251
Determine whether the code is vulnerable or not.
[ "static void methodWithEnforceRangeUInt8MethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info)\n{\n TRACE_EVENT_SET_SAMPLING_STATE(\"Blink\", \"DOMMethod\");\n TestObjectV8Internal::methodWithEnforceRangeUInt8Method(info);\n TRACE_EVENT_SET_SAMPLING_STATE(\"V8\", \"V8Execution\");\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2014-1713", "CVE Page": "https://www.cvedetails.com/cve/CVE-2014-1713/", "CWE ID": "CWE-399", "codeLink": "https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154", "commit_id": "f85a87ec670ad0fce9d98d90c9a705b72a288154", "commit_message": "document.location bin...
252
Determine whether the code is vulnerable or not.
[ "ewk_frame_scroll_size_get(const Evas_Object* ewkFrame, int* width, int* height)\n{\n if (width)\n *width = 0;\n if (height)\n *height = 0;\n EWK_FRAME_SD_GET_OR_RETURN(ewkFrame, smartData, false);\n EINA_SAFETY_ON_NULL_RETURN_VAL(smartData->frame, false);\n EINA_SAFETY_ON_NULL_RETURN_V...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-3103", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3103/", "CWE ID": "CWE-399", "codeLink": "https://github.com/chromium/chromium/commit/b2dfe7c175fb21263f06eb586f1ed235482a3281", "commit_id": "b2dfe7c175fb21263f06eb586f1ed235482a3281", "commit_message": "[EFL] fast/frames/fra...
253
Determine whether the code is vulnerable or not.
[ "int modbus_flush(modbus_t *ctx)\n{\n int rc;", " if (ctx == NULL) {\n errno = EINVAL;\n return -1;\n }", " rc = ctx->backend->flush(ctx);\n if (rc != -1 && ctx->debug) {\n /* Not all backends are able to return the number of bytes flushed */\n printf(\"Bytes flushed (...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2019-14463", "CVE Page": "https://www.cvedetails.com/cve/CVE-2019-14463/", "CWE ID": "CWE-125", "codeLink": "https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc", "commit_id": "5ccdf5ef79d742640355d1132fa9e2abc7fbaefc", "commit_message": "Fix VD-1301 and VD...
254
Determine whether the code is vulnerable or not.
[ "choose_comp(struct sshcomp *comp, char *client, char *server)\n{\n\tchar *name = match_list(client, server, NULL);", "\tif (name == NULL)\n\t\treturn SSH_ERR_NO_COMPRESS_ALG_MATCH;\n\tif (strcmp(name, \"zlib@openssh.com\") == 0) {\n\t\tcomp->type = COMP_DELAYED;\n\t} else if (strcmp(name, \"zlib\") == 0) {\n\t\t...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-10708", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10708/", "CWE ID": "CWE-476", "codeLink": "https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737", "commit_id": "28652bca29046f62c7045e933e6b931de1d16737", "commit_message": null, "lang...
255
Determine whether the code is vulnerable or not.
[ "void RenderView::didReceiveResponse(\n WebFrame* frame, unsigned identifier, const WebURLResponse& response) {", " SiteIsolationMetrics::LogMimeTypeForCrossOriginRequest(frame,\n identifier,\n resp...
[ 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-2861", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2861/", "CWE ID": "CWE-20", "codeLink": "https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce", "commit_id": "8262245d384be025f13e2a5b3a03b7e5c98374ce", "commit_message": "DevTools: move DevTool...
256
Determine whether the code is vulnerable or not.
[ "need_socktype_protocol_hack(void)\n{\n\tif (!tested_for_getaddrinfo_hacks)\n\t\ttest_for_getaddrinfo_hacks();\n\treturn need_socktype_protocol_hack_;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-10196", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10196/", "CWE ID": "CWE-119", "codeLink": "https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5", "commit_id": "329acc18a0768c21ba22522f01a5c7f46cacc4d5", "commit_message": "evutil_parse_sockad...
257
Determine whether the code is vulnerable or not.
[ "void RenderViewImpl::DidFlushPaint() {\n pepper_helper_->ViewFlushedPaint();", " if (!webview())\n return;", " WebFrame* main_frame = webview()->mainFrame();", " if (!main_frame->provisionalDataSource()) {\n WebDataSource* ds = main_frame->dataSource();\n DocumentState* document_state = Document...
[ 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2013-0918", "CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0918/", "CWE ID": "CWE-264", "codeLink": "https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b", "commit_id": "0a57375ad73780e61e1770a9d88b0529b0dbd33b", "commit_message": "Let the browser handl...
258
Determine whether the code is vulnerable or not.
[ "OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,\n OMX_IN OMX_INDEXTYPE paramIndex,\n OMX_IN OMX_PTR paramData)\n{\n (void)hComp;\n OMX_ERRORTYPE eRet = OMX_ErrorNone;", "\n if (m_state == OMX_StateInvalid) {\n DEBUG_PRINT_ERROR(\"ERROR: Set Param in Invalid ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1...
BIGVUL
{ "CVE ID": "CVE-2016-2480", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2480/", "CWE ID": "CWE-20", "codeLink": "https://android.googlesource.com/platform/hardware/qcom/media/+/560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8", "commit_id": "560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8", "commit_message": "DO...
259
Determine whether the code is vulnerable or not.
[ "OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,\n OMX_IN OMX_INDEXTYPE paramIndex,\n OMX_IN OMX_PTR paramData)\n{\n (void)hComp;\n OMX_ERRORTYPE eRet = OMX_ErrorNone;", "\n if (m_state == OMX_StateInvalid) {\n DEBUG_PRINT_ERROR(\"ERROR: Set Param in Invalid ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
BIGVUL
{ "CVE ID": "CVE-2016-2480", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2480/", "CWE ID": "CWE-20", "codeLink": "https://android.googlesource.com/platform/hardware/qcom/media/+/560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8", "commit_id": "560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8", "commit_message": "DO...
259
Determine whether the code is vulnerable or not.
[ "xsltStyleInitializeStylesheetModule(xsltStylesheetPtr style,\n\t\t\t\t const xmlChar * URI)\n{\n xsltExtDataPtr dataContainer;\n void *userData = NULL;\n xsltExtModulePtr module;", " if ((style == NULL) || (URI == NULL))\n\treturn(NULL);", " if (xsltExtensionsHash == NULL) {\n#ifdef WITH_XSL...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1683", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1683/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab", "commit_id": "96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab", "commit_message": "Roll libxslt to 89168...
260
Determine whether the code is vulnerable or not.
[ "bool SyncBackendHost::Core::IsCurrentThreadSafeForModel(\n syncable::ModelType model_type) {\n base::AutoLock lock(host_->registrar_lock_);", " browser_sync::ModelSafeRoutingInfo::const_iterator routing_it =\n host_->registrar_.routing_info.find(model_type);\n if (routing_it == host_->registrar_.routi...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-2351", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2351/", "CWE ID": "CWE-399", "codeLink": "https://github.com/chromium/chromium/commit/bf381d8a02c3d272d4dd879ac719d8993dfb5ad6", "commit_id": "bf381d8a02c3d272d4dd879ac719d8993dfb5ad6", "commit_message": "Enable HistoryModelWo...
261
Determine whether the code is vulnerable or not.
[ "yysyntax_error (YYSIZE_T *yymsg_alloc, char **yymsg,\n yytype_int16 *yyssp, int yytoken)\n{\n YYSIZE_T yysize0 = yytnamerr (YY_NULLPTR, yytname[yytoken]);\n YYSIZE_T yysize = yysize0;\n enum { YYERROR_VERBOSE_ARGS_MAXIMUM = 5 };\n /* Internationalized format string. */\n const char *yyformat = ...
[ 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-9438", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-9438/", "CWE ID": "CWE-674", "codeLink": "https://github.com/VirusTotal/yara/commit/10e8bd3071677dd1fa76beeef4bc2fc427cea5e7", "commit_id": "10e8bd3071677dd1fa76beeef4bc2fc427cea5e7", "commit_message": "Fix issue #674 for hex ...
262
Determine whether the code is vulnerable or not.
[ "void LocalFrameClientImpl::AbortClientNavigation() {\n if (web_frame_->Client())\n web_frame_->Client()->AbortClientNavigation();\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2018-20067", "CVE Page": "https://www.cvedetails.com/cve/CVE-2018-20067/", "CWE ID": "CWE-254", "codeLink": "https://github.com/chromium/chromium/commit/a7d715ae5b654d1f98669fd979a00282a7229044", "commit_id": "a7d715ae5b654d1f98669fd979a00282a7229044", "commit_message": "Prevent renderer in...
263
Determine whether the code is vulnerable or not.
[ "void bnep_net_setup(struct net_device *dev)\n{", "\tmemset(dev->broadcast, 0xff, ETH_ALEN);\n \tdev->addr_len = ETH_ALEN;\n \n \tether_setup(dev);", "", " \tdev->netdev_ops = &bnep_netdev_ops;\n \n \tdev->watchdog_timeo = HZ * 2;\n}" ]
[ 1, 1, 0, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-4112", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/", "CWE ID": "CWE-264", "codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162", "commit_id": "550fd08c2cebad61c548def135f67aba284c6162", "commit_message": "net: Audit drivers to id...
264
Determine whether the code is vulnerable or not.
[ "void bnep_net_setup(struct net_device *dev)\n{", "\tmemset(dev->broadcast, 0xff, ETH_ALEN);\n \tdev->addr_len = ETH_ALEN;\n \n \tether_setup(dev);", "\tdev->priv_flags &= ~IFF_TX_SKB_SHARING;", " \tdev->netdev_ops = &bnep_netdev_ops;\n \n \tdev->watchdog_timeo = HZ * 2;\n}" ]
[ 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-4112", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/", "CWE ID": "CWE-264", "codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162", "commit_id": "550fd08c2cebad61c548def135f67aba284c6162", "commit_message": "net: Audit drivers to id...
264
Determine whether the code is vulnerable or not.
[ "void DownloadController::Init(JNIEnv* env, jobject obj) {\n java_object_ = new JavaObject;\n java_object_->obj_ = env->NewWeakGlobalRef(obj);\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-1296", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1296/", "CWE ID": "CWE-254", "codeLink": "https://github.com/chromium/chromium/commit/5fc08cfb098acce49344d2e89cc27c915903f81c", "commit_id": "5fc08cfb098acce49344d2e89cc27c915903f81c", "commit_message": "Clean up Android Down...
265
Determine whether the code is vulnerable or not.
[ "dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p)\n{\n\tif (kaslr_enabled()) {\n\t\tpr_emerg(\"Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\\n\",\n\t\t\t kaslr_offset(),\n\t\t\t __START_KERNEL,\n\t\t\t __START_KERNEL_map,\n\t\t\t MODULES_VADDR-1);\n\t} else {\n\t\tpr_emer...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-3699", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-3699/", "CWE ID": "CWE-264", "codeLink": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76", "commit_id": "a4a5ed2835e8ea042868b7401dced3f517cafa76", "commit_message": "acpi: Disable ACPI table ov...
266
Determine whether the code is vulnerable or not.
[ "void kvm_arch_irq_bypass_del_producer(struct irq_bypass_consumer *cons,\n\t\t\t\t struct irq_bypass_producer *prod)\n{\n\tint ret;\n\tstruct kvm_kernel_irqfd *irqfd =\n\t\tcontainer_of(cons, struct kvm_kernel_irqfd, consumer);", "\tif (!kvm_x86_ops->update_pi_irte) {\n\t\tWARN_ON(irqfd->producer != NULL);\n...
[ 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-7513", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-7513/", "CWE ID": null, "codeLink": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8", "commit_id": "0185604c2d82c560dab2f2933a18f797e74ab5a8", "commit_message": "KVM: x86: Reload pit counters...
267
Determine whether the code is vulnerable or not.
[ "bool WebContext::popupBlockerEnabled() const {\n if (IsInitialized()) {\n return context_->IsPopupBlockerEnabled();\n }", " return construct_props_->popup_blocker_enabled;\n}\n" ]
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1586", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1586/", "CWE ID": "CWE-20", "codeLink": "https://git.launchpad.net/oxide/commit/?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac", "commit_id": "29014da83e5fc358d6bff0f574e9ed45e61a35ac", "commit_message": null, "lang": "CPP", ...
268
Determine whether the code is vulnerable or not.
[ "static inline MagickBooleanType AcquireCacheNexusPixels(\n const CacheInfo *magick_restrict cache_info,NexusInfo *nexus_info,\n ExceptionInfo *exception)\n{\n if (nexus_info->length != (MagickSizeType) ((size_t) nexus_info->length))\n return(MagickFalse);\n nexus_info->mapped=MagickFalse;\n nexus_info->cac...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-7539", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-7539/", "CWE ID": "CWE-399", "codeLink": "https://github.com/ImageMagick/ImageMagick/commit/4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c", "commit_id": "4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c", "commit_message": "http://www.imag...
269
Determine whether the code is vulnerable or not.
[ "void PushMessagingServiceImpl::IncreasePushSubscriptionCount(int add,\n bool is_pending) {\n DCHECK_GT(add, 0);\n if (push_subscription_count_ + pending_push_subscription_count_ == 0) {\n GetGCMDriver()->AddAppHandler(kPushMessagingAppIdentifierPrefi...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-5125", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5125/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/1a90b2996bfd341a04073f0054047073865b485d", "commit_id": "1a90b2996bfd341a04073f0054047073865b485d", "commit_message": "Remove some senseless...
270
Determine whether the code is vulnerable or not.
[ "const char* ExtensionOptionsGuest::GetAPINamespace() const {\n return extensionoptions::kAPINamespace;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-1658", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1658/", "CWE ID": "CWE-284", "codeLink": "https://github.com/chromium/chromium/commit/5c437bcc7a51edbef45242c5173cf7871fde2866", "commit_id": "5c437bcc7a51edbef45242c5173cf7871fde2866", "commit_message": "Make extensions use a...
271
Determine whether the code is vulnerable or not.
[ "static int set_stream_info_from_input_stream(AVStream *st, struct playlist *pls, AVStream *ist)\n{\n int err;", " err = avcodec_parameters_copy(st->codecpar, ist->codecpar);\n if (err < 0)\n return err;", " if (pls->is_id3_timestamped) /* custom timestamps via id3 */\n avpriv_set_pts_...
[ 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-14058", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-14058/", "CWE ID": "CWE-835", "codeLink": "https://github.com/FFmpeg/FFmpeg/commit/7ec414892ddcad88313848494b6fc5f437c9ca4a", "commit_id": "7ec414892ddcad88313848494b6fc5f437c9ca4a", "commit_message": "avformat/hls: Fix DoS d...
272
Determine whether the code is vulnerable or not.
[ "status_t ESDS::InitCheck() const {\n return mInitCheck;\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2015-1539", "CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1539/", "CWE ID": "CWE-189", "codeLink": "https://android.googlesource.com/platform/frameworks/av/+/5e751957ba692658b7f67eb03ae5ddb2cd3d970c", "commit_id": "5e751957ba692658b7f67eb03ae5ddb2cd3d970c", "commit_message": "Fix int...
273
Determine whether the code is vulnerable or not.
[ "void HTMLFormElement::ParseAttribute(\n const AttributeModificationParams& params) {\n const QualifiedName& name = params.name;\n if (name == actionAttr) {\n attributes_.ParseAction(params.new_value);\n LogUpdateAttributeIfIsolatedWorldAndInDocument(\"form\", params);", " if (GetDocument().GetInsec...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2019-5790", "CVE Page": "https://www.cvedetails.com/cve/CVE-2019-5790/", "CWE ID": "CWE-190", "codeLink": "https://github.com/chromium/chromium/commit/88fcb3a6899d77b64195423333ad81a00803f997", "commit_id": "88fcb3a6899d77b64195423333ad81a00803f997", "commit_message": "Move user activation ...
274
Determine whether the code is vulnerable or not.
[ "content::JavaScriptDialogCreator* Browser::GetJavaScriptDialogCreator() {\n return GetJavaScriptDialogCreatorInstance();\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2011-3896", "CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3896/", "CWE ID": "CWE-119", "codeLink": "https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d", "commit_id": "5925dff83699508b5e2735afb0297dfb310e159d", "commit_message": "Implement a bubble th...
275
Determine whether the code is vulnerable or not.
[ "int ip_setsockopt(struct sock *sk, int level,\n\t\tint optname, char __user *optval, unsigned int optlen)\n{\n\tint err;", "\tif (level != SOL_IP)\n\t\treturn -ENOPROTOOPT;", "\terr = do_ip_setsockopt(sk, level, optname, optval, optlen);\n#ifdef CONFIG_NETFILTER\n\t/* we need to exclude all possible ENOPROTOOP...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2012-3552", "CVE Page": "https://www.cvedetails.com/cve/CVE-2012-3552/", "CWE ID": "CWE-362", "codeLink": "https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259", "commit_id": "f6d8bd051c391c1c0458a30b2a7abcd939329259", "commit_message": "inet: add RCU protection...
276
Determine whether the code is vulnerable or not.
[ "GLenum GLES2DecoderImpl::GetBoundColorDrawBufferInternalFormat(\n GLint drawbuffer_i) {\n DCHECK(drawbuffer_i >= 0 &&\n drawbuffer_i < static_cast<GLint>(group_->max_draw_buffers()));\n Framebuffer* framebuffer = GetBoundDrawFramebuffer();\n if (!framebuffer) {\n return 0;\n }\n GLenum drawbuffe...
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2016-5219", "CVE Page": "https://www.cvedetails.com/cve/CVE-2016-5219/", "CWE ID": "CWE-416", "codeLink": "https://github.com/chromium/chromium/commit/a4150b688a754d3d10d2ca385155b1c95d77d6ae", "commit_id": "a4150b688a754d3d10d2ca385155b1c95d77d6ae", "commit_message": "Add GL_PROGRAM_COMPLE...
277
Determine whether the code is vulnerable or not.
[ "void WebPluginDelegateStub::CreateSharedBuffer(\n size_t size,\n base::SharedMemory* shared_buf,\n base::SharedMemoryHandle* remote_handle) {\n if (!shared_buf->Create(std::wstring(), false, false, size)) {\n NOTREACHED();\n return;\n }\n if (!shared_buf->Map(size)) {\n NOTREACHED();\n shar...
[ 1, 1, 1 ]
BIGVUL
{ "CVE ID": null, "CVE Page": null, "CWE ID": null, "codeLink": "https://github.com/chromium/chromium/commit/ea3d1d84be3d6f97bf50e76511c9e26af6895533", "commit_id": "ea3d1d84be3d6f97bf50e76511c9e26af6895533", "commit_message": "Fix passing pointers between processes.\n\nBUG=31880\nReview URL: http://coderev...
278
Determine whether the code is vulnerable or not.
[ "void HTMLFormControlElement::willChangeForm() {\n ListedElement::willChangeForm();\n formOwnerSetNeedsValidityCheck();\n if (formOwner() && canBeSuccessfulSubmitButton())\n formOwner()->invalidateDefaultButtonStyle();\n}\n" ]
[ 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-5016", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5016/", "CWE ID": "CWE-1021", "codeLink": "https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc", "commit_id": "a8e17a3031b6ad69c399e5e04dd0084e577097fc", "commit_message": "Form validation: Do ...
279
Determine whether the code is vulnerable or not.
[ "ModuleExport size_t RegisterMAPImage(void)\n{\n MagickInfo\n *entry;", " entry=SetMagickInfo(\"MAP\");\n entry->decoder=(DecodeImageHandler *) ReadMAPImage;\n entry->encoder=(EncodeImageHandler *) WriteMAPImage;\n entry->adjoin=MagickFalse;\n entry->format_type=ExplicitFormatType;\n entry->raw=MagickTr...
[ 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-12663", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-12663/", "CWE ID": "CWE-772", "codeLink": "https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074", "commit_id": "6233ef75bb973745ab1092b59aea8fe316f09074", "commit_message": "https://githu...
280
Determine whether the code is vulnerable or not.
[ "static int do_boot_mode(struct edgeport_serial *serial,\n\t\tconst struct firmware *fw)\n{\n\tstruct device *dev = &serial->serial->interface->dev;\n\tint status = 0;\n\tstruct edge_ti_manuf_descriptor *ti_manuf_desc;\n\tstruct edgeport_fw_hdr *fw_hdr = (struct edgeport_fw_hdr *)fw->data;", "\tdev_dbg(dev, \"%s ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BIGVUL
{ "CVE ID": "CVE-2017-8924", "CVE Page": "https://www.cvedetails.com/cve/CVE-2017-8924/", "CWE ID": "CWE-191", "codeLink": "https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e", "commit_id": "654b404f2a222f918af9b0cd18ad469d0c941a8e", "commit_message": "USB: serial: io_ti: fix ...
281