prompt stringclasses 1
value | completions listlengths 1 1.33k | labels listlengths 1 1.33k | source stringclasses 1
value | other_info dict | index int64 0 151k |
|---|---|---|---|---|---|
Determine whether the code is vulnerable or not. | [
"gpc_gb16(Pixel *out, const Pixel *in, const Background *back)\n{\n if (in->a <= 0)\n out->r = out->g = out->b = back->ig;",
" else if (in->a >= 65535)\n out->r = out->g = out->b = isRGB(in->g);",
" else\n {\n double a = in->a / 65535.;\n double a1 = 1-a;",
" a /= 65535;\n out->r = out->g ... | [
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-3751",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-3751/",
"CWE ID": null,
"codeLink": "https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca",
"commit_id": "9d4853418ab2f754c2b63e091c29c5529b8b86ca",
"commit_message": "DO NOT MER... | 189 |
Determine whether the code is vulnerable or not. | [
" void StartExtractFileFeatures() {\n DCHECK_CURRENTLY_ON(BrowserThread::UI);\n DCHECK(item_); // Called directly from Start(), item should still exist.\n BrowserThread::GetBlockingPool()->PostWorkerTaskWithShutdownBehavior(\n FROM_HERE,\n base::Bind(&CheckClientDownloadRequest::ExtractFile... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-6661",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-6661/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/23cbfc1d685fa7389e88588584e02786820d4d26",
"commit_id": "23cbfc1d685fa7389e88588584e02786820d4d26",
"commit_message": "Add the SandboxedDMGParser... | 190 |
Determine whether the code is vulnerable or not. | [
"void LayerTreeHost::RateLimit() {\n proxy_->ForceSerializeOnSwapBuffers();\n client_->RateLimitSharedMainThreadContext();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-2902",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-2902/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/chromium/chromium/commit/87a082c5137a63dedb3fe5b1f48f75dcd1fd780c",
"commit_id": "87a082c5137a63dedb3fe5b1f48f75dcd1fd780c",
"commit_message": "Removed pinch viewpor... | 191 |
Determine whether the code is vulnerable or not. | [
"nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,\n\t\t\t\t\tstruct nfsd_writeargs *args)\n{\n\tunsigned int len, hdr, dlen;\n\tstruct kvec *head = rqstp->rq_arg.head;\n\tint v;",
"\tp = decode_fh(p, &args->fh);\n\tif (!p)\n\t\treturn 0;",
"\tp++;\t\t\t\t/* beginoffset */\n\targs->offset = ntohl(*p++)... | [
1,
1,
1,
1,
0,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-7895",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7895/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309",
"commit_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309",
"commit_message": "nfsd: stricter decoding ... | 192 |
Determine whether the code is vulnerable or not. | [
"nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,\n\t\t\t\t\tstruct nfsd_writeargs *args)\n{\n\tunsigned int len, hdr, dlen;\n\tstruct kvec *head = rqstp->rq_arg.head;\n\tint v;",
"\tp = decode_fh(p, &args->fh);\n\tif (!p)\n\t\treturn 0;",
"\tp++;\t\t\t\t/* beginoffset */\n\targs->offset = ntohl(*p++)... | [
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-7895",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7895/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309",
"commit_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309",
"commit_message": "nfsd: stricter decoding ... | 192 |
Determine whether the code is vulnerable or not. | [
"static void hugetlbfs_i_callback(struct rcu_head *head)\n{\n\tstruct inode *inode = container_of(head, struct inode, i_rcu);\n\tkmem_cache_free(hugetlbfs_inode_cachep, HUGETLBFS_I(inode));\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2012-2133",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2012-2133/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe516029",
"commit_id": "90481622d75715bfcb68501280a917dbfe516029",
"commit_message": "hugepages: fix use after... | 193 |
Determine whether the code is vulnerable or not. | [
"static int __init setup_slub_max_order(char *str)\n{\n\tget_option(&str, &slub_max_order);",
"\treturn 1;\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3209",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3209/",
"CWE ID": "CWE-189",
"codeLink": "https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d",
"commit_id": "f8bd2258e2d520dff28c855658bd24bdafb5102d",
"commit_message": "remove div_long_long_rem... | 194 |
Determine whether the code is vulnerable or not. | [
"const std::string& BluetoothSocketListenUsingRfcommFunction::uuid() const {\n return params_->uuid;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6171",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6171/",
"CWE ID": "CWE-416",
"codeLink": "https://github.com/chromium/chromium/commit/c5c6320f80159dc41dffc3cfbf0298925c7dcf1b",
"commit_id": "c5c6320f80159dc41dffc3cfbf0298925c7dcf1b",
"commit_message": "chrome.bluetoothSocke... | 195 |
Determine whether the code is vulnerable or not. | [
"static void mntput_no_expire(struct mount *mnt)\n{\n\trcu_read_lock();\n\tmnt_add_count(mnt, -1);\n\tif (likely(mnt->mnt_ns)) { /* shouldn't be the last one */\n\t\trcu_read_unlock();\n\t\treturn;\n\t}\n\tlock_mount_hash();\n\tif (mnt_get_count(mnt)) {\n\t\trcu_read_unlock();\n\t\tunlock_mount_hash();\n\t\treturn;... | [
1,
0,
1
] | BIGVUL | {
"CVE ID": "CVE-2014-9717",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-9717/",
"CWE ID": "CWE-284",
"codeLink": "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1",
"commit_id": "ce07d891a0891d3c0d0c2d73d577490486b809e1",
"commit_message": "mnt: Honor MNT_LOCKED wh... | 196 |
Determine whether the code is vulnerable or not. | [
"static void mntput_no_expire(struct mount *mnt)\n{\n\trcu_read_lock();\n\tmnt_add_count(mnt, -1);\n\tif (likely(mnt->mnt_ns)) { /* shouldn't be the last one */\n\t\trcu_read_unlock();\n\t\treturn;\n\t}\n\tlock_mount_hash();\n\tif (mnt_get_count(mnt)) {\n\t\trcu_read_unlock();\n\t\tunlock_mount_hash();\n\t\treturn;... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2014-9717",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-9717/",
"CWE ID": "CWE-284",
"codeLink": "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1",
"commit_id": "ce07d891a0891d3c0d0c2d73d577490486b809e1",
"commit_message": "mnt: Honor MNT_LOCKED wh... | 196 |
Determine whether the code is vulnerable or not. | [
"void RenderProcessHostImpl::ProcessDied(bool already_dead,\n RendererClosedDetails* known_details) {",
" DCHECK(!within_process_died_observer_);",
" DCHECK(!deleting_soon_);",
" base::TerminationStatus status = base::TERMINATION_STATUS_NORMAL_TERMINATION;\n int exit... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2015-1265",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1265/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/04ff52bb66284467ccb43d90800013b89ee8db75",
"commit_id": "04ff52bb66284467ccb43d90800013b89ee8db75",
"commit_message": "Switching AudioOutputAutho... | 197 |
Determine whether the code is vulnerable or not. | [
"void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)\n{\n EAS_PCM *pAudioBuffer;\n EAS_I32 k;\n EAS_I32 b1;\n EAS_I32 b2;\n EAS_I32 z1;\n EAS_I32 z2;\n EAS_I32 acc0;\n EAS_I32 acc1;\n EAS_I32 numSamples;",
" \n /* initialize some local variables */\n num... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-0838",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-0838/",
"CWE ID": "CWE-119",
"codeLink": "https://android.googlesource.com/platform/external/sonivox/+/3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49",
"commit_id": "3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49",
"commit_message": "Soni... | 198 |
Determine whether the code is vulnerable or not. | [
"void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)\n{\n EAS_PCM *pAudioBuffer;\n EAS_I32 k;\n EAS_I32 b1;\n EAS_I32 b2;\n EAS_I32 z1;\n EAS_I32 z2;\n EAS_I32 acc0;\n EAS_I32 acc1;\n EAS_I32 numSamples;",
" \n /* initialize some local variables */\n num... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-0838",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-0838/",
"CWE ID": "CWE-119",
"codeLink": "https://android.googlesource.com/platform/external/sonivox/+/3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49",
"commit_id": "3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49",
"commit_message": "Soni... | 198 |
Determine whether the code is vulnerable or not. | [
"static int setup_proc_entry( struct net_device *dev,\n\t\t\t struct airo_info *apriv ) {\n\tstruct proc_dir_entry *entry;\n\t/* First setup the device directory */\n\tstrcpy(apriv->proc_name,dev->name);\n\tapriv->proc_entry = proc_mkdir_mode(apriv->proc_name, airo_perm,\n\t\t\t\t\t airo_entry);\n\tif (!apri... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-4112",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162",
"commit_id": "550fd08c2cebad61c548def135f67aba284c6162",
"commit_message": "net: Audit drivers to id... | 199 |
Determine whether the code is vulnerable or not. | [
"ofputil_capabilities_mask(enum ofp_version ofp_version)\n{\n /* Handle capabilities whose bit is unique for all OpenFlow versions */\n switch (ofp_version) {\n case OFP10_VERSION:\n case OFP11_VERSION:\n return OFPC_COMMON | OFPC_ARP_MATCH_IP;\n case OFP12_VERSION:\n case OFP13_VERSION:\n ... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-17204",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-17204/",
"CWE ID": "CWE-617",
"codeLink": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde",
"commit_id": "4af6da3b275b764b1afe194df6499b33d2bf4cde",
"commit_message": "ofp-group: Don't asse... | 200 |
Determine whether the code is vulnerable or not. | [
"void EncoderTest::InitializeConfig() {\n const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);",
"",
" ASSERT_EQ(VPX_CODEC_OK, res);\n }"
] | [
1,
0,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1621",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1621/",
"CWE ID": "CWE-119",
"codeLink": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426",
"commit_id": "5a9753fca56f0eeb9f61e342b2fccffc364f9426",
"commit_message": "Merge... | 201 |
Determine whether the code is vulnerable or not. | [
"void EncoderTest::InitializeConfig() {\n const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);",
" dec_cfg_ = vpx_codec_dec_cfg_t();",
" ASSERT_EQ(VPX_CODEC_OK, res);\n }"
] | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1621",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1621/",
"CWE ID": "CWE-119",
"codeLink": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426",
"commit_id": "5a9753fca56f0eeb9f61e342b2fccffc364f9426",
"commit_message": "Merge... | 201 |
Determine whether the code is vulnerable or not. | [
"void CanvasSurfaceLayerBridgeClientImpl::asyncSatisfy(const cc::SurfaceSequence& sequence)\n{\n m_service->Satisfy(sequence);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/a3987c8b93d3abbba6ea4e438493bf996fff66b7",
"commit_id": "a3987c8b93d3abbba6ea4e438493bf996fff66b7",
"commit_message": "Make Surface creation lazy for OffscreenCanvasFrameReceiverImpl\n\nThis CL shift... | 202 |
Determine whether the code is vulnerable or not. | [
" TestEntryInfo& SetEntryFolderFeature(\n const EntryFolderFeature& new_folder_feature) {\n folder_feature = new_folder_feature;\n return *this;\n }\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-5194",
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251",
"commit_id": "d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251",
"commit_message": "Clear Shill stub config in offline file manager tests\n\nThe Shill st... | 203 |
Determine whether the code is vulnerable or not. | [
"void WebContentsImpl::DidStartNavigationToPendingEntry(\n const GURL& url,\n NavigationController::ReloadType reload_type) {\n FOR_EACH_OBSERVER(\n WebContentsObserver,\n observers_,\n DidStartNavigationToPendingEntry(url, reload_type));\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1641",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1641/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/75ca8ffd7bd7c58ace1144df05e1307d8d707662",
"commit_id": "75ca8ffd7bd7c58ace1144df05e1307d8d707662",
"commit_message": "Don't call WebContents::Do... | 204 |
Determine whether the code is vulnerable or not. | [
"static Sdb *store_versioninfo_gnu_verneed(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {\n\tut8 *end, *need = NULL;\n\tconst char *section_name = \"\";\n\tElf_(Shdr) *link_shdr = NULL;\n\tconst char *link_section_name = \"\";\n\tSdb *sdb_vernaux = NULL;\n\tSdb *sdb_version = NULL;\n\tSdb *sdb = NULL;\n\tint i, cnt;",
... | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-15932",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-15932/",
"CWE ID": "CWE-125",
"codeLink": "https://github.com/radare/radare2/commit/44ded3ff35b8264f54b5a900cab32ec489d9e5b9",
"commit_id": "44ded3ff35b8264f54b5a900cab32ec489d9e5b9",
"commit_message": "Fix #8743 - Crash in E... | 205 |
Determine whether the code is vulnerable or not. | [
"RenderProcessHost* RenderProcessHostImpl::FindReusableProcessHostForSite(\n BrowserContext* browser_context,\n const GURL& site_url) {\n if (!ShouldFindReusableProcessHostForSite(browser_context, site_url))\n return nullptr;",
" std::set<RenderProcessHost*> eligible_foreground_hosts;\n std::set<Rende... | [
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6063",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6063/",
"CWE ID": "CWE-787",
"codeLink": "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_id": "673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_message": "Correct mojo::WrapSha... | 206 |
Determine whether the code is vulnerable or not. | [
"gfx::Rect RenderWidgetHostViewAura::GetViewBounds() const {\n return window_->GetBoundsInScreen();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0886",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0886/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/18d67244984a574ba2dd8779faabc0e3e34f4b76",
"commit_id": "18d67244984a574ba2dd8779faabc0e3e34f4b76",
"commit_message": "Implement TextureImageTran... | 207 |
Determine whether the code is vulnerable or not. | [
"void ChromeContentBrowserClient::BrowserURLHandlerCreated(\n BrowserURLHandler* handler) {\n handler->AddHandlerPair(&ExtensionWebUI::HandleChromeURLOverride,\n BrowserURLHandler::null_handler());\n handler->AddHandlerPair(BrowserURLHandler::null_handler(),\n ... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0921",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0921/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/chromium/chromium/commit/e9841fbdaf41b4a2baaa413f94d5c0197f9261f4",
"commit_id": "e9841fbdaf41b4a2baaa413f94d5c0197f9261f4",
"commit_message": "Ensure extensions and... | 208 |
Determine whether the code is vulnerable or not. | [
"vcard_init_buffer_response(VCard *card, unsigned char *buf, int len)\n{\n VCardResponse *response;\n VCardBufferResponse *buffer_response;",
" buffer_response = vcard_get_buffer_response(card);\n if (buffer_response) {\n vcard_set_buffer_response(card, NULL);\n vcard_buffer_response_del... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-6414",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-6414/",
"CWE ID": "CWE-772",
"codeLink": "https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c",
"commit_id": "9113dc6a303604a2d9812ac70c17d076ef11886c",
"commit_message": null,
"l... | 209 |
Determine whether the code is vulnerable or not. | [
"static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)\n{\n Image *image, *image2=NULL,\n *rotated_image;\n PixelPacket *q;",
" unsigned int status;\n MATHeader MATLAB_HDR;\n size_t size;\n size_t CellType;\n QuantumInfo *quantum_info;\n ImageInfo *clone_info;\n int i;\n ssi... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-13658",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-13658/",
"CWE ID": "CWE-617",
"codeLink": "https://github.com/ImageMagick/ImageMagick/commit/e5c063a1007506ba69e97a35effcdef944421c89",
"commit_id": "e5c063a1007506ba69e97a35effcdef944421c89",
"commit_message": "https://githu... | 210 |
Determine whether the code is vulnerable or not. | [
"static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)\n{\n Image *image, *image2=NULL,\n *rotated_image;\n PixelPacket *q;",
" unsigned int status;\n MATHeader MATLAB_HDR;\n size_t size;\n size_t CellType;\n QuantumInfo *quantum_info;\n ImageInfo *clone_info;\n int i;\n ssi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-13658",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-13658/",
"CWE ID": "CWE-617",
"codeLink": "https://github.com/ImageMagick/ImageMagick/commit/e5c063a1007506ba69e97a35effcdef944421c89",
"commit_id": "e5c063a1007506ba69e97a35effcdef944421c89",
"commit_message": "https://githu... | 210 |
Determine whether the code is vulnerable or not. | [
"void DatabaseMessageFilter::OnDatabaseScheduledForDeletion(\n const string16& origin_identifier,\n const string16& database_name) {\n DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));\n Send(new DatabaseMsg_CloseImmediately(origin_identifier, database_name));\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0911",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0911/",
"CWE ID": "CWE-22",
"codeLink": "https://github.com/chromium/chromium/commit/ccfb891dc0c936a8806d663fe6581bf659761819",
"commit_id": "ccfb891dc0c936a8806d663fe6581bf659761819",
"commit_message": "WebDatabase: check pat... | 211 |
Determine whether the code is vulnerable or not. | [
" virtual bool GetWifiAccessPoints(WifiAccessPointVector* result) {\n if (!EnsureCrosLoaded())\n return false;\n DeviceNetworkList* network_list = GetDeviceNetworkList();\n if (network_list == NULL)\n return false;\n result->clear();\n result->reserve(network_list->network_size);\n cons... | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/a3e2afaedd8190398ae45ccef34fcdee00fb19aa",
"commit_id": "a3e2afaedd8190398ae45ccef34fcdee00fb19aa",
"commit_message": "Fixed crash related to cellular network payment plan retreival.\n\nBUG=chromium-... | 212 |
Determine whether the code is vulnerable or not. | [
"bool EventConverterEvdevImpl::HasCapsLockLed() const {\n return has_caps_lock_led_;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/c4363d1ca65494cb7b271625e1ff6541a9f593c9",
"commit_id": "c4363d1ca65494cb7b271625e1ff6541a9f593c9",
"commit_message": "ozone: evdev: Add a couple more trace events\n\nAdd trace event inside each read... | 213 |
Determine whether the code is vulnerable or not. | [
"SPR_ListEntry(struct rx_call *call, afs_int32 aid, struct prcheckentry *aentry)\n{\n afs_int32 code;\n afs_int32 cid = ANONYMOUSID;",
" code = listEntry(call, aid, aentry, &cid);\n osi_auditU(call, PTS_LstEntEvent, code, AUD_ID, aid, AUD_END);\n ViceLog(125, (\"PTS_ListEntry: code %d cid %d aid %d... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-2860",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2860/",
"CWE ID": "CWE-284",
"codeLink": "http://git.openafs.org/?p=openafs.git;a=commitdiff;h=396240cf070a806b91fea81131d034e1399af1e0",
"commit_id": "396240cf070a806b91fea81131d034e1399af1e0",
"commit_message": null,
"lang... | 214 |
Determine whether the code is vulnerable or not. | [
"TransportDIB::Id TransportDIB::id() const {\n return key_;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0838",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0838/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/chromium/chromium/commit/0bd1a6ddb5fb23dfea3e72d60e5e8df4cf5826bc",
"commit_id": "0bd1a6ddb5fb23dfea3e72d60e5e8df4cf5826bc",
"commit_message": "Make shared memory se... | 215 |
Determine whether the code is vulnerable or not. | [
"static unsigned int Sys_CountFileList( char **list ) {\n\tint i = 0;",
"\tif (list)\n\t{\n\t\twhile (*list)\n\t\t{\n\t\t\tlist++;\n\t\t\ti++;\n\t\t}\n\t}\n\treturn i;\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-6903",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-6903/",
"CWE ID": "CWE-269",
"codeLink": "https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20",
"commit_id": "b6ff2bcb1e4e6976d61e316175c6d7c99860fe20",
"commit_message": "All: Don't load .pk3s as ... | 216 |
Determine whether the code is vulnerable or not. | [
"void start_application(int no_sandbox, FILE *fp) {\n\tif (no_sandbox == 0) {\n\t\tenv_defaults();\n\t\tenv_apply();\n\t}\n\tumask(orig_umask);",
"\tif (arg_debug) {\n\t\tprintf(\"starting application\\n\");\n\t\tprintf(\"LD_PRELOAD=%s\\n\", getenv(\"LD_PRELOAD\"));\n\t}",
"\tif (arg_audit) {\n\t\tassert(arg_au... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2019-12589",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2019-12589/",
"CWE ID": "CWE-284",
"codeLink": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134",
"commit_id": "eecf35c2f8249489a1d3e512bb07f0d427183134",
"commit_message": "mount runtime secc... | 217 |
Determine whether the code is vulnerable or not. | [
"ModuleExport void UnregisterAAIImage(void)\n{\n (void) UnregisterMagickInfo(\"AAI\");\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-10066",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10066/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6",
"commit_id": "f6e9d0d9955e85bdd7540b251cd50d598dacc5e6",
"commit_message": null,
"lang"... | 218 |
Determine whether the code is vulnerable or not. | [
"bfd_rt_priority_handler(vector_t *strvec)\n{\n\tint priority = get_realtime_priority(strvec, \"BFD\");",
"\tif (priority >= 0)\n\t\tglobal_data->bfd_realtime_priority = priority;\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-19045",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-19045/",
"CWE ID": "CWE-200",
"codeLink": "https://github.com/acassen/keepalived/commit/c6247a9ef2c7b33244ab1d3aa5d629ec49f0a067",
"commit_id": "c6247a9ef2c7b33244ab1d3aa5d629ec49f0a067",
"commit_message": "Add command line a... | 219 |
Determine whether the code is vulnerable or not. | [
"ReadUserLogStateAccess::ReadUserLogStateAccess(\n\tconst ReadUserLog::FileState &state)\n{\n\tm_state = new ReadUserLogFileState(state);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-4930",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4930/",
"CWE ID": "CWE-134",
"codeLink": "https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867",
"commit_id": "5e5571d1a431eb3c61977b6dd6ec90186ef79867",
"commit_message": null... | 220 |
Determine whether the code is vulnerable or not. | [
"static void __init hugetlb_register_all_nodes(void)\n{\n\tint nid;",
"\tfor_each_node_state(nid, N_MEMORY) {\n\t\tstruct node *node = node_devices[nid];\n\t\tif (node->dev.id == nid)\n\t\t\thugetlb_register_node(node);\n\t}",
"\t/*\n\t * Let the node device driver know we're here so it can\n\t * [un]register h... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-15128",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-15128/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df",
"commit_id": "1e3921471354244f70fe268586ff94a97a6dd4df",
"commit_message": "userfaultfd: hugetlbfs... | 221 |
Determine whether the code is vulnerable or not. | [
"static struct kvm *vmx_vm_alloc(void)\n{\n\tstruct kvm_vmx *kvm_vmx = vzalloc(sizeof(struct kvm_vmx));\n\treturn &kvm_vmx->kvm;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-12904",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-12904/",
"CWE ID": null,
"codeLink": "https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8",
"commit_id": "727ba748e110b4de50d142edca9d6a9b7e6111d8",
"commit_message": "kvm: nVMX: Enforce cpl=0 fo... | 222 |
Determine whether the code is vulnerable or not. | [
"static int ldump_writer(lua_State *L, const void *b, size_t size, void *B)\n{\n (void) L;\n luaL_addlstring((luaL_Buffer *) B, (const char *) b, size);\n return 0;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2014-8109",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-8109/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb",
"commit_id": "3f1693d558d0758f829c8b53993f1749ddf6ffcb",
"commit_message": "Merge r1642499 from trunk:... | 223 |
Determine whether the code is vulnerable or not. | [
"HB_Bool HB_MyanmarShape(HB_ShaperItem *item)\n{\n HB_Bool openType = FALSE;\n unsigned short *logClusters = item->log_clusters;",
" HB_ShaperItem syllable = *item;\n int first_glyph = 0;",
" int sstart = item->item.pos;\n int end = sstart + item->item.length;\n int i = 0;",
" assert(i... | [
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/2953a669ec0a32a25c6250d34bf895ec0eb63d27",
"commit_id": "2953a669ec0a32a25c6250d34bf895ec0eb63d27",
"commit_message": "Avoid an overflow in harfbuzz-myanmar.c\n\nAdds a guard to prevent invalid assig... | 224 |
Determine whether the code is vulnerable or not. | [
"void ChromePasswordManagerClient::PasswordFormsParsed(\n const std::vector<autofill::PasswordForm>& forms) {\n if (!password_manager::bad_message::CheckChildProcessSecurityPolicy(\n password_manager_driver_bindings_.GetCurrentTargetFrame(), forms,\n BadMessageReason::CPMD_BAD_ORIGIN_FORMS_PAR... | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/961d0cda4cfc3bcf04aa48ccc32772d63af12d9b",
"commit_id": "961d0cda4cfc3bcf04aa48ccc32772d63af12d9b",
"commit_message": "Extract generation logic from the accessory controller into a separate one\n\nTh... | 225 |
Determine whether the code is vulnerable or not. | [
"bool btif_av_is_connected(void) {\n btif_sm_state_t state = btif_sm_get_state(btif_av_cb.sm_handle);\n return ((state == BTIF_AV_STATE_OPENED) || (state == BTIF_AV_STATE_STARTED));\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-9476",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-9476/",
"CWE ID": "CWE-416",
"codeLink": "https://android.googlesource.com/platform/system/bt/+/dd28d8ddf2985d654781770c691c60b45d7f32b4",
"commit_id": "dd28d8ddf2985d654781770c691c60b45d7f32b4",
"commit_message": "DO NOT MERG... | 226 |
Determine whether the code is vulnerable or not. | [
"void disable_progress_bar()\n{\n\tpthread_mutex_lock(&screen_mutex);\n\tif(progress_enabled) {\n\t\tprogress_bar(sym_count + dev_count + fifo_count + cur_blocks,\n\t\t\ttotal_inodes - total_files + total_blocks, columns);\n\t\tprintf(\"\\n\");\n\t}\n\tprogress_enabled = FALSE;\n\tpthread_mutex_unlock(&screen_mutex... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2015-4645",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-4645/",
"CWE ID": "CWE-190",
"codeLink": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1",
"commit_id": "f95864afe8833fe3ad782d714b41378e860977b1",
"commit_message": "unsquashfs-4: A... | 227 |
Determine whether the code is vulnerable or not. | [
"static inline struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,\n\t\t\tstruct shmem_inode_info *info, pgoff_t index)\n{\n\treturn swapin_readahead(swap, gfp, NULL, 0);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-1767",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-1767/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/torvalds/linux/commit/5f00110f7273f9ff04ac69a5f85bb535a4fd0987",
"commit_id": "5f00110f7273f9ff04ac69a5f85bb535a4fd0987",
"commit_message": "tmpfs: fix use-after-fre... | 228 |
Determine whether the code is vulnerable or not. | [
"mainloop_add_trigger(int priority, int(*dispatch) (gpointer user_data), gpointer userdata)\n{\n GSource *source = NULL;",
" CRM_ASSERT(sizeof(crm_trigger_t) > sizeof(GSource));\n source = g_source_new(&crm_trigger_funcs, sizeof(crm_trigger_t));\n CRM_ASSERT(source != NULL);",
" return mainloop_s... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0281",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0281/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93",
"commit_id": "564f7cc2a51dcd2f28ab12a13394f31be5aa3c93",
"commit_message": "High: core: Inter... | 229 |
Determine whether the code is vulnerable or not. | [
"bool xmp_get_property_bool(XmpPtr xmp, const char *schema, const char *name,\n bool *property, uint32_t *propsBits)\n{\n CHECK_PTR(xmp, false);\n RESET_ERROR;",
" bool ret = false;\n try {\n auto txmp = reinterpret_cast<const SXMPMeta *>(xmp);\n XMP_OptionBits ... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-18234",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-18234/",
"CWE ID": "CWE-416",
"codeLink": "https://cgit.freedesktop.org/exempi/commit/?id=c26d5beb60a5a85f76259f50ed3e08c8169b0a0c",
"commit_id": "c26d5beb60a5a85f76259f50ed3e08c8169b0a0c",
"commit_message": null,
"lang": "... | 230 |
Determine whether the code is vulnerable or not. | [
"static inline void address_space_stw_internal(AddressSpace *as,\n hwaddr addr, uint32_t val,\n MemTxAttrs attrs,\n MemTxResult *result,\n ... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2015-8818",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-8818/",
"CWE ID": "CWE-20",
"codeLink": "https://git.qemu.org/?p=qemu.git;a=commit;h=b242e0e0e2969c044a318e56f7988bbd84de1f63",
"commit_id": "b242e0e0e2969c044a318e56f7988bbd84de1f63",
"commit_message": null,
"lang": "C",
... | 231 |
Determine whether the code is vulnerable or not. | [
"bool SiteInstanceImpl::IsSameWebSite(BrowserContext* browser_context,\n const GURL& real_src_url,\n const GURL& real_dest_url,\n bool should_compare_effective_urls) {\n GURL src_url =\n should_compare_... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1678",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1678/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/1f5ad409dbf5334523931df37598ea49e9849c87",
"commit_id": "1f5ad409dbf5334523931df37598ea49e9849c87",
"commit_message": "Allow origin lock for... | 232 |
Determine whether the code is vulnerable or not. | [
"string16 Browser::GetWindowTitleForCurrentTab() const {\n TabContents* contents = GetSelectedTabContents();\n string16 title;",
" if (contents) {\n title = contents->GetTitle();\n FormatTitleForDisplay(&title);\n }\n if (title.empty())\n title = TabContentsWrapper::GetDefaultTitle();",
"#if defin... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3896",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3896/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d",
"commit_id": "5925dff83699508b5e2735afb0297dfb310e159d",
"commit_message": "Implement a bubble th... | 233 |
Determine whether the code is vulnerable or not. | [
"CSSRule *CSSStyleSheet::ownerRule() const\n{\n return (parent() && parent()->isRule()) ? static_cast<CSSRule*>(parent()) : 0;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/3eb1f512d8646db3a70aaef108a8f5ad8b3f013d",
"commit_id": "3eb1f512d8646db3a70aaef108a8f5ad8b3f013d",
"commit_message": "2010-06-18 Adam Barth <abarth@webkit.org>\n\n Reviewed by Darin Adler.\... | 234 |
Determine whether the code is vulnerable or not. | [
"static void queue_interrupt(struct fuse_iqueue *fiq, struct fuse_req *req)\n{\n\tspin_lock(&fiq->waitq.lock);\n\tif (test_bit(FR_FINISHED, &req->flags)) {\n\t\tspin_unlock(&fiq->waitq.lock);\n\t\treturn;\n\t}\n\tif (list_empty(&req->intr_entry)) {\n\t\tlist_add_tail(&req->intr_entry, &fiq->interrupts);\n\t\twake_u... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2019-11487",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2019-11487/",
"CWE ID": "CWE-416",
"codeLink": "https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb",
"commit_id": "15fab63e1e57be9fdb5eec1bbc5916e9825e9acb",
"commit_message": "fs: prevent page refco... | 235 |
Determine whether the code is vulnerable or not. | [
"void FeatureInfo::InitializeForTesting(ContextType context_type) {\n initialized_ = false;\n Initialize(context_type, false /* is_passthrough_cmd_decoder */,\n DisallowedFeatures());\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2017-5057",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5057/",
"CWE ID": "CWE-125",
"codeLink": "https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6",
"commit_id": "cbc5d5153b18ea387f4769caa01d1339261f6ed6",
"commit_message": "gpu: Disallow use of ... | 236 |
Determine whether the code is vulnerable or not. | [
"int sanity_check_ckpt(struct f2fs_sb_info *sbi)\n{\n\tunsigned int total, fsmeta;\n\tstruct f2fs_super_block *raw_super = F2FS_RAW_SUPER(sbi);\n\tstruct f2fs_checkpoint *ckpt = F2FS_CKPT(sbi);\n\tunsigned int ovp_segments, reserved_segments;\n\tunsigned int main_segs, blocks_per_seg;\n\tint i;",
"\ttotal = le32_... | [
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-18200",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-18200/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/torvalds/linux/commit/638164a2718f337ea224b747cf5977ef143166a4",
"commit_id": "638164a2718f337ea224b747cf5977ef143166a4",
"commit_message": "f2fs: fix potential pan... | 237 |
Determine whether the code is vulnerable or not. | [
"static void sigShutdownHandler(int sig) {\n char *msg;",
" switch (sig) {\n case SIGINT:\n msg = \"Received SIGINT scheduling shutdown...\";\n break;\n case SIGTERM:\n msg = \"Received SIGTERM scheduling shutdown...\";\n break;\n default:\n msg = \"Received shutd... | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-10517",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10517/",
"CWE ID": "CWE-254",
"codeLink": "https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50",
"commit_id": "874804da0c014a7d704b3d285aa500098a931f50",
"commit_message": "Security: Cross Protoco... | 238 |
Determine whether the code is vulnerable or not. | [
"void CSoundFile::ExtendedS3MCommands(CHANNELINDEX nChn, ModCommand::PARAM param)\n{\n\tModChannel *pChn = &m_PlayState.Chn[nChn];\n\tuint8 command = param & 0xF0;\n\tparam &= 0x0F;\n\tswitch(command)\n\t{\n\tcase 0x10:\tpChn->dwFlags.set(CHN_GLISSANDO, param != 0); break;\n\tcase 0x20:\tif(!m_SongFlags[SONG_FIRSTT... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-10017",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-10017/",
"CWE ID": "CWE-125",
"codeLink": "https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76",
"commit_id": "492022c7297ede682161d9c0ec2de15526424e76",
"commit_message": "[Fix] Possible out-of... | 239 |
Determine whether the code is vulnerable or not. | [
" void CheckHeaderFails(const char* header_field) {\n CheckHeaderFails(header_field, \"foo\");\n }\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6148",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6148/",
"CWE ID": "CWE-93",
"codeLink": "https://github.com/chromium/chromium/commit/fa68dcfd12e376aa880b3193a77b896e6c54efdf",
"commit_id": "fa68dcfd12e376aa880b3193a77b896e6c54efdf",
"commit_message": "Verify that header val... | 240 |
Determine whether the code is vulnerable or not. | [
"exsltDateHourInDay (const xmlChar *dateTime)\n{\n exsltDateValPtr dt;\n double ret;",
" if (dateTime == NULL) {\n#ifdef WITH_TIME\n\tdt = exsltDateCurrent();\n\tif (dt == NULL)\n#endif\n\t return xmlXPathNAN;\n } else {\n\tdt = exsltDateParse(dateTime);\n\tif (dt == NULL)\n\t return xmlXPathNAN... | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1683",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1683/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_id": "96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_message": "Roll libxslt to 89168... | 241 |
Determine whether the code is vulnerable or not. | [
"file_ms_alloc(int flags)\n{\n\tstruct magic_set *ms;\n\tsize_t i, len;",
"\tif ((ms = CAST(struct magic_set *, calloc((size_t)1,\n\t sizeof(struct magic_set)))) == NULL)\n\t\treturn NULL;",
"\tif (magic_setflags(ms, flags) == -1) {\n\t\terrno = EINVAL;\n\t\tgoto free;\n\t}",
"\tms->o.buf = ms->o.pbuf = NU... | [
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2014-3538",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-3538/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320",
"commit_id": "4a284c89d6ef11aca34da65da7d673050a5ea320",
"commit_message": "* Enforce limit of 8K on rege... | 242 |
Determine whether the code is vulnerable or not. | [
"sparse_scan_file (struct tar_sparse_file *file)\n{\n /* always check for completely sparse files */\n if (sparse_scan_file_wholesparse (file))\n return true;",
" switch (hole_detection)\n {\n case HOLE_DETECTION_DEFAULT:\n case HOLE_DETECTION_SEEK:\n#ifdef SEEK_HOLE\n if (sparse_scan_file_see... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-20482",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-20482/",
"CWE ID": "CWE-835",
"codeLink": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454",
"commit_id": "c15c42ccd1e2377945fd0414eca1a49294bff454",
"commit_message": null,
"la... | 243 |
Determine whether the code is vulnerable or not. | [
"void BrowserView::Paste() {\n if (!DoCutCopyPaste(&content::RenderWidgetHost::Paste)) {\n ui_controls::SendKeyPress(GetNativeWindow(), ui::VKEY_V,\n true, false, false, false);\n }\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2012-5148",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2012-5148/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/e89cfcb9090e8c98129ae9160c513f504db74599",
"commit_id": "e89cfcb9090e8c98129ae9160c513f504db74599",
"commit_message": "Remove TabContents fro... | 244 |
Determine whether the code is vulnerable or not. | [
"MediaControlPlayButtonElement::MediaControlPlayButtonElement(\n MediaControls& mediaControls)\n : MediaControlInputElement(mediaControls, MediaPlayButton) {}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2015-1271",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1271/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/74fce5949bdf05a92c2bc0bd98e6e3e977c55376",
"commit_id": "74fce5949bdf05a92c2bc0bd98e6e3e977c55376",
"commit_message": "Fixed volume slider e... | 245 |
Determine whether the code is vulnerable or not. | [
"static void mmtimer_setup_int_0(int cpu, u64 expires)\n{\n\tu64 val;",
"\t/* Disable interrupt */\n\tHUB_S((u64 *)LOCAL_MMR_ADDR(SH_RTC1_INT_ENABLE), 0UL);",
"\t/* Initialize comparator value */\n\tHUB_S((u64 *)LOCAL_MMR_ADDR(SH_INT_CMPB), -1L);",
"\t/* Clear pending bit */\n\tmmtimer_clr_int_pending(0);",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3209",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3209/",
"CWE ID": "CWE-189",
"codeLink": "https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d",
"commit_id": "f8bd2258e2d520dff28c855658bd24bdafb5102d",
"commit_message": "remove div_long_long_rem... | 246 |
Determine whether the code is vulnerable or not. | [
"asmlinkage long sys_oabi_semop(int semid, struct oabi_sembuf __user *tsops,\n\t\t\t unsigned nsops)\n{\n\treturn sys_oabi_semtimedop(semid, tsops, nsops, NULL);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-1759",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-1759/",
"CWE ID": "CWE-189",
"codeLink": "https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9",
"commit_id": "0f22072ab50cac7983f9660d33974b45184da4f9",
"commit_message": "ARM: 6891/1: prevent hea... | 247 |
Determine whether the code is vulnerable or not. | [
" static void RegisterJSONConverter(\n base::JSONValueConverter<ExpectFileTasksMessage>* converter) {\n converter->RegisterCustomField(\n \"openType\", &ExpectFileTasksMessage::open_type, &MapStringToOpenType);\n converter->RegisterRepeatedString(\"fileNames\",\n ... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-5194",
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251",
"commit_id": "d4e0a7273cd8d7a9ee667ad5b5c8aad0f5f59251",
"commit_message": "Clear Shill stub config in offline file manager tests\n\nThe Shill st... | 248 |
Determine whether the code is vulnerable or not. | [
"Response EmulationHandler::ClearDeviceMetricsOverride() {\n if (!device_emulation_enabled_)\n return Response::OK();\n if (GetWebContents())\n GetWebContents()->ClearDeviceEmulationSize();\n else\n return Response::Error(\"Can't find the associated web contents\");\n device_emulation_enabled_ = false;... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6111",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6111/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/3c8e4852477d5b1e2da877808c998dc57db9460f",
"commit_id": "3c8e4852477d5b1e2da877808c998dc57db9460f",
"commit_message": "DevTools: speculative ... | 249 |
Determine whether the code is vulnerable or not. | [
"void DevToolsClient::OnDispatchOnInspectorFrontend(const std::string& message) {\n web_tools_frontend_->dispatchOnInspectorFrontend(\n WebString::fromUTF8(message));\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-2861",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2861/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_id": "8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_message": "DevTools: move DevTool... | 250 |
Determine whether the code is vulnerable or not. | [
"bool NavigationController::IsURLInPageNavigation(const GURL& url) const {\n NavigationEntry* last_committed = GetLastCommittedEntry();\n if (!last_committed)\n return false;\n return AreURLsInPageNavigation(last_committed->url(), url);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/b9e2ecab97a8a7f3cce06951ab92a3eaef559206",
"commit_id": "b9e2ecab97a8a7f3cce06951ab92a3eaef559206",
"commit_message": "Do not discount a MANUAL_SUBFRAME load just because it involved\nsome redirects.... | 251 |
Determine whether the code is vulnerable or not. | [
"static void methodWithEnforceRangeUInt8MethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info)\n{\n TRACE_EVENT_SET_SAMPLING_STATE(\"Blink\", \"DOMMethod\");\n TestObjectV8Internal::methodWithEnforceRangeUInt8Method(info);\n TRACE_EVENT_SET_SAMPLING_STATE(\"V8\", \"V8Execution\");\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2014-1713",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-1713/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154",
"commit_id": "f85a87ec670ad0fce9d98d90c9a705b72a288154",
"commit_message": "document.location bin... | 252 |
Determine whether the code is vulnerable or not. | [
"ewk_frame_scroll_size_get(const Evas_Object* ewkFrame, int* width, int* height)\n{\n if (width)\n *width = 0;\n if (height)\n *height = 0;\n EWK_FRAME_SD_GET_OR_RETURN(ewkFrame, smartData, false);\n EINA_SAFETY_ON_NULL_RETURN_VAL(smartData->frame, false);\n EINA_SAFETY_ON_NULL_RETURN_V... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3103",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3103/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/chromium/chromium/commit/b2dfe7c175fb21263f06eb586f1ed235482a3281",
"commit_id": "b2dfe7c175fb21263f06eb586f1ed235482a3281",
"commit_message": "[EFL] fast/frames/fra... | 253 |
Determine whether the code is vulnerable or not. | [
"int modbus_flush(modbus_t *ctx)\n{\n int rc;",
" if (ctx == NULL) {\n errno = EINVAL;\n return -1;\n }",
" rc = ctx->backend->flush(ctx);\n if (rc != -1 && ctx->debug) {\n /* Not all backends are able to return the number of bytes flushed */\n printf(\"Bytes flushed (... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2019-14463",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2019-14463/",
"CWE ID": "CWE-125",
"codeLink": "https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc",
"commit_id": "5ccdf5ef79d742640355d1132fa9e2abc7fbaefc",
"commit_message": "Fix VD-1301 and VD... | 254 |
Determine whether the code is vulnerable or not. | [
"choose_comp(struct sshcomp *comp, char *client, char *server)\n{\n\tchar *name = match_list(client, server, NULL);",
"\tif (name == NULL)\n\t\treturn SSH_ERR_NO_COMPRESS_ALG_MATCH;\n\tif (strcmp(name, \"zlib@openssh.com\") == 0) {\n\t\tcomp->type = COMP_DELAYED;\n\t} else if (strcmp(name, \"zlib\") == 0) {\n\t\t... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-10708",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10708/",
"CWE ID": "CWE-476",
"codeLink": "https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737",
"commit_id": "28652bca29046f62c7045e933e6b931de1d16737",
"commit_message": null,
"lang... | 255 |
Determine whether the code is vulnerable or not. | [
"void RenderView::didReceiveResponse(\n WebFrame* frame, unsigned identifier, const WebURLResponse& response) {",
" SiteIsolationMetrics::LogMimeTypeForCrossOriginRequest(frame,\n identifier,\n resp... | [
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-2861",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2861/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_id": "8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_message": "DevTools: move DevTool... | 256 |
Determine whether the code is vulnerable or not. | [
"need_socktype_protocol_hack(void)\n{\n\tif (!tested_for_getaddrinfo_hacks)\n\t\ttest_for_getaddrinfo_hacks();\n\treturn need_socktype_protocol_hack_;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-10196",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10196/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5",
"commit_id": "329acc18a0768c21ba22522f01a5c7f46cacc4d5",
"commit_message": "evutil_parse_sockad... | 257 |
Determine whether the code is vulnerable or not. | [
"void RenderViewImpl::DidFlushPaint() {\n pepper_helper_->ViewFlushedPaint();",
" if (!webview())\n return;",
" WebFrame* main_frame = webview()->mainFrame();",
" if (!main_frame->provisionalDataSource()) {\n WebDataSource* ds = main_frame->dataSource();\n DocumentState* document_state = Document... | [
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0918",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0918/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b",
"commit_id": "0a57375ad73780e61e1770a9d88b0529b0dbd33b",
"commit_message": "Let the browser handl... | 258 |
Determine whether the code is vulnerable or not. | [
"OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,\n OMX_IN OMX_INDEXTYPE paramIndex,\n OMX_IN OMX_PTR paramData)\n{\n (void)hComp;\n OMX_ERRORTYPE eRet = OMX_ErrorNone;",
"\n if (m_state == OMX_StateInvalid) {\n DEBUG_PRINT_ERROR(\"ERROR: Set Param in Invalid ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1... | BIGVUL | {
"CVE ID": "CVE-2016-2480",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2480/",
"CWE ID": "CWE-20",
"codeLink": "https://android.googlesource.com/platform/hardware/qcom/media/+/560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8",
"commit_id": "560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8",
"commit_message": "DO... | 259 |
Determine whether the code is vulnerable or not. | [
"OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,\n OMX_IN OMX_INDEXTYPE paramIndex,\n OMX_IN OMX_PTR paramData)\n{\n (void)hComp;\n OMX_ERRORTYPE eRet = OMX_ErrorNone;",
"\n if (m_state == OMX_StateInvalid) {\n DEBUG_PRINT_ERROR(\"ERROR: Set Param in Invalid ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | BIGVUL | {
"CVE ID": "CVE-2016-2480",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-2480/",
"CWE ID": "CWE-20",
"codeLink": "https://android.googlesource.com/platform/hardware/qcom/media/+/560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8",
"commit_id": "560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8",
"commit_message": "DO... | 259 |
Determine whether the code is vulnerable or not. | [
"xsltStyleInitializeStylesheetModule(xsltStylesheetPtr style,\n\t\t\t\t const xmlChar * URI)\n{\n xsltExtDataPtr dataContainer;\n void *userData = NULL;\n xsltExtModulePtr module;",
" if ((style == NULL) || (URI == NULL))\n\treturn(NULL);",
" if (xsltExtensionsHash == NULL) {\n#ifdef WITH_XSL... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1683",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1683/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_id": "96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_message": "Roll libxslt to 89168... | 260 |
Determine whether the code is vulnerable or not. | [
"bool SyncBackendHost::Core::IsCurrentThreadSafeForModel(\n syncable::ModelType model_type) {\n base::AutoLock lock(host_->registrar_lock_);",
" browser_sync::ModelSafeRoutingInfo::const_iterator routing_it =\n host_->registrar_.routing_info.find(model_type);\n if (routing_it == host_->registrar_.routi... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-2351",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2351/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/chromium/chromium/commit/bf381d8a02c3d272d4dd879ac719d8993dfb5ad6",
"commit_id": "bf381d8a02c3d272d4dd879ac719d8993dfb5ad6",
"commit_message": "Enable HistoryModelWo... | 261 |
Determine whether the code is vulnerable or not. | [
"yysyntax_error (YYSIZE_T *yymsg_alloc, char **yymsg,\n yytype_int16 *yyssp, int yytoken)\n{\n YYSIZE_T yysize0 = yytnamerr (YY_NULLPTR, yytname[yytoken]);\n YYSIZE_T yysize = yysize0;\n enum { YYERROR_VERBOSE_ARGS_MAXIMUM = 5 };\n /* Internationalized format string. */\n const char *yyformat = ... | [
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-9438",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-9438/",
"CWE ID": "CWE-674",
"codeLink": "https://github.com/VirusTotal/yara/commit/10e8bd3071677dd1fa76beeef4bc2fc427cea5e7",
"commit_id": "10e8bd3071677dd1fa76beeef4bc2fc427cea5e7",
"commit_message": "Fix issue #674 for hex ... | 262 |
Determine whether the code is vulnerable or not. | [
"void LocalFrameClientImpl::AbortClientNavigation() {\n if (web_frame_->Client())\n web_frame_->Client()->AbortClientNavigation();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-20067",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-20067/",
"CWE ID": "CWE-254",
"codeLink": "https://github.com/chromium/chromium/commit/a7d715ae5b654d1f98669fd979a00282a7229044",
"commit_id": "a7d715ae5b654d1f98669fd979a00282a7229044",
"commit_message": "Prevent renderer in... | 263 |
Determine whether the code is vulnerable or not. | [
"void bnep_net_setup(struct net_device *dev)\n{",
"\tmemset(dev->broadcast, 0xff, ETH_ALEN);\n \tdev->addr_len = ETH_ALEN;\n \n \tether_setup(dev);",
"",
" \tdev->netdev_ops = &bnep_netdev_ops;\n \n \tdev->watchdog_timeo = HZ * 2;\n}"
] | [
1,
1,
0,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-4112",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162",
"commit_id": "550fd08c2cebad61c548def135f67aba284c6162",
"commit_message": "net: Audit drivers to id... | 264 |
Determine whether the code is vulnerable or not. | [
"void bnep_net_setup(struct net_device *dev)\n{",
"\tmemset(dev->broadcast, 0xff, ETH_ALEN);\n \tdev->addr_len = ETH_ALEN;\n \n \tether_setup(dev);",
"\tdev->priv_flags &= ~IFF_TX_SKB_SHARING;",
" \tdev->netdev_ops = &bnep_netdev_ops;\n \n \tdev->watchdog_timeo = HZ * 2;\n}"
] | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-4112",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4112/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162",
"commit_id": "550fd08c2cebad61c548def135f67aba284c6162",
"commit_message": "net: Audit drivers to id... | 264 |
Determine whether the code is vulnerable or not. | [
"void DownloadController::Init(JNIEnv* env, jobject obj) {\n java_object_ = new JavaObject;\n java_object_->obj_ = env->NewWeakGlobalRef(obj);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2015-1296",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1296/",
"CWE ID": "CWE-254",
"codeLink": "https://github.com/chromium/chromium/commit/5fc08cfb098acce49344d2e89cc27c915903f81c",
"commit_id": "5fc08cfb098acce49344d2e89cc27c915903f81c",
"commit_message": "Clean up Android Down... | 265 |
Determine whether the code is vulnerable or not. | [
"dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p)\n{\n\tif (kaslr_enabled()) {\n\t\tpr_emerg(\"Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\\n\",\n\t\t\t kaslr_offset(),\n\t\t\t __START_KERNEL,\n\t\t\t __START_KERNEL_map,\n\t\t\t MODULES_VADDR-1);\n\t} else {\n\t\tpr_emer... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-3699",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-3699/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76",
"commit_id": "a4a5ed2835e8ea042868b7401dced3f517cafa76",
"commit_message": "acpi: Disable ACPI table ov... | 266 |
Determine whether the code is vulnerable or not. | [
"void kvm_arch_irq_bypass_del_producer(struct irq_bypass_consumer *cons,\n\t\t\t\t struct irq_bypass_producer *prod)\n{\n\tint ret;\n\tstruct kvm_kernel_irqfd *irqfd =\n\t\tcontainer_of(cons, struct kvm_kernel_irqfd, consumer);",
"\tif (!kvm_x86_ops->update_pi_irte) {\n\t\tWARN_ON(irqfd->producer != NULL);\n... | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2015-7513",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-7513/",
"CWE ID": null,
"codeLink": "https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8",
"commit_id": "0185604c2d82c560dab2f2933a18f797e74ab5a8",
"commit_message": "KVM: x86: Reload pit counters... | 267 |
Determine whether the code is vulnerable or not. | [
"bool WebContext::popupBlockerEnabled() const {\n if (IsInitialized()) {\n return context_->IsPopupBlockerEnabled();\n }",
" return construct_props_->popup_blocker_enabled;\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1586",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1586/",
"CWE ID": "CWE-20",
"codeLink": "https://git.launchpad.net/oxide/commit/?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac",
"commit_id": "29014da83e5fc358d6bff0f574e9ed45e61a35ac",
"commit_message": null,
"lang": "CPP",
... | 268 |
Determine whether the code is vulnerable or not. | [
"static inline MagickBooleanType AcquireCacheNexusPixels(\n const CacheInfo *magick_restrict cache_info,NexusInfo *nexus_info,\n ExceptionInfo *exception)\n{\n if (nexus_info->length != (MagickSizeType) ((size_t) nexus_info->length))\n return(MagickFalse);\n nexus_info->mapped=MagickFalse;\n nexus_info->cac... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-7539",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-7539/",
"CWE ID": "CWE-399",
"codeLink": "https://github.com/ImageMagick/ImageMagick/commit/4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c",
"commit_id": "4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c",
"commit_message": "http://www.imag... | 269 |
Determine whether the code is vulnerable or not. | [
"void PushMessagingServiceImpl::IncreasePushSubscriptionCount(int add,\n bool is_pending) {\n DCHECK_GT(add, 0);\n if (push_subscription_count_ + pending_push_subscription_count_ == 0) {\n GetGCMDriver()->AddAppHandler(kPushMessagingAppIdentifierPrefi... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2017-5125",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5125/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/1a90b2996bfd341a04073f0054047073865b485d",
"commit_id": "1a90b2996bfd341a04073f0054047073865b485d",
"commit_message": "Remove some senseless... | 270 |
Determine whether the code is vulnerable or not. | [
"const char* ExtensionOptionsGuest::GetAPINamespace() const {\n return extensionoptions::kAPINamespace;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1658",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1658/",
"CWE ID": "CWE-284",
"codeLink": "https://github.com/chromium/chromium/commit/5c437bcc7a51edbef45242c5173cf7871fde2866",
"commit_id": "5c437bcc7a51edbef45242c5173cf7871fde2866",
"commit_message": "Make extensions use a... | 271 |
Determine whether the code is vulnerable or not. | [
"static int set_stream_info_from_input_stream(AVStream *st, struct playlist *pls, AVStream *ist)\n{\n int err;",
" err = avcodec_parameters_copy(st->codecpar, ist->codecpar);\n if (err < 0)\n return err;",
" if (pls->is_id3_timestamped) /* custom timestamps via id3 */\n avpriv_set_pts_... | [
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-14058",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-14058/",
"CWE ID": "CWE-835",
"codeLink": "https://github.com/FFmpeg/FFmpeg/commit/7ec414892ddcad88313848494b6fc5f437c9ca4a",
"commit_id": "7ec414892ddcad88313848494b6fc5f437c9ca4a",
"commit_message": "avformat/hls: Fix DoS d... | 272 |
Determine whether the code is vulnerable or not. | [
"status_t ESDS::InitCheck() const {\n return mInitCheck;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2015-1539",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-1539/",
"CWE ID": "CWE-189",
"codeLink": "https://android.googlesource.com/platform/frameworks/av/+/5e751957ba692658b7f67eb03ae5ddb2cd3d970c",
"commit_id": "5e751957ba692658b7f67eb03ae5ddb2cd3d970c",
"commit_message": "Fix int... | 273 |
Determine whether the code is vulnerable or not. | [
"void HTMLFormElement::ParseAttribute(\n const AttributeModificationParams& params) {\n const QualifiedName& name = params.name;\n if (name == actionAttr) {\n attributes_.ParseAction(params.new_value);\n LogUpdateAttributeIfIsolatedWorldAndInDocument(\"form\", params);",
" if (GetDocument().GetInsec... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2019-5790",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2019-5790/",
"CWE ID": "CWE-190",
"codeLink": "https://github.com/chromium/chromium/commit/88fcb3a6899d77b64195423333ad81a00803f997",
"commit_id": "88fcb3a6899d77b64195423333ad81a00803f997",
"commit_message": "Move user activation ... | 274 |
Determine whether the code is vulnerable or not. | [
"content::JavaScriptDialogCreator* Browser::GetJavaScriptDialogCreator() {\n return GetJavaScriptDialogCreatorInstance();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3896",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3896/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d",
"commit_id": "5925dff83699508b5e2735afb0297dfb310e159d",
"commit_message": "Implement a bubble th... | 275 |
Determine whether the code is vulnerable or not. | [
"int ip_setsockopt(struct sock *sk, int level,\n\t\tint optname, char __user *optval, unsigned int optlen)\n{\n\tint err;",
"\tif (level != SOL_IP)\n\t\treturn -ENOPROTOOPT;",
"\terr = do_ip_setsockopt(sk, level, optname, optval, optlen);\n#ifdef CONFIG_NETFILTER\n\t/* we need to exclude all possible ENOPROTOOP... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2012-3552",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2012-3552/",
"CWE ID": "CWE-362",
"codeLink": "https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259",
"commit_id": "f6d8bd051c391c1c0458a30b2a7abcd939329259",
"commit_message": "inet: add RCU protection... | 276 |
Determine whether the code is vulnerable or not. | [
"GLenum GLES2DecoderImpl::GetBoundColorDrawBufferInternalFormat(\n GLint drawbuffer_i) {\n DCHECK(drawbuffer_i >= 0 &&\n drawbuffer_i < static_cast<GLint>(group_->max_draw_buffers()));\n Framebuffer* framebuffer = GetBoundDrawFramebuffer();\n if (!framebuffer) {\n return 0;\n }\n GLenum drawbuffe... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-5219",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-5219/",
"CWE ID": "CWE-416",
"codeLink": "https://github.com/chromium/chromium/commit/a4150b688a754d3d10d2ca385155b1c95d77d6ae",
"commit_id": "a4150b688a754d3d10d2ca385155b1c95d77d6ae",
"commit_message": "Add GL_PROGRAM_COMPLE... | 277 |
Determine whether the code is vulnerable or not. | [
"void WebPluginDelegateStub::CreateSharedBuffer(\n size_t size,\n base::SharedMemory* shared_buf,\n base::SharedMemoryHandle* remote_handle) {\n if (!shared_buf->Create(std::wstring(), false, false, size)) {\n NOTREACHED();\n return;\n }\n if (!shared_buf->Map(size)) {\n NOTREACHED();\n shar... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/ea3d1d84be3d6f97bf50e76511c9e26af6895533",
"commit_id": "ea3d1d84be3d6f97bf50e76511c9e26af6895533",
"commit_message": "Fix passing pointers between processes.\n\nBUG=31880\nReview URL: http://coderev... | 278 |
Determine whether the code is vulnerable or not. | [
"void HTMLFormControlElement::willChangeForm() {\n ListedElement::willChangeForm();\n formOwnerSetNeedsValidityCheck();\n if (formOwner() && canBeSuccessfulSubmitButton())\n formOwner()->invalidateDefaultButtonStyle();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2017-5016",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5016/",
"CWE ID": "CWE-1021",
"codeLink": "https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc",
"commit_id": "a8e17a3031b6ad69c399e5e04dd0084e577097fc",
"commit_message": "Form validation: Do ... | 279 |
Determine whether the code is vulnerable or not. | [
"ModuleExport size_t RegisterMAPImage(void)\n{\n MagickInfo\n *entry;",
" entry=SetMagickInfo(\"MAP\");\n entry->decoder=(DecodeImageHandler *) ReadMAPImage;\n entry->encoder=(EncodeImageHandler *) WriteMAPImage;\n entry->adjoin=MagickFalse;\n entry->format_type=ExplicitFormatType;\n entry->raw=MagickTr... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-12663",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-12663/",
"CWE ID": "CWE-772",
"codeLink": "https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074",
"commit_id": "6233ef75bb973745ab1092b59aea8fe316f09074",
"commit_message": "https://githu... | 280 |
Determine whether the code is vulnerable or not. | [
"static int do_boot_mode(struct edgeport_serial *serial,\n\t\tconst struct firmware *fw)\n{\n\tstruct device *dev = &serial->serial->interface->dev;\n\tint status = 0;\n\tstruct edge_ti_manuf_descriptor *ti_manuf_desc;\n\tstruct edgeport_fw_hdr *fw_hdr = (struct edgeport_fw_hdr *)fw->data;",
"\tdev_dbg(dev, \"%s ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-8924",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-8924/",
"CWE ID": "CWE-191",
"codeLink": "https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e",
"commit_id": "654b404f2a222f918af9b0cd18ad469d0c941a8e",
"commit_message": "USB: serial: io_ti: fix ... | 281 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.