idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4,867 | Chrome | a4b20ed4917f1f6fc83b6375a48e2c3895d43a8a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a4b20ed4917f1f6fc83b6375a48e2c3895d43a8a | None | 1 | void BindSkiaToInProcessGL() {
static bool host_StubGL_installed = false;
if (!host_StubGL_installed) {
GrGLBinding binding;
switch (gfx::GetGLImplementation()) {
case gfx::kGLImplementationNone:
NOTREACHED();
return;
case gfx::kGLImplementationDesktopGL:
binding = kDeskt... | 151,739,885,399,519,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2011-2829 | Integer overflow in Google Chrome before 13.0.782.215 on 32-bit platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving uniform arrays. | https://nvd.nist.gov/vuln/detail/CVE-2011-2829 |
4,898 | Chrome | 20d1c99d9b53a0b2b419aae0075494a9d0b86daf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/20d1c99d9b53a0b2b419aae0075494a9d0b86daf | None | 1 | bool NavigationController::RendererDidNavigate(
const ViewHostMsg_FrameNavigate_Params& params,
int extra_invalidate_flags,
LoadCommittedDetails* details) {
if (GetLastCommittedEntry()) {
details->previous_url = GetLastCommittedEntry()->url();
details->previous_entry_index = last_committed_entry_... | 310,335,884,979,475,070,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2782 | The drag-and-drop implementation in Google Chrome before 13.0.782.107 on Linux does not properly enforce permissions for files, which allows user-assisted remote attackers to bypass intended access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2782 |
4,901 | Chrome | 697cd7e2ce2535696f1b9e5cfb474cc36a734747 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/697cd7e2ce2535696f1b9e5cfb474cc36a734747 | None | 1 | bool Extension::InitFromValue(const DictionaryValue& source, int flags,
std::string* error) {
URLPattern::ParseOption parse_strictness =
(flags & STRICT_ERROR_CHECKS ? URLPattern::PARSE_STRICT
: URLPattern::PARSE_LENIENT);
if (source.HasKey(key... | 109,017,237,804,472,760,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-2785 | The extensions implementation in Google Chrome before 13.0.782.107 does not properly validate the URL for the home page, which allows remote attackers to have an unspecified impact via a crafted extension. | https://nvd.nist.gov/vuln/detail/CVE-2011-2785 |
4,902 | Chrome | 9400c64565586091f67d4131850fd0836b18b511 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9400c64565586091f67d4131850fd0836b18b511 | None | 1 | void GpuDataManager::UpdateGpuInfo(const GPUInfo& gpu_info) {
{
base::AutoLock auto_lock(gpu_info_lock_);
if (!gpu_info_.Merge(gpu_info))
return;
RunGpuInfoUpdateCallbacks();
content::GetContentClient()->SetGpuInfo(gpu_info_);
}
UpdateGpuFeatureFlags();
}
| 96,182,624,877,678,020,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2787 | Google Chrome before 13.0.782.107 does not properly address re-entrancy issues associated with the GPU lock, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2787 |
4,953 | Chrome | f837b6744eb9ca9d8e4f2e93d9118bf787ca5e24 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f837b6744eb9ca9d8e4f2e93d9118bf787ca5e24 | None | 1 | bool TypedUrlModelAssociator::AssociateModels() {
VLOG(1) << "Associating TypedUrl Models";
DCHECK(expected_loop_ == MessageLoop::current());
std::vector<history::URLRow> typed_urls;
if (!history_backend_->GetAllTypedURLs(&typed_urls)) {
LOG(ERROR) << "Could not get the typed_url entries.";
return fals... | 235,500,637,610,336,330,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2801 | Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the frame loader. | https://nvd.nist.gov/vuln/detail/CVE-2011-2801 |
5,096 | Chrome | 5fd35e5359c6345b8709695cd71fba307318e6aa | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5fd35e5359c6345b8709695cd71fba307318e6aa | None | 1 | LayoutUnit RenderBox::availableLogicalHeightUsing(const Length& h) const
{
if (h.isFixed())
return computeContentBoxLogicalHeight(h.value());
if (isRenderView())
return isHorizontalWritingMode() ? toRenderView(this)->frameView()->visibleHeight() : toRenderView(this)->frameView()->visibleWidth()... | 64,775,624,233,662,650,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-1799 | Google Chrome before 11.0.696.68 does not properly perform casts of variables during interaction with the WebKit engine, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1799 |
5,210 | Chrome | a75c45bf1cad925548a75bf88f828443bc8ee27d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a75c45bf1cad925548a75bf88f828443bc8ee27d | None | 1 | PPB_URLLoader_Impl::~PPB_URLLoader_Impl() {
}
| 43,110,833,936,314,475,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2012-5140 | Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the URL loader. | https://nvd.nist.gov/vuln/detail/CVE-2012-5140 |
5,255 | Chrome | 6e487b9db2ff0324523a040180f8da42796aeef5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6e487b9db2ff0324523a040180f8da42796aeef5 | None | 1 | xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) {
xmlChar limit = 0;
xmlChar *buf = NULL;
xmlChar *rep = NULL;
int len = 0;
int buf_size = 0;
int c, l, in_space = 0;
xmlChar *current = NULL;
xmlEntityPtr ent;
if (NXT(0) == '"') {
ctxt->instate = XML_PARSE... | 248,539,584,304,709,650,000,000,000,000,000,000,000 | parser.c | 259,800,609,760,836,770,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-5134 | Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. | https://nvd.nist.gov/vuln/detail/CVE-2012-5134 |
5,278 | Chrome | 2511466dd15750f2ab0e5cecc30010f0a3f7949c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2511466dd15750f2ab0e5cecc30010f0a3f7949c | None | 1 | void FocusFirstNameField() {
LOG(WARNING) << "Clicking on the tab.";
ASSERT_NO_FATAL_FAILURE(ui_test_utils::ClickOnView(browser(),
VIEW_ID_TAB_CONTAINER));
ASSERT_TRUE(ui_test_utils::IsViewFocused(browser(),
... | 40,730,733,545,771,880,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-2876 | Buffer overflow in the SSE2 optimization functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-2876 |
5,308 | Chrome | 76a3314ac3b711e01fae3b76a5d85f0eddeeec0b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/76a3314ac3b711e01fae3b76a5d85f0eddeeec0b | None | 1 | bool BaseSettingChange::Init(Profile* profile) {
DCHECK(profile);
profile_ = profile;
return true;
}
| 280,299,927,734,355,520,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-2874 | Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883. | https://nvd.nist.gov/vuln/detail/CVE-2012-2874 |
5,446 | Chrome | e741149a6b7872a2bf1f2b6cc0a56e836592fb77 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e741149a6b7872a2bf1f2b6cc0a56e836592fb77 | None | 1 | xsltGenerateIdFunction(xmlXPathParserContextPtr ctxt, int nargs){
xmlNodePtr cur = NULL;
long val;
xmlChar str[30];
xmlDocPtr doc;
if (nargs == 0) {
cur = ctxt->context->node;
} else if (nargs == 1) {
xmlXPathObjectPtr obj;
xmlNodeSetPtr nodelist;
int i, ret;
if ((ctxt->value ... | 91,106,450,881,227,730,000,000,000,000,000,000,000 | functions.c | 157,072,055,609,151,920,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-2870 | libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPath... | https://nvd.nist.gov/vuln/detail/CVE-2012-2870 |
5,447 | Chrome | 68b6502084af7e2021f7321633f5fbb5f997a58b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/68b6502084af7e2021f7321633f5fbb5f997a58b | None | 1 | SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
net::X509Certificate* cert,
const GURL& request_url) {
string16 title, details, short_description;
std::vector<string16> extra_info;
switch (error_type) {
case CERT_COMMON... | 53,399,739,575,118,670,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2012-2872 | Cross-site scripting (XSS) vulnerability in an SSL interstitial page in Google Chrome before 21.0.1180.89 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-2872 |
5,484 | Chrome | e3171b346e6919f4162ea128d0f7b342cf878fd4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e3171b346e6919f4162ea128d0f7b342cf878fd4 | None | 1 | PowerPopupView() {
SetHorizontalAlignment(ALIGN_RIGHT);
UpdateText();
}
| 112,374,548,428,927,140,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2842 | Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to counter handling. | https://nvd.nist.gov/vuln/detail/CVE-2012-2842 |
5,531 | Chrome | dbcfe72cb16222c9f7e7907fcc5f35b27cc25331 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/dbcfe72cb16222c9f7e7907fcc5f35b27cc25331 | None | 1 | bool GetURLRowForAutocompleteMatch(Profile* profile,
const AutocompleteMatch& match,
history::URLRow* url_row) {
DCHECK(url_row);
HistoryService* history_service =
profile->GetHistoryService(Profile::EXPLICIT_ACCESS);
if (!history_service... | 159,436,592,094,021,640,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2012-2820 | Google Chrome before 20.0.1132.43 does not properly implement SVG filters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-2820 |
5,532 | Chrome | 3511b6ec1e955578ddb6e90f0cc99f824e36026e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3511b6ec1e955578ddb6e90f0cc99f824e36026e | None | 1 | virtual void SetUpCommandLine(CommandLine* command_line) {
GpuFeatureTest::SetUpCommandLine(command_line);
command_line->AppendSwitch(switches::kEnableThreadedCompositing);
}
| 260,191,358,944,750,530,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2823 | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG resources. | https://nvd.nist.gov/vuln/detail/CVE-2012-2823 |
5,533 | Chrome | 7c2785fab1685c8735288dfbbbb617d9c4f5d8b2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c2785fab1685c8735288dfbbbb617d9c4f5d8b2 | None | 1 | bool GraphicsContext3D::getImageData(Image* image,
GC3Denum format,
GC3Denum type,
bool premultiplyAlpha,
bool ignoreGammaAndColorProfile,
... | 194,621,381,134,065,270,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2824 | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG painting. | https://nvd.nist.gov/vuln/detail/CVE-2012-2824 |
5,534 | Chrome | 1595f66a8dec04864afd048809cd9d0802049feb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1595f66a8dec04864afd048809cd9d0802049feb | None | 1 | void removeAllDOMObjects()
{
DOMDataStore& store = DOMData::getCurrentStore();
v8::HandleScope scope;
if (isMainThread()) {
DOMData::removeObjectsFromWrapperMap<Node>(&store, store.domNodeMap());
DOMData::removeObjectsFromWrapperMap<Node>(&store, store.activeDomNodeMap());
}
D... | 158,567,607,023,592,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-2833 | Buffer overflow in the JS API in the PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-2833 |
5,540 | Chrome | 04915c26ea193247b8a29aa24bfa34578ef5d39e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/04915c26ea193247b8a29aa24bfa34578ef5d39e | None | 1 | static inline quint32 swapBgrToRgb(quint32 pixel)
{
return ((pixel << 16) & 0xff0000) | ((pixel >> 16) & 0xff) | (pixel & 0xff00ff00);
}
| 304,658,842,432,476,570,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-3956 | The extension implementation in Google Chrome before 17.0.963.46 does not properly handle sandboxed origins, which might allow remote attackers to bypass the Same Origin Policy via a crafted extension. | https://nvd.nist.gov/vuln/detail/CVE-2011-3956 |
5,541 | Chrome | b712795852f9d6073e062680e280634290c4ba5d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b712795852f9d6073e062680e280634290c4ba5d | None | 1 | HarfBuzzShaperBase::HarfBuzzShaperBase(const Font* font, const TextRun& run)
: m_font(font)
, m_run(run)
, m_wordSpacingAdjustment(font->wordSpacing())
, m_letterSpacing(font->letterSpacing())
{
}
| 105,068,038,334,913,600,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2011-3961 | Race condition in Google Chrome before 17.0.963.46 allows remote attackers to execute arbitrary code via vectors that trigger a crash of a utility process. | https://nvd.nist.gov/vuln/detail/CVE-2011-3961 |
5,551 | Chrome | 7352baf29ac44d23cd580c2edfa8faf4e140a480 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7352baf29ac44d23cd580c2edfa8faf4e140a480 | None | 1 | void SignatureUtil::CheckSignature(
const FilePath& file_path,
ClientDownloadRequest_SignatureInfo* signature_info) {
VLOG(2) << "Checking signature for " << file_path.value();
WINTRUST_FILE_INFO file_info;
file_info.cbStruct = sizeof(file_info);
file_info.pcwszFilePath = file_path.value().c_str();
f... | 283,917,935,680,180,340,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-3965 | Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3965 |
5,561 | Chrome | 58ffd25567098d8ce9443b7c977382929d163b3d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/58ffd25567098d8ce9443b7c977382929d163b3d | None | 1 | static void setPathFromConvexPoints(SkPath* path, size_t numPoints, const FloatPoint* points)
{
path->incReserve(numPoints);
path->moveTo(WebCoreFloatToSkScalar(points[0].x()),
WebCoreFloatToSkScalar(points[0].y()));
for (size_t i = 1; i < numPoints; ++i) {
path->lineTo(WebCoreFloa... | 240,318,301,613,997,740,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2011-3927 | Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3927 |
5,602 | Chrome | d82b03d21f7e581f9206ef1fec4959ae7b06b8eb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d82b03d21f7e581f9206ef1fec4959ae7b06b8eb | None | 1 | xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len,
int what, xmlChar end, xmlChar end2, xmlChar end3) {
xmlChar *buffer = NULL;
int buffer_size = 0;
xmlChar *current = NULL;
xmlChar *rep = NULL;
const xmlChar *last;
xmlEntityPtr ent;
int c,l;
int nbc... | 189,668,059,679,113,700,000,000,000,000,000,000,000 | parser.c | 235,920,022,075,092,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3919 | Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3919 |
5,603 | Chrome | b2dfe7c175fb21263f06eb586f1ed235482a3281 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b2dfe7c175fb21263f06eb586f1ed235482a3281 | None | 1 | static void _ewk_frame_smart_del(Evas_Object* ewkFrame)
{
EWK_FRAME_SD_GET(ewkFrame, smartData);
if (smartData) {
if (smartData->frame) {
WebCore::FrameLoaderClientEfl* flc = _ewk_frame_loader_efl_get(smartData->frame);
flc->setWebFrame(0);
smartData->frame->loade... | 248,859,574,807,383,000,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3103 | Google V8, as used in Google Chrome before 19.0.1084.52, does not properly perform garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2011-3103 |
5,612 | Chrome | d6cc2749d2f90acc2d92a526c1d2cbebbc101a19 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d6cc2749d2f90acc2d92a526c1d2cbebbc101a19 | None | 1 | void SyncManager::SyncInternal::OnIPAddressChanged() {
DVLOG(1) << "IP address change detected";
if (!observing_ip_address_changes_) {
DVLOG(1) << "IP address change dropped.";
return;
}
#if defined (OS_CHROMEOS)
MessageLoop::current()->PostDelayedTask(
FROM_HERE,
base::Bind(&SyncInterna... | 213,258,874,955,974,000,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3105 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element. | https://nvd.nist.gov/vuln/detail/CVE-2011-3105 |
5,629 | Chrome | 7ee3acb08d9de663e5ec3148ee98b666cd32ad82 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7ee3acb08d9de663e5ec3148ee98b666cd32ad82 | None | 1 | int BrowserNonClientFrameViewAura::NonClientTopBorderHeight(
bool force_restored) const {
if (frame()->widget_delegate() &&
frame()->widget_delegate()->ShouldShowWindowTitle()) {
return close_button_->bounds().bottom();
}
if (!frame()->IsMaximized() || force_restored)
return kTabstripTopSp... | 211,513,149,709,653,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3114 | Multiple buffer overflows in the PDF functionality in Google Chrome before 19.0.1084.52 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unknown function calls. | https://nvd.nist.gov/vuln/detail/CVE-2011-3114 |
5,630 | Chrome | d6b061bf189e0661a3d94d89dbcb2e6f70b433da | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d6b061bf189e0661a3d94d89dbcb2e6f70b433da | None | 1 | void ProfileImplIOData::LazyInitializeInternal(
ProfileParams* profile_params) const {
clear_local_state_on_exit_ = profile_params->clear_local_state_on_exit;
ChromeURLRequestContext* main_context = main_request_context();
ChromeURLRequestContext* extensions_context = extensions_request_context();
media_re... | 275,693,883,405,655,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3083 | browser/profiles/profile_impl_io_data.cc in Google Chrome before 19.0.1084.46 does not properly handle a malformed ftp URL in the SRC attribute of a VIDEO element, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted web page. | https://nvd.nist.gov/vuln/detail/CVE-2011-3083 |
5,680 | Chrome | 3da579b85a36e95c03d06b7c4ce9d618af4107bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3da579b85a36e95c03d06b7c4ce9d618af4107bf | None | 1 | BookmarkManagerView::BookmarkManagerView(Profile* profile)
: profile_(profile->GetOriginalProfile()),
table_view_(NULL),
tree_view_(NULL),
ALLOW_THIS_IN_INITIALIZER_LIST(search_factory_(this)) {
search_tf_ = new views::TextField();
search_tf_->set_default_width_in_chars(30);
table_view_ = n... | 206,164,856,550,084,260,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3050 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element. | https://nvd.nist.gov/vuln/detail/CVE-2011-3050 |
5,681 | Chrome | 4cf106cdb83dd6b35d3b26d06cc67d1d2d99041e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4cf106cdb83dd6b35d3b26d06cc67d1d2d99041e | None | 1 | png_inflate(png_structp png_ptr, const png_byte *data, png_size_t size,
png_bytep output, png_size_t output_size)
{
png_size_t count = 0;
png_ptr->zstream.next_in = (png_bytep)data; /* const_cast: VALID */
png_ptr->zstream.avail_in = size;
while (1)
{
int ret, avail;
/* Reset the o... | 186,299,551,334,314,550,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2011-3045 | Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability ... | https://nvd.nist.gov/vuln/detail/CVE-2011-3045 |
5,682 | Chrome | d66c757a9a434f48069b114fb49191e4790f9038 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d66c757a9a434f48069b114fb49191e4790f9038 | None | 1 | void InputMethodBase::OnInputMethodChanged() const {
TextInputClient* client = GetTextInputClient();
if (client && client->GetTextInputType() != TEXT_INPUT_TYPE_NONE)
client->OnInputMethodChanged();
}
| 39,701,825,873,439,797,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3051 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the cross-fade function. | https://nvd.nist.gov/vuln/detail/CVE-2011-3051 |
5,746 | Chrome | 50370b3c98047bdc80184ff87a502edc5c597d3a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/50370b3c98047bdc80184ff87a502edc5c597d3a | None | 1 | void OneClickSigninHelper::ShowInfoBarIfPossible(net::URLRequest* request,
ProfileIOData* io_data,
int child_id,
int route_id) {
std::string google_chrome_signin_value;
... | 329,027,838,139,599,450,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2013-6634 | The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (ak... | https://nvd.nist.gov/vuln/detail/CVE-2013-6634 |
5,753 | Chrome | 516abadc2553489ce28faeea4917280032fbe91d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/516abadc2553489ce28faeea4917280032fbe91d | None | 1 | bool AffiliationFetcher::ParseResponse(
AffiliationFetcherDelegate::Result* result) const {
std::string serialized_response;
if (!fetcher_->GetResponseAsString(&serialized_response)) {
NOTREACHED();
}
affiliation_pb::LookupAffiliationResponse response;
if (!response.ParseFromString(serialized_respon... | 69,665,751,058,673,710,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-6640 | The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index. | https://nvd.nist.gov/vuln/detail/CVE-2013-6640 |
5,754 | Chrome | 4039d2fcaab746b6c20017ba9bb51c3a2403a76c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4039d2fcaab746b6c20017ba9bb51c3a2403a76c | None | 1 | bool RenderFrameImpl::OnMessageReceived(const IPC::Message& msg) {
ObserverListBase<RenderFrameObserver>::Iterator it(observers_);
RenderFrameObserver* observer;
while ((observer = it.GetNext()) != NULL) {
if (observer->OnMessageReceived(msg))
return true;
}
bool handled = true;
bool msg_is_o... | 65,084,460,350,670,600,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6621 | Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element. | https://nvd.nist.gov/vuln/detail/CVE-2013-6621 |
5,769 | Chrome | d6805d0d1d21976cf16d0237d9091f7eebea4ea5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d6805d0d1d21976cf16d0237d9091f7eebea4ea5 | None | 1 | void EnsureInitializeForAndroidLayoutTests() {
CHECK(CommandLine::ForCurrentProcess()->HasSwitch(switches::kDumpRenderTree));
JNIEnv* env = base::android::AttachCurrentThread();
content::NestedMessagePumpAndroid::RegisterJni(env);
content::RegisterNativesImpl(env);
bool success = base::MessageLoop::InitM... | 170,489,088,470,735,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-6627 | net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response. | https://nvd.nist.gov/vuln/detail/CVE-2013-6627 |
5,777 | Chrome | e1524692d362e607e806569147096dfb8c38cb6a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e1524692d362e607e806569147096dfb8c38cb6a | None | 1 | void ApplyBlockElementCommand::formatSelection(const VisiblePosition& startOfSelection, const VisiblePosition& endOfSelection)
{
Position start = startOfSelection.deepEquivalent().downstream();
if (isAtUnsplittableElement(start)) {
RefPtr<Element> blockquote = createBlockElement();
insertNodeAt(... | 53,046,879,309,981,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2926 | Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to ... | https://nvd.nist.gov/vuln/detail/CVE-2013-2926 |
5,778 | Chrome | 94bb8861ec61b4ebcce8a4489be2cf7e2a055d90 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/94bb8861ec61b4ebcce8a4489be2cf7e2a055d90 | None | 1 | double ConvolverNode::latencyTime() const
{
return m_reverb ? m_reverb->latencyFrames() / static_cast<double>(sampleRate()) : 0;
}
| 146,754,701,753,649,700,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c... | https://nvd.nist.gov/vuln/detail/CVE-2013-2906 |
5,781 | Chrome | c2364e0ce42878a2177c6f4cf7adb3c715b777c1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c2364e0ce42878a2177c6f4cf7adb3c715b777c1 | None | 1 | void OmniboxEditModel::RestoreState(const State* state) {
controller_->GetToolbarModel()->set_url_replacement_enabled(
!state || state->url_replacement_enabled);
permanent_text_ = controller_->GetToolbarModel()->GetText();
view_->RevertWithoutResettingSearchTermReplacement();
input_ = state ? state->au... | 36,454,556,757,371,260,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c... | https://nvd.nist.gov/vuln/detail/CVE-2013-2906 |
5,785 | Chrome | 248a92c21c20c14b5983680c50e1d8b73fc79a2f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/248a92c21c20c14b5983680c50e1d8b73fc79a2f | None | 1 | static inline void constructBidiRunsForSegment(InlineBidiResolver& topResolver, BidiRunList<BidiRun>& bidiRuns, const InlineIterator& endOfRuns, VisualDirectionOverride override, bool previousLineBrokeCleanly)
{
ASSERT(&topResolver.runs() == &bidiRuns);
ASSERT(topResolver.position() != endOfRuns);
RenderObj... | 87,961,228,333,894,640,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2909 | Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings. | https://nvd.nist.gov/vuln/detail/CVE-2013-2909 |
5,790 | Chrome | 0220f39fac21d169a834ef91de362f4169f2eef5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0220f39fac21d169a834ef91de362f4169f2eef5 | None | 1 | xsltStylesheetPtr XSLStyleSheet::compileStyleSheet()
{
if (m_embedded)
return xsltLoadStylesheetPI(document());
ASSERT(!m_stylesheetDocTaken);
xsltStylesheetPtr result = xsltParseStylesheetDoc(m_stylesheetDoc);
if (result)
m_stylesheetDocTaken = true;
return result;
}
| 67,606,721,734,149,250,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2911 | Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recomp... | https://nvd.nist.gov/vuln/detail/CVE-2013-2911 |
5,791 | Chrome | 5ecc8d42ff888ff8b459df566208e7e01a3be5ba | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5ecc8d42ff888ff8b459df566208e7e01a3be5ba | None | 1 | void ColorChooserDialog::DidCloseDialog(bool chose_color,
SkColor color,
RunState run_state) {
if (!listener_)
return;
EndRun(run_state);
CopyCustomColors(custom_colors_, g_custom_colors);
if (chose_color)
listener_->On... | 127,791,017,027,380,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2914 | Use-after-free vulnerability in the color-chooser dialog in Google Chrome before 30.0.1599.66 on Windows allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/. | https://nvd.nist.gov/vuln/detail/CVE-2013-2914 |
5,795 | Chrome | 6bdf46c517fd12674ffc61d827dc8987e67f0334 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6bdf46c517fd12674ffc61d827dc8987e67f0334 | None | 1 | ReverbConvolverStage::ReverbConvolverStage(const float* impulseResponse, size_t, size_t reverbTotalLatency, size_t stageOffset, size_t stageLength,
size_t fftSize, size_t renderPhase, size_t renderSliceSize, ReverbAccumulationBuffer* accumulationBuffer, bool directMode)
: ... | 1,948,827,652,665,012,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-2917 | The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array. | https://nvd.nist.gov/vuln/detail/CVE-2013-2917 |
5,796 | Chrome | 3ca8e38ff57e83fcce76f9b54cd8f8bfa09c34ad | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3ca8e38ff57e83fcce76f9b54cd8f8bfa09c34ad | None | 1 | bool DoResolveRelativeHost(const char* base_url,
const url_parse::Parsed& base_parsed,
const CHAR* relative_url,
const url_parse::Component& relative_component,
CharsetConverter* query_converter,
... | 14,662,426,330,022,674,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-2920 | The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring. | https://nvd.nist.gov/vuln/detail/CVE-2013-2920 |
5,797 | Chrome | 1228817ab04a14df53b5a8446085f9c03bf6e964 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1228817ab04a14df53b5a8446085f9c03bf6e964 | None | 1 | void DelegatedFrameHost::CopyFromCompositingSurface(
const gfx::Rect& src_subrect,
const gfx::Size& dst_size,
const base::Callback<void(bool, const SkBitmap&)>& callback,
const SkColorType color_type) {
bool format_support = ((color_type == kRGB_565_SkColorType) ||
(color_... | 227,983,010,357,763,500,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2921 | Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback proces... | https://nvd.nist.gov/vuln/detail/CVE-2013-2921 |
5,800 | Chrome | bd3392a1f8b95bf0b0ee3821bc3245d743fb1337 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bd3392a1f8b95bf0b0ee3821bc3245d743fb1337 | None | 1 | void DateTimeChooserImpl::writeDocument(SharedBuffer* data)
{
String stepString = String::number(m_parameters.step);
String stepBaseString = String::number(m_parameters.stepBase, 11, WTF::TruncateTrailingZeros);
IntRect anchorRectInScreen = m_chromeClient->rootViewToScreen(m_parameters.anchorRectInRootView)... | 126,911,034,376,117,660,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2013-2900 | The FilePath::ReferencesParent function in files/file_path.cc in Google Chrome before 29.0.1547.57 on Windows does not properly handle pathname components composed entirely of . (dot) and whitespace characters, which allows remote attackers to conduct directory traversal attacks via a crafted directory name. | https://nvd.nist.gov/vuln/detail/CVE-2013-2900 |
5,801 | Chrome | afb848acb43ba316097ab4fddfa38dbd80bc6a71 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/afb848acb43ba316097ab4fddfa38dbd80bc6a71 | None | 1 | bool SharedMemory::Create(const SharedMemoryCreateOptions& options) {
DCHECK_EQ(-1, mapped_file_);
if (options.size == 0) return false;
if (options.size > static_cast<size_t>(std::numeric_limits<int>::max()))
return false;
base::ThreadRestrictions::ScopedAllowIO allow_io;
FILE *fp;
bool fix_size = tr... | 324,008,768,138,921,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-2905 | The SharedMemory::Create function in memory/shared_memory_posix.cc in Google Chrome before 29.0.1547.57 uses weak permissions under /dev/shm/, which allows attackers to obtain sensitive information via direct access to a POSIX shared-memory file. | https://nvd.nist.gov/vuln/detail/CVE-2013-2905 |
5,811 | Chrome | 4ac8bc08e3306f38a5ab3e551aef6ad43753579c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4ac8bc08e3306f38a5ab3e551aef6ad43753579c | None | 1 | PassRefPtr<Attr> Element::setAttributeNode(Attr* attrNode, ExceptionCode& ec)
{
if (!attrNode) {
ec = TYPE_MISMATCH_ERR;
return 0;
}
RefPtr<Attr> oldAttrNode = attrIfExists(attrNode->qualifiedName());
if (oldAttrNode.get() == attrNode)
return attrNode; // This Attr is already at... | 334,106,676,418,220,000,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2884 | Use-after-free vulnerability in the DOM implementation in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper tracking of which document owns an Attr object. | https://nvd.nist.gov/vuln/detail/CVE-2013-2884 |
5,863 | Chrome | 370bd9b522d2ccd4a3113d6c93d30cdf8ca502ef | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/370bd9b522d2ccd4a3113d6c93d30cdf8ca502ef | None | 1 | void WebURLLoaderImpl::Context::OnReceivedResponse(
const ResourceResponseInfo& info) {
if (!client_)
return;
WebURLResponse response;
response.initialize();
PopulateURLResponse(request_.url(), info, &response);
bool show_raw_listing = (GURL(request_.url()).query() == "raw");
if (info.mime_type =... | 109,821,041,334,681,160,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2013-2873 | Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources. | https://nvd.nist.gov/vuln/detail/CVE-2013-2873 |
5,864 | Chrome | c0da7c1c6e9ffe5006e146b6426f987238d4bf2e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c0da7c1c6e9ffe5006e146b6426f987238d4bf2e | None | 1 | void DevToolsWindow::InspectedContentsClosing() {
web_contents_->GetRenderViewHost()->ClosePage();
}
| 290,832,303,710,878,300,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-2874 | Google Chrome before 28.0.1500.71 on Windows, when an Nvidia GPU is used, allows remote attackers to bypass intended restrictions on access to screen data via vectors involving IPC transmission of GL textures. | https://nvd.nist.gov/vuln/detail/CVE-2013-2874 |
5,865 | Chrome | 016da29386308754274675e65fdb73cf9d59dc2d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/016da29386308754274675e65fdb73cf9d59dc2d | None | 1 | bool TabsCaptureVisibleTabFunction::RunImpl() {
PrefService* service = profile()->GetPrefs();
if (service->GetBoolean(prefs::kDisableScreenshots)) {
error_ = keys::kScreenshotsDisabled;
return false;
}
WebContents* web_contents = NULL;
if (!GetTabToCapture(&web_contents))
return false;
image_f... | 285,077,923,452,161,440,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-2876 | browser/extensions/api/tabs/tabs_api.cc in Google Chrome before 28.0.1500.71 does not properly enforce restrictions on the capture of screenshots by extensions, which allows remote attackers to obtain sensitive information about the content of a previous page via vectors involving an interstitial page. | https://nvd.nist.gov/vuln/detail/CVE-2013-2876 |
5,906 | Chrome | 09fbb829eab7ee25e90bb4e9c2f4973c6c62d0f3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/09fbb829eab7ee25e90bb4e9c2f4973c6c62d0f3 | None | 1 | bool SimplifiedBackwardsTextIterator::handleTextNode()
{
m_lastTextNode = m_node;
int startOffset;
int offsetInNode;
RenderText* renderer = handleFirstLetter(startOffset, offsetInNode);
if (!renderer)
return true;
String text = renderer->text();
if (!renderer->firstTextBox() && tex... | 316,326,951,134,461,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-2878 | Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the handling of text. | https://nvd.nist.gov/vuln/detail/CVE-2013-2878 |
5,915 | Chrome | 7d085fbb43b21e959900b94f191588fd10546a94 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7d085fbb43b21e959900b94f191588fd10546a94 | None | 1 | void ImageLoader::updateFromElement()
{
Document* document = m_element->document();
if (!document->renderer())
return;
AtomicString attr = m_element->imageSourceURL();
if (attr == m_failedLoadURL)
return;
CachedResourceHandle<CachedImage> newImage = 0;
if (!attr.isNull() && !s... | 39,898,491,843,170,124,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2013-2857 | Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of images. | https://nvd.nist.gov/vuln/detail/CVE-2013-2857 |
5,933 | Chrome | a3b76c8c13ea6b228122440f48c61b66d20443dd | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a3b76c8c13ea6b228122440f48c61b66d20443dd | None | 1 | void CreateAuthenticatorFactory() {
DCHECK(context_->network_task_runner()->BelongsToCurrentThread());
std::string local_certificate = key_pair_.GenerateCertificate();
if (local_certificate.empty()) {
LOG(ERROR) << "Failed to generate host certificate.";
Shutdown(kHostInitializationFail... | 269,116,711,744,518,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-2862 | Skia, as used in Google Chrome before 27.0.1453.110, does not properly handle GPU acceleration, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-2862 |
5,936 | Chrome | 7df06970ff05d4b412534f6deea89c9b9ac4be67 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7df06970ff05d4b412534f6deea89c9b9ac4be67 | None | 1 | void PPB_Buffer_Proxy::OnMsgCreate(
PP_Instance instance,
uint32_t size,
HostResource* result_resource,
ppapi::proxy::SerializedHandle* result_shm_handle) {
result_shm_handle->set_null_shmem();
HostDispatcher* dispatcher = HostDispatcher::GetForInstance(instance);
if (!dispatcher)
return;
... | 190,931,248,690,685,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0880 | Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to databases. | https://nvd.nist.gov/vuln/detail/CVE-2013-0880 |
5,937 | Chrome | 634c5943f46abe8c6280079f6d394dfee08c3c8f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/634c5943f46abe8c6280079f6d394dfee08c3c8f | None | 1 | void RenderLayerCompositor::frameViewDidScroll()
{
FrameView* frameView = m_renderView->frameView();
IntPoint scrollPosition = frameView->scrollPosition();
if (!m_scrollLayer)
return;
bool scrollingCoordinatorHandlesOffset = false;
if (ScrollingCoordinator* scrollingCoordinator = this->scr... | 277,930,543,007,255,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0881 | Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format. | https://nvd.nist.gov/vuln/detail/CVE-2013-0881 |
5,938 | Chrome | 25f9415f43d607d3d01f542f067e3cc471983e6b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/25f9415f43d607d3d01f542f067e3cc471983e6b | None | 1 | bool HTMLFormControlElement::isAutofocusable() const
{
if (!fastHasAttribute(autofocusAttr))
return false;
if (hasTagName(inputTag))
return !toHTMLInputElement(this)->isInputTypeHidden();
if (hasTagName(selectTag))
return true;
if (hasTagName(keygenTag))
return true;
... | 278,129,671,042,807,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0882 | Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via a large number of SVG parameters. | https://nvd.nist.gov/vuln/detail/CVE-2013-0882 |
5,982 | Chrome | 1538367452b549d929aabb13d54c85ab99f65cd3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/1538367452b549d929aabb13d54c85ab99f65cd3 | None | 1 | bool ChromeDownloadManagerDelegate::IsDangerousFile(
const DownloadItem& download,
const FilePath& suggested_path,
bool visited_referrer_before) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
if (download.GetTransitionType() & content::PAGE_TRANSITION_FROM_ADDRESS_BAR)
return false;
... | 94,225,698,097,387,470,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0889 | Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly enforce a user gesture requirement before proceeding with a file download, which might make it easier for remote attackers to execute arbitrary code via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2013-0889 |
5,985 | Chrome | d443be6fdfe17ca4f3ff1843ded362ff0cd01096 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d443be6fdfe17ca4f3ff1843ded362ff0cd01096 | None | 1 | void SafeBrowsingBlockingPage::CommandReceived(const std::string& cmd) {
std::string command(cmd); // Make a local copy so we can modify it.
if (command.length() > 1 && command[0] == '"') {
command = command.substr(1, command.length() - 2);
}
RecordUserReactionTime(command);
if (command == kDoReportComma... | 101,298,675,478,786,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0890 | Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0890 |
5,996 | Chrome | ed6f4545a2a345697e07908c887333f5bdcc97a3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ed6f4545a2a345697e07908c887333f5bdcc97a3 | None | 1 | void ScriptLoader::executeScript(const ScriptSourceCode& sourceCode)
{
ASSERT(m_alreadyStarted);
if (sourceCode.isEmpty())
return;
RefPtr<Document> elementDocument(m_element->document());
RefPtr<Document> contextDocument = elementDocument->contextDocument().get();
if (!contextDocument)
... | 220,693,054,393,959,500,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-0893 | Race condition in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media. | https://nvd.nist.gov/vuln/detail/CVE-2013-0893 |
5,997 | Chrome | 23803a58e481e464a787e4b2c461af9e62f03905 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/23803a58e481e464a787e4b2c461af9e62f03905 | None | 1 | bool CopyDirectory(const FilePath& from_path,
const FilePath& to_path,
bool recursive) {
base::ThreadRestrictions::AssertIOAllowed();
DCHECK(to_path.value().find('*') == std::string::npos);
DCHECK(from_path.value().find('*') == std::string::npos);
char top_dir[PATH_MAX];
... | 191,402,501,457,525,100,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2013-0895 | Google Chrome before 25.0.1364.97 on Linux, and before 25.0.1364.99 on Mac OS X, does not properly handle pathnames during copy operations, which might make it easier for remote attackers to execute arbitrary programs via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0895 |
6,019 | Chrome | 12baa2097220e33c12b60aa5e6da6701637761bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/12baa2097220e33c12b60aa5e6da6701637761bf | None | 1 | void BookmarksIOFunction::ShowSelectFileDialog(
ui::SelectFileDialog::Type type,
const base::FilePath& default_path) {
AddRef();
WebContents* web_contents = dispatcher()->delegate()->
GetAssociatedWebContents();
select_file_dialog_ = ui::SelectFileDialog::Create(
this, new ChromeSelectFi... | 48,717,565,889,459,830,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0920 | Use-after-free vulnerability in the extension bookmarks API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0920 |
6,023 | Chrome | 28aaa72a03df96fa1934876b0efbbc7e6b4b38af | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/28aaa72a03df96fa1934876b0efbbc7e6b4b38af | None | 1 | bool ResourceDispatcherHostImpl::AcceptAuthRequest(
ResourceLoader* loader,
net::AuthChallengeInfo* auth_info) {
if (delegate_ && !delegate_->AcceptAuthRequest(loader->request(), auth_info))
return false;
if (!auth_info->is_proxy) {
HttpAuthResourceType resource_type =
HttpAuthResourceTypeO... | 66,539,345,592,789,220,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0922 | Google Chrome before 26.0.1410.43 does not properly restrict brute-force access attempts against web sites that require HTTP Basic Authentication, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0922 |
6,024 | Chrome | a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a9ca2310c6e68ad8dc39d6b54ca9ea10867ed8a1 | None | 1 | static blink::WebScreenOrientations stringToOrientations(const AtomicString& orientationString)
{
DEFINE_STATIC_LOCAL(const AtomicString, portrait, ("portrait", AtomicString::ConstructFromLiteral));
DEFINE_STATIC_LOCAL(const AtomicString, landscape, ("landscape", AtomicString::ConstructFromLiteral));
... | 286,179,830,601,049,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0923 | The USB Apps API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0923 |
6,039 | Chrome | 52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52a30db57ecec68bb3b25fdc3de5e9bee7b80ed7 | None | 1 | void WebPreferences::Apply(WebView* web_view) const {
WebSettings* settings = web_view->settings();
ApplyFontsFromMap(standard_font_family_map, setStandardFontFamilyWrapper,
settings);
ApplyFontsFromMap(fixed_font_family_map, setFixedFontFamilyWrapper, settings);
ApplyFontsFromMap(serif_font... | 302,887,036,079,995,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0926 | Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0926 |
6,040 | Chrome | faceb51d5058e1159835a4b0cd65081bb0a9de1e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/faceb51d5058e1159835a4b0cd65081bb0a9de1e | None | 1 | void WebRuntimeFeatures::enableSpeechSynthesis(bool enable)
{
RuntimeEnabledFeatures::setSpeechSynthesisEnabled(enable);
}
| 118,835,515,116,955,900,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-0912 | WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion." | https://nvd.nist.gov/vuln/detail/CVE-2013-0912 |
6,050 | Chrome | 537abce1bcf7378e760e904d6e5540a02a2fca9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/537abce1bcf7378e760e904d6e5540a02a2fca9f | None | 1 | int ShellBrowserMain(const content::MainFunctionParams& parameters) {
bool layout_test_mode =
CommandLine::ForCurrentProcess()->HasSwitch(switches::kDumpRenderTree);
base::ScopedTempDir browser_context_path_for_layout_tests;
if (layout_test_mode) {
CHECK(browser_context_path_for_layout_tests.CreateUniq... | 287,540,519,605,687,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-0909 | The XSS Auditor in Google Chrome before 25.0.1364.152 allows remote attackers to obtain sensitive HTTP Referer information via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0909 |
6,087 | Chrome | 74aaa70032784e7cf00256821f29b2b53edb6589 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/74aaa70032784e7cf00256821f29b2b53edb6589 | None | 1 | void ParamTraits<GURL>::Write(Message* m, const GURL& p) {
DCHECK(p.possibly_invalid_spec().length() <= content::kMaxURLChars);
m->WriteString(p.possibly_invalid_spec());
}
| 16,502,622,213,069,890,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-5146 | Google Chrome before 24.0.1312.52 allows remote attackers to bypass the Same Origin Policy via a malformed URL. | https://nvd.nist.gov/vuln/detail/CVE-2012-5146 |
6,117 | Chrome | 935cb0dee7696d70880f96a71bf5687411bb8cb9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/935cb0dee7696d70880f96a71bf5687411bb8cb9 | None | 1 | bool SharedMemory::Create(const SharedMemoryCreateOptions& options) {
DCHECK(!options.executable);
DCHECK(!mapped_file_);
if (options.size == 0)
return false;
uint32 rounded_size = (options.size + 0xffff) & ~0xffff;
name_ = ASCIIToWide(options.name == NULL ? "" : *options.name);
mapped_file_ = Creat... | 281,356,070,748,747,680,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5154 | Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory. | https://nvd.nist.gov/vuln/detail/CVE-2012-5154 |
6,118 | Chrome | 0d7717faeaef5b72434632c95c78bee4883e2573 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d7717faeaef5b72434632c95c78bee4883e2573 | None | 1 | bool ReturnsValidPath(int dir_type) {
base::FilePath path;
bool result = PathService::Get(dir_type, &path);
bool check_path_exists = true;
#if defined(OS_POSIX)
if (dir_type == base::DIR_CACHE)
check_path_exists = false;
#endif
#if defined(OS_LINUX)
if (dir_type == base::DIR_USER_DESKTOP)
check_path_... | 38,994,124,641,422,465,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-5155 | Google Chrome before 24.0.1312.52 on Mac OS X does not use an appropriate sandboxing approach for worker processes, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-5155 |
6,161 | Chrome | 2e02cfe89cbffc8a0bc1bdaee9efe930fd55e376 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2e02cfe89cbffc8a0bc1bdaee9efe930fd55e376 | None | 1 | bool ParamTraits<LOGFONT>::Read(const Message* m, PickleIterator* iter,
param_type* r) {
const char *data;
int data_size = 0;
bool result = m->ReadData(iter, &data, &data_size);
if (result && data_size == sizeof(LOGFONT)) {
memcpy(r, data, sizeof(LOGFONT));
} else {
... | 113,647,827,105,279,360,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0830 | The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspecified data structure, which has unknown impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0830 |
6,163 | Chrome | f7038db6ef172459f14b1b67a5155b8dd210be0f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7038db6ef172459f14b1b67a5155b8dd210be0f | None | 1 | bool decode(const SharedBuffer& data, bool onlySize)
{
m_decodingSizeOnly = onlySize;
unsigned newByteCount = data.size() - m_bufferLength;
unsigned readOffset = m_bufferLength - m_info.src->bytes_in_buffer;
m_info.src->bytes_in_buffer += newByteCount;
m_info.src->next_... | 163,182,612,046,974,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-0836 | Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2013-0836 |
6,164 | Chrome | d333e22282bd4bdaa2864980cd45c272f206a44c | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d333e22282bd4bdaa2864980cd45c272f206a44c | None | 1 | void LayerWebKitThread::setNeedsCommit()
{
if (m_owner)
m_owner->notifySyncRequired();
}
| 74,204,523,172,678,720,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0837 | Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs. | https://nvd.nist.gov/vuln/detail/CVE-2013-0837 |
6,173 | Chrome | 9965adea952e84c925de418e971b204dfda7d6e0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9965adea952e84c925de418e971b204dfda7d6e0 | None | 1 | int MockNetworkTransaction::RestartWithAuth(
const AuthCredentials& credentials,
const CompletionCallback& callback) {
if (!IsReadyToRestartForAuth())
return ERR_FAILED;
HttpRequestInfo auth_request_info = *request_;
auth_request_info.extra_headers.AddHeaderFromString("Authorization: Bar");
re... | 264,094,544,930,396,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7904 | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-7904 |
6,182 | Chrome | 2571533bbb5b554ff47205c8ef1513ccc0817c3e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/2571533bbb5b554ff47205c8ef1513ccc0817c3e | None | 1 | void DocumentThreadableLoader::loadRequest(const ResourceRequest& request, ResourceLoaderOptions resourceLoaderOptions)
{
const KURL& requestURL = request.url();
ASSERT(m_sameOriginRequest || requestURL.user().isEmpty());
ASSERT(m_sameOriginRequest || requestURL.pass().isEmpty());
if (m_forceDoNotAllow... | 318,306,592,559,316,860,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7909 | effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7909 |
6,201 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 1 | void FrameView::updateLayoutAndStyleForPainting()
{
RefPtr<FrameView> protector(this);
updateLayoutAndStyleIfNeededRecursive();
if (RenderView* view = renderView()) {
TRACE_EVENT_INSTANT1(TRACE_DISABLED_BY_DEFAULT("devtools.timeline"), "UpdateLayerTree", "frame", m_frame.get());
In... | 145,960,508,048,872,620,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
6,202 | Chrome | 11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/11a4cc4a6d6e665d9a118fada4b7c658d6f70d95 | None | 1 | void RenderLayerScrollableArea::setScrollOffset(const IntPoint& newScrollOffset)
{
if (!box().isMarquee()) {
if (m_scrollDimensionsDirty)
computeScrollDimensions();
}
if (scrollOffset() == toIntSize(newScrollOffset))
return;
setScrollOffset(toIntSize(newScrollOffset));
... | 288,520,017,721,751,300,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-3191 | Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView... | https://nvd.nist.gov/vuln/detail/CVE-2014-3191 |
6,205 | Chrome | 9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b04ffd8e7a07e9b2947fe5b71acf85dff38a63f | None | 1 | bool Instance::HandleInputEvent(const pp::InputEvent& event) {
pp::InputEvent event_device_res(event);
{
pp::MouseInputEvent mouse_event(event);
if (!mouse_event.is_null()) {
pp::Point point = mouse_event.GetPosition();
pp::Point movement = mouse_event.GetMovement();
ScalePoint(device_scal... | 2,949,400,329,031,434,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3198 | The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-3198 |
6,234 | Chrome | ee281f7cac9df44fe241a37f188b28be8845ded0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ee281f7cac9df44fe241a37f188b28be8845ded0 | None | 1 | bool ResourceFetcher::canRequest(Resource::Type type, const KURL& url, const ResourceLoaderOptions& options, bool forPreload, FetchRequest::OriginRestriction originRestriction) const
{
SecurityOrigin* securityOrigin = options.securityOrigin.get();
if (!securityOrigin && document())
securityOrigin = docu... | 171,053,594,726,445,880,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2014-3160 | The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2014-3160 |
6,239 | Chrome | 96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/96e8ffb4e805c7266a2fc1fbe0e470052019bad9 | None | 1 | int FFmpegVideoDecoder::GetVideoBuffer(AVCodecContext* codec_context,
AVFrame* frame) {
VideoFrame::Format format = PixelFormatToVideoFormat(codec_context->pix_fmt);
if (format == VideoFrame::UNKNOWN)
return AVERROR(EINVAL);
DCHECK(format == VideoFrame::YV12 || format ==... | 37,770,097,475,656,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3157 | Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for prop... | https://nvd.nist.gov/vuln/detail/CVE-2014-3157 |
6,308 | Chrome | b71fc042e1124cda2ab51dfdacc2362da62779a6 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b71fc042e1124cda2ab51dfdacc2362da62779a6 | None | 1 | bool AsyncPixelTransfersCompletedQuery::End(
base::subtle::Atomic32 submit_count) {
AsyncMemoryParams mem_params;
Buffer buffer = manager()->decoder()->GetSharedMemoryBuffer(shm_id());
if (!buffer.shared_memory)
return false;
mem_params.shared_memory = buffer.shared_memory;
mem_params.shm_size = buff... | 17,389,564,410,575,507,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-1710 | The AsyncPixelTransfersCompletedQuery::End function in gpu/command_buffer/service/query_manager.cc in Google Chrome, as used in Google Chrome OS before 33.0.1750.152, does not check whether a certain position is within the bounds of a shared-memory segment, which allows remote attackers to cause a denial of service (GP... | https://nvd.nist.gov/vuln/detail/CVE-2014-1710 |
6,328 | Chrome | 318530d771586b39056c0da7b8bdad03469a0dc4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/318530d771586b39056c0da7b8bdad03469a0dc4 | None | 1 | bool IsSmartVirtualKeyboardEnabled() {
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
keyboard::switches::kEnableVirtualKeyboard)) {
return false;
}
return !base::CommandLine::ForCurrentProcess()->HasSwitch(
keyboard::switches::kDisableSmartVirtualKeyboard);
}
| 138,519,658,245,803,260,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-1700 | Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure. | https://nvd.nist.gov/vuln/detail/CVE-2014-1700 |
6,350 | Chrome | 70bcb6b3396a395e871e10b2ff883d92b8218e9f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/70bcb6b3396a395e871e10b2ff883d92b8218e9f | None | 1 | void RenderSVGImage::paint(PaintInfo& paintInfo, const LayoutPoint&)
{
ANNOTATE_GRAPHICS_CONTEXT(paintInfo, this);
if (paintInfo.context->paintingDisabled() || style()->visibility() == HIDDEN || !m_imageResource->hasImage())
return;
FloatRect boundingBox = repaintRectInLocalCoordinates();
if (... | 78,156,417,942,089,070,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6649 | Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6649 |
6,367 | Chrome | cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cace1e6998293b9b025d4bbdaf5cb5b6a1c2efb4 | None | 1 | void SVGImage::setContainerSize(const IntSize& size)
{
if (!m_page || !usesContainerSize())
return;
LocalFrame* frame = m_page->mainFrame();
SVGSVGElement* rootElement = toSVGDocument(frame->document())->rootElement();
if (!rootElement)
return;
RenderSVGRoot* renderer = toRenderS... | 182,241,956,130,076,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,370 | Chrome | 59296d9276ffcc8bced092828210748d2ed19ab0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/59296d9276ffcc8bced092828210748d2ed19ab0 | None | 1 | int32_t PepperFlashRendererHost::OnNavigate(
ppapi::host::HostMessageContext* host_context,
const ppapi::URLRequestInfoData& data,
const std::string& target,
bool from_user_action) {
content::PepperPluginInstance* plugin_instance =
host_->GetPluginInstance(pp_instance());
if (!plugin_instance... | 228,119,142,004,611,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,372 | Chrome | c21d7ac13d69cbadbbb5b2dc147be1933d52147a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c21d7ac13d69cbadbbb5b2dc147be1933d52147a | None | 1 | void ScreenPositionController::ConvertHostPointToRelativeToRootWindow(
aura::Window* root_window,
const aura::Window::Windows& root_windows,
gfx::Point* point,
aura::Window** target_root) {
DCHECK(!root_window->parent());
gfx::Point point_in_root(*point);
root_window->GetHost()->ConvertPointFrom... | 30,125,943,252,732,386,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-6663 | Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6663 |
6,391 | Chrome | fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc343fd48badc0158dc2bb763e9a8b9342f3cb6f | None | 1 | void FormAssociatedElement::formRemovedFromTree(const Node* formRoot)
{
ASSERT(m_form);
if (toHTMLElement(this)->highestAncestor() != formRoot)
setForm(0);
}
| 85,267,172,430,327,180,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2013-6643 | The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing o... | https://nvd.nist.gov/vuln/detail/CVE-2013-6643 |
6,439 | Chrome | b770d85e37b2d0e248f04cf20606a2f3871ef039 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b770d85e37b2d0e248f04cf20606a2f3871ef039 | None | 1 | void WebPageSerializerImpl::openTagToString(Element* element,
SerializeDomParam* param)
{
bool needSkip;
StringBuilder result;
result.append(preActionBeforeSerializeOpenTag(element, param, &needSkip));
if (needSkip)
return;
result.append('<');
... | 87,504,207,161,441,810,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6790 | The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a doubl... | https://nvd.nist.gov/vuln/detail/CVE-2015-6790 |
6,457 | Chrome | 4c8b008f055f79e622344627fed7f820375a4f01 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4c8b008f055f79e622344627fed7f820375a4f01 | None | 1 | void Document::detach(const AttachContext& context)
{
TRACE_EVENT0("blink", "Document::detach");
ASSERT(!m_frame || m_frame->tree().childCount() == 0);
if (!isActive())
return;
FrameNavigationDisabler navigationDisabler(*m_frame);
HTMLFrameOwnerElement::UpdateSuspendScope suspendWidge... | 326,911,140,912,325,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6768 | The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770. | https://nvd.nist.gov/vuln/detail/CVE-2015-6768 |
6,462 | Chrome | 0b1b7baa4695c945a1b0bea1f0636f1219139e8e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b1b7baa4695c945a1b0bea1f0636f1219139e8e | None | 1 | void DownloadUIAdapterDelegate::OpenItem(const OfflineItem& item,
int64_t offline_id) {
JNIEnv* env = AttachCurrentThread();
Java_OfflinePageDownloadBridge_openItem(
env, ConvertUTF8ToJavaString(env, item.page_url.spec()), offline_id);
}
| 61,398,520,627,540,260,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6772 | The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin. | https://nvd.nist.gov/vuln/detail/CVE-2015-6772 |
6,490 | Chrome | d9e316238aee59acf665d80b544cf4e1edfd3349 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d9e316238aee59acf665d80b544cf4e1edfd3349 | None | 1 | int FindStartOffsetOfFileInZipFile(const char* zip_file, const char* filename) {
FileDescriptor fd;
if (!fd.OpenReadOnly(zip_file)) {
LOG_ERRNO("%s: open failed trying to open zip file %s\n",
__FUNCTION__, zip_file);
return CRAZY_OFFSET_FAILED;
}
struct stat stat_buf;
if (stat(zip_file,... | 299,890,482,944,780,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6783 | The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-6783 |
6,494 | Chrome | 5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5d0e9f824e05523e03dabc0e341b9f8f17a72bb0 | None | 1 | bool CSPSourceList::matches(const KURL& url, ContentSecurityPolicy::RedirectStatus redirectStatus) const
{
if (m_allowStar)
return true;
KURL effectiveURL = m_policy->selfMatchesInnerURL() && SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : url;
if (m_allowSel... | 305,681,779,156,627,620,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6786 | The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in op... | https://nvd.nist.gov/vuln/detail/CVE-2015-6786 |
6,551 | Chrome | c71a21e6dda9025c2bf823c5aab791c2ae8cdfc2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c71a21e6dda9025c2bf823c5aab791c2ae8cdfc2 | None | 1 | void ContainerNode::parserInsertBefore(PassRefPtrWillBeRawPtr<Node> newChild, Node& nextChild)
{
ASSERT(newChild);
ASSERT(nextChild.parentNode() == this);
ASSERT(!newChild->isDocumentFragment());
ASSERT(!isHTMLTemplateElement(this));
if (nextChild.previousSibling() == newChild || &nextChild == newC... | 317,084,347,252,439,650,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-6755 | The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScr... | https://nvd.nist.gov/vuln/detail/CVE-2015-6755 |
6,564 | Chrome | 7ee897723127d0b8fecc5e67d45e20179c760e6e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7ee897723127d0b8fecc5e67d45e20179c760e6e | None | 1 | ServiceWorkerContainer* NavigatorServiceWorker::serviceWorker(Navigator& navigator, ExceptionState& exceptionState)
{
return NavigatorServiceWorker::from(navigator).serviceWorker(exceptionState);
}
| 109,793,506,181,312,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-1292 | The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker. | https://nvd.nist.gov/vuln/detail/CVE-2015-1292 |
6,726 | Chrome | 5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5576cbc1d3e214dfbb5d3ffcdbe82aa8ba0088fc | None | 1 | void MidiManagerUsb::DispatchSendMidiData(MidiManagerClient* client,
uint32_t port_index,
const std::vector<uint8>& data,
double timestamp) {
DCHECK_LT(port_index, output_streams_.size());
... | 321,192,437,589,487,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1232 | Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out... | https://nvd.nist.gov/vuln/detail/CVE-2015-1232 |
6,749 | Chrome | fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fff450abc4e2fb330ba700547a8e6a7b0fb90a6e | None | 1 | bool OutOfProcessInstance::Init(uint32_t argc,
const char* argn[],
const char* argv[]) {
pp::Var document_url_var = pp::URLUtil_Dev::Get()->GetDocumentURL(this);
std::string document_url = document_url_var.is_string() ?
document_url_var.AsStri... | 153,316,566,716,019,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-1302 | The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. | https://nvd.nist.gov/vuln/detail/CVE-2015-1302 |
6,750 | Chrome | 31b81d4cf8b6a063391839816c82fc61c8272e53 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/31b81d4cf8b6a063391839816c82fc61c8272e53 | None | 1 | bool ScreenLayoutObserver::GetDisplayMessageForNotification(
const ScreenLayoutObserver::DisplayInfoMap& old_info,
base::string16* out_message,
base::string16* out_additional_message) {
if (old_display_mode_ != current_display_mode_) {
if (current_display_mode_ == DisplayMode::MIRRORING) {
*out_... | 266,527,405,274,977,800,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1233 | Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-1233 |
6,757 | Chrome | c3957448cfc6e299165196a33cd954b790875fdb | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c3957448cfc6e299165196a33cd954b790875fdb | None | 1 | bool Document::SetFocusedElement(Element* new_focused_element,
const FocusParams& params) {
DCHECK(!lifecycle_.InDetach());
clear_focused_element_timer_.Stop();
if (new_focused_element && (new_focused_element->GetDocument() != this))
return true;
if (NodeChildRemovalTrack... | 283,705,955,295,929,570,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5170 | WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted... | https://nvd.nist.gov/vuln/detail/CVE-2016-5170 |
6,764 | Chrome | 47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/47ae3dfdee9a0796a079cd4eadf2f75b34f257ae | None | 1 | ChooserContextBase::GetGrantedObjects(const GURL& requesting_origin,
const GURL& embedding_origin) {
DCHECK_EQ(requesting_origin, requesting_origin.GetOrigin());
DCHECK_EQ(embedding_origin, embedding_origin.GetOrigin());
if (!CanRequestObjectPermission(requesting_origin, emb... | 248,409,627,958,061,740,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5152 | Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5152 |
6,769 | Chrome | ba011d9f8322c62633a069a59c2c5525e3ff46cc | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ba011d9f8322c62633a069a59c2c5525e3ff46cc | None | 1 | void EventBindings::AttachFilteredEvent(
const v8::FunctionCallbackInfo<v8::Value>& args) {
CHECK_EQ(2, args.Length());
CHECK(args[0]->IsString());
CHECK(args[1]->IsObject());
std::string event_name = *v8::String::Utf8Value(args[0]);
if (!context()->HasAccessOrThrowError(event_name))
return;
std::... | 256,333,972,582,958,900,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-5156 | extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have un... | https://nvd.nist.gov/vuln/detail/CVE-2016-5156 |
6,770 | Chrome | 6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6a310d99a741f9ba5e4e537c5ec49d3adbe5876f | None | 1 | void AXTree::PopulateOrderedSetItems(const AXNode* ordered_set,
const AXNode* local_parent,
std::vector<const AXNode*>& items,
bool node_is_radio_button) const {
if (!(ordered_set == local_parent)) {
if ... | 149,255,040,034,515,960,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-5158 | Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via c... | https://nvd.nist.gov/vuln/detail/CVE-2016-5158 |
6,780 | Chrome | 5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5da127a872b1e2c9fb1cf128ae309b4d6ce4e3ce | None | 1 | static void JNI_WebApkUpdateManager_StoreWebApkUpdateRequestToFile(
JNIEnv* env,
const JavaParamRef<jstring>& java_update_request_path,
const JavaParamRef<jstring>& java_start_url,
const JavaParamRef<jstring>& java_scope,
const JavaParamRef<jstring>& java_name,
const JavaParamRef<jstring>& java_... | 111,886,150,626,802,060,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-5166 | The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks vi... | https://nvd.nist.gov/vuln/detail/CVE-2016-5166 |
6,783 | Chrome | 89f296b34f4f33e048848c06da08fc9271b30bc9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/89f296b34f4f33e048848c06da08fc9271b30bc9 | None | 1 | void PageFormAnalyserLogger::Flush() {
std::string text;
for (ConsoleLevel level : {kError, kWarning, kVerbose}) {
for (LogEntry& entry : node_buffer_[level]) {
text.clear();
text += "[DOM] ";
text += entry.message;
for (unsigned i = 0; i < entry.nodes.size(); ++i)
text += " %... | 209,053,833,526,816,140,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5182 | Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages. | https://nvd.nist.gov/vuln/detail/CVE-2016-5182 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.