id stringlengths 8 13 | source_dataset stringclasses 1
value | cwe stringclasses 84
values | language stringclasses 2
values | vulnerable_code stringlengths 27 234k | secure_code stringlengths 15 235k | url stringlengths 45 48 | repository stringclasses 266
values | commit_hash stringlengths 6 81 | timestamp stringclasses 1
value | cvss_score stringclasses 1
value | severity stringclasses 1
value | metadata dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
bigvul_5 | BigVul | CWE-415 | c | gss_get_mic (minor_status,
context_handle,
qop_req,
message_buffer,
msg_token)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
gss_qop_t qop_req;
gss_buffer_t message_buffer;
gss_buffer_t msg_token;
{
OM_uint32 status;
gss_union_ctx_id_t ctx;
gss_mechanism mech;
s... | gss_get_mic (minor_status,
context_handle,
qop_req,
message_buffer,
msg_token)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
gss_qop_t qop_req;
gss_buffer_t message_buffer;
gss_buffer_t msg_token;
{
OM_uint32 status;
gss_union_ctx_id_t ctx;
gss_mechanism mech;
s... | https://www.cvedetails.com/cve/CVE-2017-11462/ | krb5 | 56f7b1bc95a2a3eeb420e069e7655fb181ade5cf | medium | {
"commit_message": "Preserve GSS context on init/accept failure\n\nAfter gss_init_sec_context() or gss_accept_sec_context() has created a\ncontext, don't delete the mechglue context on failures from subsequent\ncalls, even i",
"cve_id": "CVE-2017-11462",
"dataset_source": "BigVul"
} | ||
bigvul_13 | BigVul | CWE-787 | c | void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,
mojo::ScopedSharedBufferHandle handle) {
DVLOG(1) << __func__ << " buffer_id: " << buffer_id;
DCHECK(io_thread_checker_.CalledOnValidThread());
DCHECK(handle.is_valid());
base::SharedMemoryHandle memory_handle;
... | void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,
mojo::ScopedSharedBufferHandle handle) {
DVLOG(1) << __func__ << " buffer_id: " << buffer_id;
DCHECK(io_thread_checker_.CalledOnValidThread());
DCHECK(handle.is_valid());
base::SharedMemoryHandle memory_handle;
... | https://www.cvedetails.com/cve/CVE-2018-6063/ | Chrome | 673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | medium | {
"commit_message": "Correct mojo::WrapSharedMemoryHandle usage\n\nFixes some incorrect uses of mojo::WrapSharedMemoryHandle which\nwere assuming that the call actually has any control over the memory\nprotection applied to a",
"cve_id": "CVE-2018-6063",
"dataset_source": "BigVul"
} | ||
bigvul_37 | BigVul | CWE-125 | c | frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2)
{
register const struct ip6_frag *dp;
register const struct ip6_hdr *ip6;
dp = (const struct ip6_frag *)bp;
ip6 = (const struct ip6_hdr *)bp2;
ND_TCHECK(dp->ip6f_offlg);
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "fra... | frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2)
{
register const struct ip6_frag *dp;
register const struct ip6_hdr *ip6;
dp = (const struct ip6_frag *)bp;
ip6 = (const struct ip6_hdr *)bp2;
ND_TCHECK(*dp);
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "frag (0x%08x:%... | https://www.cvedetails.com/cve/CVE-2017-13031/ | tcpdump | 2d669862df7cd17f539129049f6fb70d17174125 | medium | {
"commit_message": "CVE-2017-13031/Check for the presence of the entire IPv6 fragment header.\n\nThis fixes a buffer over-read discovered by Bhargava Shastry,\nSecT/TU Berlin.\n\nAdd a test using the capture file supplied by ",
"cve_id": "CVE-2017-13031",
"dataset_source": "BigVul"
} | ||
bigvul_69 | BigVul | CWE-119 | c | EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const
{
RefPtr<EntrySyncCallbackHelper> helper = EntrySyncCallbackHelper::create();
m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchro... | EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const
{
EntrySyncCallbackHelper* helper = EntrySyncCallbackHelper::create();
m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchronous);
... | https://www.cvedetails.com/cve/CVE-2013-0917/ | Chrome | 02c8303512ebed345011f7b545e2f418799be2f0 | medium | {
"commit_message": "Oilpan: Ship Oilpan for SyncCallbackHelper, CreateFileResult and CallbackWrapper in filesystem/\n\nThese are leftovers when we shipped Oilpan for filesystem/ once.\n\nBUG=340522\n\nReview URL: https://coder",
"cve_id": "CVE-2013-0917",
"dataset_source": "BigVul"
} | ||
bigvul_70 | BigVul | CWE-119 | c | ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl(
ScriptState* scriptState,
mojom::blink::WebBluetoothGATTQueryQuantity quantity,
String servicesUUID) {
if (!connected()) {
return ScriptPromise::rejectWithDOMException(
scriptState,
DOMException::create(NetworkError, kGAT... | ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl(
ScriptState* scriptState,
mojom::blink::WebBluetoothGATTQueryQuantity quantity,
String servicesUUID) {
if (!connected()) {
return ScriptPromise::rejectWithDOMException(
scriptState,
DOMException::create(NetworkError, kGAT... | https://www.cvedetails.com/cve/CVE-2015-1215/ | Chrome | 2bceda4948deeaed0a5a99305d0d488eb952f64f | medium | {
"commit_message": "Allow serialization of empty bluetooth uuids.\n\nThis change allows the passing WTF::Optional<String> types as\nbluetooth.mojom.UUID optional parameter without needing to ensure the passed\nobject isn't e",
"cve_id": "CVE-2015-1215",
"dataset_source": "BigVul"
} | ||
bigvul_91 | BigVul | CWE-190 | c | static void common_hrtimer_rearm(struct k_itimer *timr)
{
struct hrtimer *timer = &timr->it.real.timer;
if (!timr->it_interval)
return;
timr->it_overrun += (unsigned int) hrtimer_forward(timer,
timer->base->get_time(),
timr->it_interval);
hrtimer_restart(timer);
} | static void common_hrtimer_rearm(struct k_itimer *timr)
{
struct hrtimer *timer = &timr->it.real.timer;
if (!timr->it_interval)
return;
timr->it_overrun += hrtimer_forward(timer, timer->base->get_time(),
timr->it_interval);
hrtimer_restart(timer);
} | https://www.cvedetails.com/cve/CVE-2018-12896/ | linux | 78c9c4dfbf8c04883941445a195276bb4bb92c76 | medium | {
"commit_message": "posix-timers: Sanitize overrun handling\n\nThe posix timer overrun handling is broken because the forwarding functions\ncan return a huge number of overruns which does not fit in an int. As a\nconsequence",
"cve_id": "CVE-2018-12896",
"dataset_source": "BigVul"
} | ||
bigvul_114 | BigVul | CWE-89 | c | char *curl_easy_unescape(CURL *handle, const char *string, int length,
int *olen)
{
int alloc = (length?length:(int)strlen(string))+1;
char *ns = malloc(alloc);
unsigned char in;
int strindex=0;
unsigned long hex;
CURLcode res;
if(!ns)
return NULL;
while(--alloc >... | char *curl_easy_unescape(CURL *handle, const char *string, int length,
CURLcode Curl_urldecode(struct SessionHandle *data,
const char *string, size_t length,
char **ostring, size_t *olen,
bool reject_ctrl)
{
size_t alloc = (length?length:strlen(... | https://www.cvedetails.com/cve/CVE-2012-0036/ | curl | 75ca568fa1c19de4c5358fed246686de8467c238 | medium | {
"commit_message": "URL sanitize: reject URLs containing bad data\n\nProtocols (IMAP, POP3 and SMTP) that use the path part of a URL in a\ndecoded manner now use the new Curl_urldecode() function to reject URLs\nwith embedde",
"cve_id": "CVE-2012-0036",
"dataset_source": "BigVul"
} | ||
bigvul_120 | BigVul | CWE-400 | c | static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = 0U;
while (y... | static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y, written;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = written ... | https://www.cvedetails.com/cve/CVE-2019-12973/ | openjpeg | 8ee335227bbcaf1614124046aa25e53d67b11ec3 | medium | {
"commit_message": "convertbmp: detect invalid file dimensions early\n\nwidth/length dimensions read from bmp headers are not necessarily\nvalid. For instance they may have been maliciously set to very large\nvalues with the",
"cve_id": "CVE-2019-12973",
"dataset_source": "BigVul"
} | ||
bigvul_125 | BigVul | CWE-119 | c | const char* Chapters::Display::GetCountry() const
{
return m_country;
} | const char* Chapters::Display::GetCountry() const | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_192 | BigVul | CWE-119 | c | nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd_writeargs *args)
{
unsigned int len, hdr, dlen;
struct kvec *head = rqstp->rq_arg.head;
int v;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p++; /* beginoffset */
args->offset = ntohl(*p++); /* offset */
p++; /* totalcount *... | nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd_writeargs *args)
{
unsigned int len, hdr, dlen;
struct kvec *head = rqstp->rq_arg.head;
int v;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p++; /* beginoffset */
args->offset = ntohl(*p++); /* offset */
p++; /* totalcount *... | https://www.cvedetails.com/cve/CVE-2017-7895/ | linux | 13bf9fbff0e5e099e2b6f003a0ab8ae145436309 | medium | {
"commit_message": "nfsd: stricter decoding of write-like NFSv2/v3 ops\n\nThe NFSv2/v3 code does not systematically check whether we decode past\nthe end of the buffer. This generally appears to be harmless, but there\nare ",
"cve_id": "CVE-2017-7895",
"dataset_source": "BigVul"
} | ||
bigvul_196 | BigVul | CWE-284 | c | static void mntput_no_expire(struct mount *mnt)
{
rcu_read_lock();
mnt_add_count(mnt, -1);
if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */
rcu_read_unlock();
return;
}
lock_mount_hash();
if (mnt_get_count(mnt)) {
rcu_read_unlock();
unlock_mount_hash();
return;
}
if (unlikely(mnt->mnt.mnt_fl... | static void mntput_no_expire(struct mount *mnt)
{
rcu_read_lock();
mnt_add_count(mnt, -1);
if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */
rcu_read_unlock();
return;
}
lock_mount_hash();
if (mnt_get_count(mnt)) {
rcu_read_unlock();
unlock_mount_hash();
return;
}
if (unlikely(mnt->mnt.mnt_fl... | https://www.cvedetails.com/cve/CVE-2014-9717/ | linux | ce07d891a0891d3c0d0c2d73d577490486b809e1 | medium | {
"commit_message": "mnt: Honor MNT_LOCKED when detaching mounts\n\nModify umount(MNT_DETACH) to keep mounts in the hash table that are\nlocked to their parent mounts, when the parent is lazily unmounted.\n\nIn mntput_no_expir",
"cve_id": "CVE-2014-9717",
"dataset_source": "BigVul"
} | ||
bigvul_198 | BigVul | CWE-119 | c | void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pAudioBuffer;
EAS_I32 k;
EAS_I32 b1;
EAS_I32 b2;
EAS_I32 z1;
EAS_I32 z2;
EAS_I32 acc0;
EAS_I32 acc1;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame... | void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pAudioBuffer;
EAS_I32 k;
EAS_I32 b1;
EAS_I32 b2;
EAS_I32 z1;
EAS_I32 z2;
EAS_I32 acc0;
EAS_I32 acc1;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame... | https://www.cvedetails.com/cve/CVE-2016-0838/ | Android | 3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49 | medium | {
"commit_message": "Sonivox: sanity check numSamples.\n\nBug: 26366256\nChange-Id: I066888c25035ea4c60c88f316db4508dc4dab6bc\n",
"cve_id": "CVE-2016-0838",
"dataset_source": "BigVul"
} | ||
bigvul_201 | BigVul | CWE-119 | c | void EncoderTest::InitializeConfig() {
const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);
ASSERT_EQ(VPX_CODEC_OK, res);
} | void EncoderTest::InitializeConfig() {
const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);
dec_cfg_ = vpx_codec_dec_cfg_t();
ASSERT_EQ(VPX_CODEC_OK, res);
} | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | medium | {
"commit_message": "Merge Conflict Fix CL to lmp-mr1-release for ag/849478\n\nDO NOT MERGE - libvpx: Pull from upstream\n\nCurrent HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06\n\nBUG=23452792\n\nChange-Id: Ic78176fc369e0bacc71",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_210 | BigVul | CWE-617 | c | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | https://www.cvedetails.com/cve/CVE-2017-13658/ | ImageMagick | e5c063a1007506ba69e97a35effcdef944421c89 | medium | {
"commit_message": "https://github.com/ImageMagick/ImageMagick/issues/598",
"cve_id": "CVE-2017-13658",
"dataset_source": "BigVul"
} | ||
bigvul_259 | BigVul | CWE-20 | c | OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,
OMX_IN OMX_INDEXTYPE paramIndex,
OMX_IN OMX_PTR paramData)
{
(void)hComp;
OMX_ERRORTYPE eRet = OMX_ErrorNone;
if (m_state == OMX_StateInvalid) {
DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State");
return ... | OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,
OMX_IN OMX_INDEXTYPE paramIndex,
OMX_IN OMX_PTR paramData)
{
(void)hComp;
OMX_ERRORTYPE eRet = OMX_ErrorNone;
if (m_state == OMX_StateInvalid) {
DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State");
return ... | https://www.cvedetails.com/cve/CVE-2016-2480/ | Android | 560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8 | medium | {
"commit_message": "DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data\n\nCheck the sanity of config/param strcuture objects\npassed to get/set _ config()/parameter() methods.\n\nBug: 27533317\nSecurity Vulnerabi",
"cve_id": "CVE-2016-2480",
"dataset_source": "BigVul"
} | ||
bigvul_264 | BigVul | CWE-264 | c | void bnep_net_setup(struct net_device *dev)
{
memset(dev->broadcast, 0xff, ETH_ALEN);
dev->addr_len = ETH_ALEN;
ether_setup(dev);
dev->netdev_ops = &bnep_netdev_ops;
dev->watchdog_timeo = HZ * 2;
} | void bnep_net_setup(struct net_device *dev)
{
memset(dev->broadcast, 0xff, ETH_ALEN);
dev->addr_len = ETH_ALEN;
ether_setup(dev);
dev->priv_flags &= ~IFF_TX_SKB_SHARING;
dev->netdev_ops = &bnep_netdev_ops;
dev->watchdog_timeo = HZ * 2;
} | https://www.cvedetails.com/cve/CVE-2011-4112/ | linux | 550fd08c2cebad61c548def135f67aba284c6162 | medium | {
"commit_message": "net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared\n\nAfter the last patch, We are left in a state in which only drivers calling\nether_setup have IFF_TX_SKB_SHARING set (we assume t",
"cve_id": "CVE-2011-4112",
"dataset_source": "BigVul"
} | ||
bigvul_292 | BigVul | CWE-787 | c | horizontalDifference16(unsigned short *ip, int n, int stride,
unsigned short *wp, uint16 *From14)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
/* assumption is unsigned pixel values */
#undef CLAMP
#define CLAMP(v) From14[(v) >> 2]
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
... | horizontalDifference16(unsigned short *ip, int n, int stride,
unsigned short *wp, uint16 *From14)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
/* assumption is unsigned pixel values */
#undef CLAMP
#define CLAMP(v) From14[(v) >> 2]
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
... | https://www.cvedetails.com/cve/CVE-2016-9537/ | libtiff | 83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f | medium | {
"commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan",
"cve_id": "CVE-2016-9537",
"dataset_source": "BigVul"
} | ||
bigvul_314 | BigVul | CWE-189 | cpp | void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) {
int i, j;
Guchar *inp, *tmp_line;
switch (colorSpace->getMode()) {
case csIndexed:
case csSeparation:
tmp_line = (Guchar *) gmalloc (length * nComps2);
for (i = 0; i < length; i++) {
for (j = 0; j < nComps2; j++... | void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) {
int i, j;
Guchar *inp, *tmp_line;
switch (colorSpace->getMode()) {
case csIndexed:
case csSeparation:
tmp_line = (Guchar *) gmallocn (length, nComps2);
for (i = 0; i < length; i++) {
for (j = 0; j < nComps2; j++... | https://www.cvedetails.com/cve/CVE-2009-3605/ | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | medium | {
"commit_message": "",
"cve_id": "CVE-2009-3605",
"dataset_source": "BigVul"
} | ||
bigvul_323 | BigVul | CWE-20 | c | void TabContentsContainerGtk::DetachTab(TabContents* tab) {
gfx::NativeView widget = tab->web_contents()->GetNativeView();
if (widget) {
GtkWidget* parent = gtk_widget_get_parent(widget);
if (parent) {
DCHECK_EQ(parent, expanded_);
gtk_container_remove(GTK_CONTAINER(expanded_), widget);
}
... | void TabContentsContainerGtk::DetachTab(TabContents* tab) {
void TabContentsContainerGtk::DetachTab(WebContents* tab) {
gfx::NativeView widget = tab->GetNativeView();
if (widget) {
GtkWidget* parent = gtk_widget_get_parent(widget);
if (parent) {
DCHECK_EQ(parent, expanded_);
gtk_container_remo... | https://www.cvedetails.com/cve/CVE-2012-5148/ | Chrome | e89cfcb9090e8c98129ae9160c513f504db74599 | medium | {
"commit_message": "Remove TabContents from TabStripModelObserver::TabDetachedAt.\n\nBUG=107201\nTEST=no visible change\n\n\nReview URL: https://chromiumcodereview.appspot.com/11293205\n\ngit-svn-id: svn://svn.chromium.org/chrom",
"cve_id": "CVE-2012-5148",
"dataset_source": "BigVul"
} | ||
bigvul_376 | BigVul | CWE-190 | c | int bmp_validate(jas_stream_t *in)
{
int n;
int i;
uchar buf[2];
assert(JAS_STREAM_MAXPUTBACK >= 2);
/* Read the first two characters that constitute the signature. */
if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) {
return -1;
}
/* Put the characters read back onto the stream. */
for (i = n - 1... | int bmp_validate(jas_stream_t *in)
{
int n;
int i;
jas_uchar buf[2];
assert(JAS_STREAM_MAXPUTBACK >= 2);
/* Read the first two characters that constitute the signature. */
if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) {
return -1;
}
/* Put the characters read back onto the stream. */
for (i = n... | https://www.cvedetails.com/cve/CVE-2016-9557/ | jasper | d42b2388f7f8e0332c846675133acea151fc557a | medium | {
"commit_message": "The generation of the configuration file jas_config.h has been completely\nreworked in order to avoid pollution of the global namespace.\n\nSome problematic types like uchar, ulong, and friends have been",
"cve_id": "CVE-2016-9557",
"dataset_source": "BigVul"
} | ||
bigvul_390 | BigVul | CWE-732 | c | void PlatformSensorProviderAndroid::CreateSensorInternal(
mojom::SensorType type,
mojo::ScopedSharedBufferMapping mapping,
const CreateSensorCallback& callback) {
JNIEnv* env = AttachCurrentThread();
switch (type) {
case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES:
CreateAbsolu... | void PlatformSensorProviderAndroid::CreateSensorInternal(
mojom::SensorType type,
SensorReadingSharedBuffer* reading_buffer,
const CreateSensorCallback& callback) {
JNIEnv* env = AttachCurrentThread();
switch (type) {
case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES:
CreateAbso... | https://www.cvedetails.com/cve/CVE-2018-6057/ | Chrome | c0c8978849ac57e4ecd613ddc8ff7852a2054734 | medium | {
"commit_message": "android: Fix sensors in device service.\n\nThis patch fixes a bug that prevented more than one sensor data\nto be available at once when using the device motion/orientation\nAPI.\n\nThe issue was introduced",
"cve_id": "CVE-2018-6057",
"dataset_source": "BigVul"
} | ||
bigvul_396 | BigVul | CWE-787 | c | horizontalDifference8(unsigned char *ip, int n, int stride,
unsigned short *wp, uint16 *From8)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
#undef CLAMP
#define CLAMP(v) (From8[(v)])
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i... | horizontalDifference8(unsigned char *ip, int n, int stride,
unsigned short *wp, uint16 *From8)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
#undef CLAMP
#define CLAMP(v) (From8[(v)])
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i... | https://www.cvedetails.com/cve/CVE-2016-9537/ | libtiff | 83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f | medium | {
"commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan",
"cve_id": "CVE-2016-9537",
"dataset_source": "BigVul"
} | ||
bigvul_411 | BigVul | CWE-200 | c | static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url,
AVDictionary *opts, AVDictionary *opts2, int *is_http)
{
HLSContext *c = s->priv_data;
AVDictionary *tmp = NULL;
const char *proto_name = NULL;
int ret;
av_dict_copy(&tmp, opts, 0);
av_dict_copy(&tmp,... | static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url,
AVDictionary *opts, AVDictionary *opts2, int *is_http)
{
HLSContext *c = s->priv_data;
AVDictionary *tmp = NULL;
const char *proto_name = NULL;
int ret;
av_dict_copy(&tmp, opts, 0);
av_dict_copy(&tmp,... | https://www.cvedetails.com/cve/CVE-2017-9993/ | FFmpeg | 189ff4219644532bdfa7bab28dfedaee4d6d4021 | medium | {
"commit_message": "avformat/hls: Check local file extensions\n\nThis reduces the attack surface of local file-system\ninformation leaking.\n\nIt prevents the existing exploit leading to an information leak. As\nwell as simila",
"cve_id": "CVE-2017-9993",
"dataset_source": "BigVul"
} | ||
bigvul_493 | BigVul | CWE-119 | c | long Cluster::GetIndex() const
{
return m_index;
} | long Cluster::GetIndex() const
Cluster::Cluster(Segment* pSegment, long idx, long long element_start
/* long long element_size */)
: m_pSegment(pSegment),
m_element_start(element_start),
m_index(idx),
m_pos(element_start),
m_element_size(-1 /* element_size */),
m_timec... | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_540 | BigVul | CWE-362 | c | int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb)
{
struct ip_options *sopt;
unsigned char *sptr, *dptr;
int soffset, doffset;
int optlen;
__be32 daddr;
memset(dopt, 0, sizeof(struct ip_options));
sopt = &(IPCB(skb)->opt);
if (sopt->optlen == 0) {
dopt->optlen = 0;
return 0;
}
... | int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb)
int ip_options_echo(struct ip_options *dopt, struct sk_buff *skb)
{
const struct ip_options *sopt;
unsigned char *sptr, *dptr;
int soffset, doffset;
int optlen;
__be32 daddr;
memset(dopt, 0, sizeof(struct ip_options));
sopt = &(IPCB(skb)... | https://www.cvedetails.com/cve/CVE-2012-3552/ | linux | f6d8bd051c391c1c0458a30b2a7abcd939329259 | medium | {
"commit_message": "inet: add RCU protection to inet->opt\n\nWe lack proper synchronization to manipulate inet->opt ip_options\n\nProblem is ip_make_skb() calls ip_setup_cork() and\nip_setup_cork() possibly makes a copy of ip",
"cve_id": "CVE-2012-3552",
"dataset_source": "BigVul"
} | ||
bigvul_550 | BigVul | CWE-119 | c | OMX_ERRORTYPE SoftAVC::setConfig(
OMX_INDEXTYPE index, const OMX_PTR _params) {
switch (index) {
case OMX_IndexConfigVideoIntraVOPRefresh:
{
OMX_CONFIG_INTRAREFRESHVOPTYPE *params =
(OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params;
if (params->nPortIndex != kOutputPortI... | OMX_ERRORTYPE SoftAVC::setConfig(
OMX_INDEXTYPE index, const OMX_PTR _params) {
switch (index) {
case OMX_IndexConfigVideoIntraVOPRefresh:
{
OMX_CONFIG_INTRAREFRESHVOPTYPE *params =
(OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params;
if (!isValidOMXParam(params)) {
... | https://www.cvedetails.com/cve/CVE-2016-2476/ | Android | 295c883fe3105b19bcd0f9e07d54c6b589fc5bff | medium | {
"commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n",
"cve_id": "CVE-2016-2476",
"dataset_source": "BigVul"
} | ||
bigvul_569 | BigVul | CWE-416 | c | static int link_pipe(struct pipe_inode_info *ipipe,
struct pipe_inode_info *opipe,
size_t len, unsigned int flags)
{
struct pipe_buffer *ibuf, *obuf;
int ret = 0, i = 0, nbuf;
/*
* Potential ABBA deadlock, work around it by ordering lock
* grabbing by pipe info address. Otherwise two different pro... | static int link_pipe(struct pipe_inode_info *ipipe,
struct pipe_inode_info *opipe,
size_t len, unsigned int flags)
{
struct pipe_buffer *ibuf, *obuf;
int ret = 0, i = 0, nbuf;
/*
* Potential ABBA deadlock, work around it by ordering lock
* grabbing by pipe info address. Otherwise two different pro... | https://www.cvedetails.com/cve/CVE-2019-11487/ | linux | 6b3a707736301c2128ca85ce85fb13f60b5e350a | medium | {
"commit_message": "Merge branch 'page-refs' (page ref overflow)\n\nMerge page ref overflow branch.\n\nJann Horn reported that he can overflow the page ref count with\nsufficient memory (and a filesystem that is intentionally",
"cve_id": "CVE-2019-11487",
"dataset_source": "BigVul"
} |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 22