Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
8
13
source_dataset
stringclasses
1 value
cwe
stringclasses
84 values
language
stringclasses
2 values
vulnerable_code
stringlengths
27
234k
secure_code
stringlengths
15
235k
url
stringlengths
45
48
repository
stringclasses
266 values
commit_hash
stringlengths
6
81
timestamp
stringclasses
1 value
cvss_score
stringclasses
1 value
severity
stringclasses
1 value
metadata
dict
bigvul_5
BigVul
CWE-415
c
gss_get_mic (minor_status, context_handle, qop_req, message_buffer, msg_token) OM_uint32 * minor_status; gss_ctx_id_t context_handle; gss_qop_t qop_req; gss_buffer_t message_buffer; gss_buffer_t msg_token; { OM_uint32 status; gss_union_ctx_id_t ctx; gss_mechanism mech; s...
gss_get_mic (minor_status, context_handle, qop_req, message_buffer, msg_token) OM_uint32 * minor_status; gss_ctx_id_t context_handle; gss_qop_t qop_req; gss_buffer_t message_buffer; gss_buffer_t msg_token; { OM_uint32 status; gss_union_ctx_id_t ctx; gss_mechanism mech; s...
https://www.cvedetails.com/cve/CVE-2017-11462/
krb5
56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
medium
{ "commit_message": "Preserve GSS context on init/accept failure\n\nAfter gss_init_sec_context() or gss_accept_sec_context() has created a\ncontext, don't delete the mechglue context on failures from subsequent\ncalls, even i", "cve_id": "CVE-2017-11462", "dataset_source": "BigVul" }
bigvul_13
BigVul
CWE-787
c
void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id, mojo::ScopedSharedBufferHandle handle) { DVLOG(1) << __func__ << " buffer_id: " << buffer_id; DCHECK(io_thread_checker_.CalledOnValidThread()); DCHECK(handle.is_valid()); base::SharedMemoryHandle memory_handle; ...
void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id, mojo::ScopedSharedBufferHandle handle) { DVLOG(1) << __func__ << " buffer_id: " << buffer_id; DCHECK(io_thread_checker_.CalledOnValidThread()); DCHECK(handle.is_valid()); base::SharedMemoryHandle memory_handle; ...
https://www.cvedetails.com/cve/CVE-2018-6063/
Chrome
673ce95d481ea9368c4d4d43ac756ba1d6d9e608
medium
{ "commit_message": "Correct mojo::WrapSharedMemoryHandle usage\n\nFixes some incorrect uses of mojo::WrapSharedMemoryHandle which\nwere assuming that the call actually has any control over the memory\nprotection applied to a", "cve_id": "CVE-2018-6063", "dataset_source": "BigVul" }
bigvul_37
BigVul
CWE-125
c
frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2) { register const struct ip6_frag *dp; register const struct ip6_hdr *ip6; dp = (const struct ip6_frag *)bp; ip6 = (const struct ip6_hdr *)bp2; ND_TCHECK(dp->ip6f_offlg); if (ndo->ndo_vflag) { ND_PRINT((ndo, "fra...
frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2) { register const struct ip6_frag *dp; register const struct ip6_hdr *ip6; dp = (const struct ip6_frag *)bp; ip6 = (const struct ip6_hdr *)bp2; ND_TCHECK(*dp); if (ndo->ndo_vflag) { ND_PRINT((ndo, "frag (0x%08x:%...
https://www.cvedetails.com/cve/CVE-2017-13031/
tcpdump
2d669862df7cd17f539129049f6fb70d17174125
medium
{ "commit_message": "CVE-2017-13031/Check for the presence of the entire IPv6 fragment header.\n\nThis fixes a buffer over-read discovered by Bhargava Shastry,\nSecT/TU Berlin.\n\nAdd a test using the capture file supplied by ", "cve_id": "CVE-2017-13031", "dataset_source": "BigVul" }
bigvul_69
BigVul
CWE-119
c
EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const { RefPtr<EntrySyncCallbackHelper> helper = EntrySyncCallbackHelper::create(); m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchro...
EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const { EntrySyncCallbackHelper* helper = EntrySyncCallbackHelper::create(); m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchronous); ...
https://www.cvedetails.com/cve/CVE-2013-0917/
Chrome
02c8303512ebed345011f7b545e2f418799be2f0
medium
{ "commit_message": "Oilpan: Ship Oilpan for SyncCallbackHelper, CreateFileResult and CallbackWrapper in filesystem/\n\nThese are leftovers when we shipped Oilpan for filesystem/ once.\n\nBUG=340522\n\nReview URL: https://coder", "cve_id": "CVE-2013-0917", "dataset_source": "BigVul" }
bigvul_70
BigVul
CWE-119
c
ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl( ScriptState* scriptState, mojom::blink::WebBluetoothGATTQueryQuantity quantity, String servicesUUID) { if (!connected()) { return ScriptPromise::rejectWithDOMException( scriptState, DOMException::create(NetworkError, kGAT...
ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl( ScriptState* scriptState, mojom::blink::WebBluetoothGATTQueryQuantity quantity, String servicesUUID) { if (!connected()) { return ScriptPromise::rejectWithDOMException( scriptState, DOMException::create(NetworkError, kGAT...
https://www.cvedetails.com/cve/CVE-2015-1215/
Chrome
2bceda4948deeaed0a5a99305d0d488eb952f64f
medium
{ "commit_message": "Allow serialization of empty bluetooth uuids.\n\nThis change allows the passing WTF::Optional<String> types as\nbluetooth.mojom.UUID optional parameter without needing to ensure the passed\nobject isn't e", "cve_id": "CVE-2015-1215", "dataset_source": "BigVul" }
bigvul_91
BigVul
CWE-190
c
static void common_hrtimer_rearm(struct k_itimer *timr) { struct hrtimer *timer = &timr->it.real.timer; if (!timr->it_interval) return; timr->it_overrun += (unsigned int) hrtimer_forward(timer, timer->base->get_time(), timr->it_interval); hrtimer_restart(timer); }
static void common_hrtimer_rearm(struct k_itimer *timr) { struct hrtimer *timer = &timr->it.real.timer; if (!timr->it_interval) return; timr->it_overrun += hrtimer_forward(timer, timer->base->get_time(), timr->it_interval); hrtimer_restart(timer); }
https://www.cvedetails.com/cve/CVE-2018-12896/
linux
78c9c4dfbf8c04883941445a195276bb4bb92c76
medium
{ "commit_message": "posix-timers: Sanitize overrun handling\n\nThe posix timer overrun handling is broken because the forwarding functions\ncan return a huge number of overruns which does not fit in an int. As a\nconsequence", "cve_id": "CVE-2018-12896", "dataset_source": "BigVul" }
bigvul_114
BigVul
CWE-89
c
char *curl_easy_unescape(CURL *handle, const char *string, int length, int *olen) { int alloc = (length?length:(int)strlen(string))+1; char *ns = malloc(alloc); unsigned char in; int strindex=0; unsigned long hex; CURLcode res; if(!ns) return NULL; while(--alloc >...
char *curl_easy_unescape(CURL *handle, const char *string, int length, CURLcode Curl_urldecode(struct SessionHandle *data, const char *string, size_t length, char **ostring, size_t *olen, bool reject_ctrl) { size_t alloc = (length?length:strlen(...
https://www.cvedetails.com/cve/CVE-2012-0036/
curl
75ca568fa1c19de4c5358fed246686de8467c238
medium
{ "commit_message": "URL sanitize: reject URLs containing bad data\n\nProtocols (IMAP, POP3 and SMTP) that use the path part of a URL in a\ndecoded manner now use the new Curl_urldecode() function to reject URLs\nwith embedde", "cve_id": "CVE-2012-0036", "dataset_source": "BigVul" }
bigvul_120
BigVul
CWE-400
c
static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = 0U; while (y...
static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y, written; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = written ...
https://www.cvedetails.com/cve/CVE-2019-12973/
openjpeg
8ee335227bbcaf1614124046aa25e53d67b11ec3
medium
{ "commit_message": "convertbmp: detect invalid file dimensions early\n\nwidth/length dimensions read from bmp headers are not necessarily\nvalid. For instance they may have been maliciously set to very large\nvalues with the", "cve_id": "CVE-2019-12973", "dataset_source": "BigVul" }
bigvul_125
BigVul
CWE-119
c
const char* Chapters::Display::GetCountry() const { return m_country; }
const char* Chapters::Display::GetCountry() const
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_192
BigVul
CWE-119
c
nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd_writeargs *args) { unsigned int len, hdr, dlen; struct kvec *head = rqstp->rq_arg.head; int v; p = decode_fh(p, &args->fh); if (!p) return 0; p++; /* beginoffset */ args->offset = ntohl(*p++); /* offset */ p++; /* totalcount *...
nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd_writeargs *args) { unsigned int len, hdr, dlen; struct kvec *head = rqstp->rq_arg.head; int v; p = decode_fh(p, &args->fh); if (!p) return 0; p++; /* beginoffset */ args->offset = ntohl(*p++); /* offset */ p++; /* totalcount *...
https://www.cvedetails.com/cve/CVE-2017-7895/
linux
13bf9fbff0e5e099e2b6f003a0ab8ae145436309
medium
{ "commit_message": "nfsd: stricter decoding of write-like NFSv2/v3 ops\n\nThe NFSv2/v3 code does not systematically check whether we decode past\nthe end of the buffer. This generally appears to be harmless, but there\nare ", "cve_id": "CVE-2017-7895", "dataset_source": "BigVul" }
bigvul_196
BigVul
CWE-284
c
static void mntput_no_expire(struct mount *mnt) { rcu_read_lock(); mnt_add_count(mnt, -1); if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */ rcu_read_unlock(); return; } lock_mount_hash(); if (mnt_get_count(mnt)) { rcu_read_unlock(); unlock_mount_hash(); return; } if (unlikely(mnt->mnt.mnt_fl...
static void mntput_no_expire(struct mount *mnt) { rcu_read_lock(); mnt_add_count(mnt, -1); if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */ rcu_read_unlock(); return; } lock_mount_hash(); if (mnt_get_count(mnt)) { rcu_read_unlock(); unlock_mount_hash(); return; } if (unlikely(mnt->mnt.mnt_fl...
https://www.cvedetails.com/cve/CVE-2014-9717/
linux
ce07d891a0891d3c0d0c2d73d577490486b809e1
medium
{ "commit_message": "mnt: Honor MNT_LOCKED when detaching mounts\n\nModify umount(MNT_DETACH) to keep mounts in the hash table that are\nlocked to their parent mounts, when the parent is lazily unmounted.\n\nIn mntput_no_expir", "cve_id": "CVE-2014-9717", "dataset_source": "BigVul" }
bigvul_198
BigVul
CWE-119
c
void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pAudioBuffer; EAS_I32 k; EAS_I32 b1; EAS_I32 b2; EAS_I32 z1; EAS_I32 z2; EAS_I32 acc0; EAS_I32 acc1; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame...
void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pAudioBuffer; EAS_I32 k; EAS_I32 b1; EAS_I32 b2; EAS_I32 z1; EAS_I32 z2; EAS_I32 acc0; EAS_I32 acc1; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame...
https://www.cvedetails.com/cve/CVE-2016-0838/
Android
3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49
medium
{ "commit_message": "Sonivox: sanity check numSamples.\n\nBug: 26366256\nChange-Id: I066888c25035ea4c60c88f316db4508dc4dab6bc\n", "cve_id": "CVE-2016-0838", "dataset_source": "BigVul" }
bigvul_201
BigVul
CWE-119
c
void EncoderTest::InitializeConfig() { const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0); ASSERT_EQ(VPX_CODEC_OK, res); }
void EncoderTest::InitializeConfig() { const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0); dec_cfg_ = vpx_codec_dec_cfg_t(); ASSERT_EQ(VPX_CODEC_OK, res); }
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
5a9753fca56f0eeb9f61e342b2fccffc364f9426
medium
{ "commit_message": "Merge Conflict Fix CL to lmp-mr1-release for ag/849478\n\nDO NOT MERGE - libvpx: Pull from upstream\n\nCurrent HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06\n\nBUG=23452792\n\nChange-Id: Ic78176fc369e0bacc71", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_210
BigVul
CWE-617
c
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
https://www.cvedetails.com/cve/CVE-2017-13658/
ImageMagick
e5c063a1007506ba69e97a35effcdef944421c89
medium
{ "commit_message": "https://github.com/ImageMagick/ImageMagick/issues/598", "cve_id": "CVE-2017-13658", "dataset_source": "BigVul" }
bigvul_259
BigVul
CWE-20
c
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
https://www.cvedetails.com/cve/CVE-2016-2480/
Android
560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8
medium
{ "commit_message": "DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data\n\nCheck the sanity of config/param strcuture objects\npassed to get/set _ config()/parameter() methods.\n\nBug: 27533317\nSecurity Vulnerabi", "cve_id": "CVE-2016-2480", "dataset_source": "BigVul" }
bigvul_264
BigVul
CWE-264
c
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->priv_flags &= ~IFF_TX_SKB_SHARING; dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
https://www.cvedetails.com/cve/CVE-2011-4112/
linux
550fd08c2cebad61c548def135f67aba284c6162
medium
{ "commit_message": "net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared\n\nAfter the last patch, We are left in a state in which only drivers calling\nether_setup have IFF_TX_SKB_SHARING set (we assume t", "cve_id": "CVE-2011-4112", "dataset_source": "BigVul" }
bigvul_292
BigVul
CWE-787
c
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
https://www.cvedetails.com/cve/CVE-2016-9537/
libtiff
83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f
medium
{ "commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan", "cve_id": "CVE-2016-9537", "dataset_source": "BigVul" }
bigvul_314
BigVul
CWE-189
cpp
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmalloc (length * nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmallocn (length, nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
https://www.cvedetails.com/cve/CVE-2009-3605/
poppler
7b2d314a61fd0e12f47c62996cb49ec0d1ba747a
medium
{ "commit_message": "", "cve_id": "CVE-2009-3605", "dataset_source": "BigVul" }
bigvul_323
BigVul
CWE-20
c
void TabContentsContainerGtk::DetachTab(TabContents* tab) { gfx::NativeView widget = tab->web_contents()->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remove(GTK_CONTAINER(expanded_), widget); } ...
void TabContentsContainerGtk::DetachTab(TabContents* tab) { void TabContentsContainerGtk::DetachTab(WebContents* tab) { gfx::NativeView widget = tab->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remo...
https://www.cvedetails.com/cve/CVE-2012-5148/
Chrome
e89cfcb9090e8c98129ae9160c513f504db74599
medium
{ "commit_message": "Remove TabContents from TabStripModelObserver::TabDetachedAt.\n\nBUG=107201\nTEST=no visible change\n\n\nReview URL: https://chromiumcodereview.appspot.com/11293205\n\ngit-svn-id: svn://svn.chromium.org/chrom", "cve_id": "CVE-2012-5148", "dataset_source": "BigVul" }
bigvul_376
BigVul
CWE-190
c
int bmp_validate(jas_stream_t *in) { int n; int i; uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n - 1...
int bmp_validate(jas_stream_t *in) { int n; int i; jas_uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n...
https://www.cvedetails.com/cve/CVE-2016-9557/
jasper
d42b2388f7f8e0332c846675133acea151fc557a
medium
{ "commit_message": "The generation of the configuration file jas_config.h has been completely\nreworked in order to avoid pollution of the global namespace.\n\nSome problematic types like uchar, ulong, and friends have been", "cve_id": "CVE-2016-9557", "dataset_source": "BigVul" }
bigvul_390
BigVul
CWE-732
c
void PlatformSensorProviderAndroid::CreateSensorInternal( mojom::SensorType type, mojo::ScopedSharedBufferMapping mapping, const CreateSensorCallback& callback) { JNIEnv* env = AttachCurrentThread(); switch (type) { case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES: CreateAbsolu...
void PlatformSensorProviderAndroid::CreateSensorInternal( mojom::SensorType type, SensorReadingSharedBuffer* reading_buffer, const CreateSensorCallback& callback) { JNIEnv* env = AttachCurrentThread(); switch (type) { case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES: CreateAbso...
https://www.cvedetails.com/cve/CVE-2018-6057/
Chrome
c0c8978849ac57e4ecd613ddc8ff7852a2054734
medium
{ "commit_message": "android: Fix sensors in device service.\n\nThis patch fixes a bug that prevented more than one sensor data\nto be available at once when using the device motion/orientation\nAPI.\n\nThe issue was introduced", "cve_id": "CVE-2018-6057", "dataset_source": "BigVul" }
bigvul_396
BigVul
CWE-787
c
horizontalDifference8(unsigned char *ip, int n, int stride, unsigned short *wp, uint16 *From8) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; #undef CLAMP #define CLAMP(v) (From8[(v)]) mask = CODE_MASK; if (n >= stride) { if (stride == 3) { r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i...
horizontalDifference8(unsigned char *ip, int n, int stride, unsigned short *wp, uint16 *From8) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; #undef CLAMP #define CLAMP(v) (From8[(v)]) mask = CODE_MASK; if (n >= stride) { if (stride == 3) { r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i...
https://www.cvedetails.com/cve/CVE-2016-9537/
libtiff
83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f
medium
{ "commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan", "cve_id": "CVE-2016-9537", "dataset_source": "BigVul" }
bigvul_411
BigVul
CWE-200
c
static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url, AVDictionary *opts, AVDictionary *opts2, int *is_http) { HLSContext *c = s->priv_data; AVDictionary *tmp = NULL; const char *proto_name = NULL; int ret; av_dict_copy(&tmp, opts, 0); av_dict_copy(&tmp,...
static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url, AVDictionary *opts, AVDictionary *opts2, int *is_http) { HLSContext *c = s->priv_data; AVDictionary *tmp = NULL; const char *proto_name = NULL; int ret; av_dict_copy(&tmp, opts, 0); av_dict_copy(&tmp,...
https://www.cvedetails.com/cve/CVE-2017-9993/
FFmpeg
189ff4219644532bdfa7bab28dfedaee4d6d4021
medium
{ "commit_message": "avformat/hls: Check local file extensions\n\nThis reduces the attack surface of local file-system\ninformation leaking.\n\nIt prevents the existing exploit leading to an information leak. As\nwell as simila", "cve_id": "CVE-2017-9993", "dataset_source": "BigVul" }
bigvul_493
BigVul
CWE-119
c
long Cluster::GetIndex() const { return m_index; }
long Cluster::GetIndex() const Cluster::Cluster(Segment* pSegment, long idx, long long element_start /* long long element_size */) : m_pSegment(pSegment), m_element_start(element_start), m_index(idx), m_pos(element_start), m_element_size(-1 /* element_size */), m_timec...
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_540
BigVul
CWE-362
c
int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb) { struct ip_options *sopt; unsigned char *sptr, *dptr; int soffset, doffset; int optlen; __be32 daddr; memset(dopt, 0, sizeof(struct ip_options)); sopt = &(IPCB(skb)->opt); if (sopt->optlen == 0) { dopt->optlen = 0; return 0; } ...
int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb) int ip_options_echo(struct ip_options *dopt, struct sk_buff *skb) { const struct ip_options *sopt; unsigned char *sptr, *dptr; int soffset, doffset; int optlen; __be32 daddr; memset(dopt, 0, sizeof(struct ip_options)); sopt = &(IPCB(skb)...
https://www.cvedetails.com/cve/CVE-2012-3552/
linux
f6d8bd051c391c1c0458a30b2a7abcd939329259
medium
{ "commit_message": "inet: add RCU protection to inet->opt\n\nWe lack proper synchronization to manipulate inet->opt ip_options\n\nProblem is ip_make_skb() calls ip_setup_cork() and\nip_setup_cork() possibly makes a copy of ip", "cve_id": "CVE-2012-3552", "dataset_source": "BigVul" }
bigvul_550
BigVul
CWE-119
c
OMX_ERRORTYPE SoftAVC::setConfig( OMX_INDEXTYPE index, const OMX_PTR _params) { switch (index) { case OMX_IndexConfigVideoIntraVOPRefresh: { OMX_CONFIG_INTRAREFRESHVOPTYPE *params = (OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params; if (params->nPortIndex != kOutputPortI...
OMX_ERRORTYPE SoftAVC::setConfig( OMX_INDEXTYPE index, const OMX_PTR _params) { switch (index) { case OMX_IndexConfigVideoIntraVOPRefresh: { OMX_CONFIG_INTRAREFRESHVOPTYPE *params = (OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params; if (!isValidOMXParam(params)) { ...
https://www.cvedetails.com/cve/CVE-2016-2476/
Android
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
medium
{ "commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n", "cve_id": "CVE-2016-2476", "dataset_source": "BigVul" }
bigvul_569
BigVul
CWE-416
c
static int link_pipe(struct pipe_inode_info *ipipe, struct pipe_inode_info *opipe, size_t len, unsigned int flags) { struct pipe_buffer *ibuf, *obuf; int ret = 0, i = 0, nbuf; /* * Potential ABBA deadlock, work around it by ordering lock * grabbing by pipe info address. Otherwise two different pro...
static int link_pipe(struct pipe_inode_info *ipipe, struct pipe_inode_info *opipe, size_t len, unsigned int flags) { struct pipe_buffer *ibuf, *obuf; int ret = 0, i = 0, nbuf; /* * Potential ABBA deadlock, work around it by ordering lock * grabbing by pipe info address. Otherwise two different pro...
https://www.cvedetails.com/cve/CVE-2019-11487/
linux
6b3a707736301c2128ca85ce85fb13f60b5e350a
medium
{ "commit_message": "Merge branch 'page-refs' (page ref overflow)\n\nMerge page ref overflow branch.\n\nJann Horn reported that he can overflow the page ref count with\nsufficient memory (and a filesystem that is intentionally", "cve_id": "CVE-2019-11487", "dataset_source": "BigVul" }
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
22