prompt stringclasses 1
value | completions listlengths 1 1.33k | labels listlengths 1 1.33k | source stringclasses 1
value | other_info dict | index int64 0 151k |
|---|---|---|---|---|---|
Determine whether the code is vulnerable or not. | [
"psf_get_date_str (char *str, int maxlen)\n{\ttime_t\t\tcurrent ;\n\tstruct tm\ttimedata, *tmptr ;",
"\ttime (¤t) ;",
"#if defined (HAVE_GMTIME_R)\n\t/* If the re-entrant version is available, use it. */\n\ttmptr = gmtime_r (¤t, &timedata) ;\n#elif defined (HAVE_GMTIME)\n\t/* Otherwise use the stand... | [
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-7586",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7586/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074",
"commit_id": "708e996c87c5fae77b104ccfeb8f6db784c32074",
"commit_message": "src/ : Move to a varia... | 0 |
Determine whether the code is vulnerable or not. | [
"void MultibufferDataSource::CreateResourceLoader(int64_t first_byte_position,\n int64_t last_byte_position) {\n DCHECK(render_task_runner_->BelongsToCurrentThread());",
" SetReader(new MultiBufferReader(\n url_data()->multibuffer(), first_byte_position, last... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-18352",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-18352/",
"CWE ID": "CWE-732",
"codeLink": "https://github.com/chromium/chromium/commit/a9cbaa7a40e2b2723cfc2f266c42f4980038a949",
"commit_id": "a9cbaa7a40e2b2723cfc2f266c42f4980038a949",
"commit_message": "Simplify \"WouldTai... | 1 |
Determine whether the code is vulnerable or not. | [
"fbStore_a2r2g2b2 (FbBits *bits, const CARD32 *values, int x, int width, miIndexedPtr indexed)\n{\n int i;\n CARD8 *pixel = ((CARD8 *) bits) + x;\n for (i = 0; i < width; ++i) {\n Splita(READ(values + i));\n WRITE(pixel++, ((a ) & 0xc0) |\n\t ((r >> 2) & 0x30) |\n\t ((g >> 4) ... | [
1
] | BIGVUL | {
"CVE ID": "CVE-2010-1166",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2010-1166/",
"CWE ID": "CWE-189",
"codeLink": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db",
"commit_id": "d2f813f7db157fc83abc4b3726821c36ee7e40b1",
"commit_message": null,
"lang": "C",
"project": "xserver"... | 2 |
Determine whether the code is vulnerable or not. | [
"void UsageTracker::DidGetClientGlobalUsage(StorageType type,\n int64 usage,\n int64 unlimited_usage) {\n DCHECK_EQ(type, type_);\n global_usage_.usage += usage;\n global_usage_.unlimited_usage += unlimited_usage;\n if (--global... | [
1,
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/610f904d8215075c4681be4eb413f4348860bf9f",
"commit_id": "610f904d8215075c4681be4eb413f4348860bf9f",
"commit_message": "Retrieve per host storage usage from QuotaManager.\n\nR=kinuko@chromium.org\nBUG... | 3 |
Determine whether the code is vulnerable or not. | [
"void BlobURLRequestJob::DidRead(int result) {\n if (result < 0) {\n NotifyFailure(net::ERR_FAILED);\n return;\n }\n SetStatus(net::URLRequestStatus()); // Clear the IO_PENDING status",
" AdvanceBytesRead(result);",
" if (!read_buf_remaining_bytes_) {\n int bytes_read = ReadCompleted();\n Noti... | [
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": null,
"CVE Page": null,
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/957973753ec4159003ff7930d946b7e89c7e09f3",
"commit_id": "957973753ec4159003ff7930d946b7e89c7e09f3",
"commit_message": "Make NotifyHeadersComplete the last call in the function.\n\nBUG=82903\nReview U... | 4 |
Determine whether the code is vulnerable or not. | [
"gss_get_mic (minor_status,\n\t context_handle,\n\t qop_req,\n\t message_buffer,\n\t msg_token)",
"OM_uint32 *\t\tminor_status;\ngss_ctx_id_t\t\tcontext_handle;\ngss_qop_t\t\tqop_req;\ngss_buffer_t\t\tmessage_buffer;\ngss_buffer_t\t\tmsg_token;",
"{\n OM_uint32\t\tstatus;\n gss_union_ctx_i... | [
1,
1,
1,
1,
1,
0,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-11462",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-11462/",
"CWE ID": "CWE-415",
"codeLink": "https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf",
"commit_id": "56f7b1bc95a2a3eeb420e069e7655fb181ade5cf",
"commit_message": "Preserve GSS context on ini... | 5 |
Determine whether the code is vulnerable or not. | [
"gss_get_mic (minor_status,\n\t context_handle,\n\t qop_req,\n\t message_buffer,\n\t msg_token)",
"OM_uint32 *\t\tminor_status;\ngss_ctx_id_t\t\tcontext_handle;\ngss_qop_t\t\tqop_req;\ngss_buffer_t\t\tmessage_buffer;\ngss_buffer_t\t\tmsg_token;",
"{\n OM_uint32\t\tstatus;\n gss_union_ctx_i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-11462",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-11462/",
"CWE ID": "CWE-415",
"codeLink": "https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf",
"commit_id": "56f7b1bc95a2a3eeb420e069e7655fb181ade5cf",
"commit_message": "Preserve GSS context on ini... | 5 |
Determine whether the code is vulnerable or not. | [
"void PluginServiceImpl::RegisterFilePathWatcher(FilePathWatcher* watcher,\n const FilePath& path) {\n bool result = watcher->Watch(path, false,\n base::Bind(&NotifyPluginDirChanged));\n DCHECK(result);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0910",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0910/",
"CWE ID": "CWE-287",
"codeLink": "https://github.com/chromium/chromium/commit/ac8bd041b81e46e4e4fcd5021aaa5499703952e6",
"commit_id": "ac8bd041b81e46e4e4fcd5021aaa5499703952e6",
"commit_message": "Follow-on fixes and n... | 6 |
Determine whether the code is vulnerable or not. | [
"record_loop_stats(\n\tdouble\toffset,\t\t/* offset */\n\tdouble\tfreq,\t\t/* frequency (PPM) */\n\tdouble\tjitter,\t\t/* jitter */\n\tdouble\twander,\t\t/* wander (PPM) */\n\tint spoll\n\t)\n{\n\tl_fp\tnow;\n\tu_long\tday;",
"\tif (!stats_control)\n\t\treturn;",
"\tget_systime(&now);\n\tfilegen_setup(&loopstat... | [
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2015-5195",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2015-5195/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27be",
"commit_id": "52e977d79a0c4ace997e5c74af429844da2f27be",
"commit_message": "[Bug 1773] openssl not d... | 7 |
Determine whether the code is vulnerable or not. | [
"static void hns_xgmac_exc_irq_en(struct mac_driver *drv, u32 en)\n{\n\tu32 clr_vlue = 0xfffffffful;\n\tu32 msk_vlue = en ? 0xfffffffful : 0; /*1 is en, 0 is dis*/",
"\tdsaf_write_dev(drv, XGMAC_INT_STATUS_REG, clr_vlue);\n\tdsaf_write_dev(drv, XGMAC_INT_ENABLE_REG, msk_vlue);\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-18222",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-18222/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/torvalds/linux/commit/412b65d15a7f8a93794653968308fc100f2aa87c",
"commit_id": "412b65d15a7f8a93794653968308fc100f2aa87c",
"commit_message": "net: hns: fix ethtool_... | 8 |
Determine whether the code is vulnerable or not. | [
"void BaseRenderingContext2D::clip(Path2D* dom_path,\n const String& winding_rule_string) {\n ClipInternal(dom_path->GetPath(), winding_rule_string);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6077",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6077/",
"CWE ID": "CWE-200",
"codeLink": "https://github.com/chromium/chromium/commit/6ed26f014f76f10e76e80636027a2db9dcbe1664",
"commit_id": "6ed26f014f76f10e76e80636027a2db9dcbe1664",
"commit_message": "[PE] Distinguish betw... | 9 |
Determine whether the code is vulnerable or not. | [
"int http_process_request(struct session *s, struct channel *req, int an_bit)\n{\n\tstruct http_txn *txn = &s->txn;\n\tstruct http_msg *msg = &txn->req;\n\tstruct connection *cli_conn = objt_conn(req->prod->end);",
"\tif (unlikely(msg->msg_state < HTTP_MSG_BODY)) {\n\t\t/* we need more data */\n\t\tchannel_dont_c... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2014-6269",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2014-6269/",
"CWE ID": "CWE-189",
"codeLink": "https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c",
"commit_id": "b4d05093bc89f71377230228007e69a1434c1a0c",
"commit_message": null,
... | 10 |
Determine whether the code is vulnerable or not. | [
"void crypto_aes_encrypt_x86(struct crypto_aes_ctx *ctx, u8 *dst, const u8 *src)\n{\n\taes_enc_blk(ctx, dst, src);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-7421",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-7421/",
"CWE ID": "CWE-264",
"codeLink": "https://github.com/torvalds/linux/commit/5d26a105b5a73e5635eae0629b42fa0a90e07b7b",
"commit_id": "5d26a105b5a73e5635eae0629b42fa0a90e07b7b",
"commit_message": "crypto: prefix module au... | 11 |
Determine whether the code is vulnerable or not. | [
"error::Error GLES2DecoderPassthroughImpl::DoDeletePathsCHROMIUM(GLuint path,\n GLsizei range) {\n NOTIMPLEMENTED();\n return error::kNoError;\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-5219",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-5219/",
"CWE ID": "CWE-416",
"codeLink": "https://github.com/chromium/chromium/commit/a4150b688a754d3d10d2ca385155b1c95d77d6ae",
"commit_id": "a4150b688a754d3d10d2ca385155b1c95d77d6ae",
"commit_message": "Add GL_PROGRAM_COMPLE... | 12 |
Determine whether the code is vulnerable or not. | [
"void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,\n mojo::ScopedSharedBufferHandle handle) {\n DVLOG(1) << __func__ << \" buffer_id: \" << buffer_id;\n DCHECK(io_thread_checker_.CalledOnValidThread());\n DCHECK(handle.is_valid());\n \n base::SharedMemoryHandle mem... | [
1,
0,
1,
0,
1,
0,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6063",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6063/",
"CWE ID": "CWE-787",
"codeLink": "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_id": "673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_message": "Correct mojo::WrapSha... | 13 |
Determine whether the code is vulnerable or not. | [
"void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,\n mojo::ScopedSharedBufferHandle handle) {\n DVLOG(1) << __func__ << \" buffer_id: \" << buffer_id;\n DCHECK(io_thread_checker_.CalledOnValidThread());\n DCHECK(handle.is_valid());\n \n base::SharedMemoryHandle mem... | [
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6063",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6063/",
"CWE ID": "CWE-787",
"codeLink": "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_id": "673ce95d481ea9368c4d4d43ac756ba1d6d9e608",
"commit_message": "Correct mojo::WrapSha... | 13 |
Determine whether the code is vulnerable or not. | [
"void FFmpegVideoDecodeEngine::DecodeFrame(scoped_refptr<Buffer> buffer) {\n scoped_refptr<VideoFrame> video_frame;",
" AVPacket packet;\n av_init_packet(&packet);\n packet.data = const_cast<uint8*>(buffer->GetData());\n packet.size = buffer->GetDataSize();",
" PipelineStatistics statistics;\n statistics... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-2843",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2843/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e",
"commit_id": "d304b5ec1b16766ea2cb552a27dc14df848d6a0e",
"commit_message": "Don't forget the ffmp... | 14 |
Determine whether the code is vulnerable or not. | [
"void Performance::BuildJSONValue(V8ObjectBuilder& builder) const {\n builder.AddNumber(\"timeOrigin\", timeOrigin());\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-6159",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-6159/",
"CWE ID": "CWE-200",
"codeLink": "https://github.com/chromium/chromium/commit/01b42e2bc2aac531b17596729ae4e5c223ae7124",
"commit_id": "01b42e2bc2aac531b17596729ae4e5c223ae7124",
"commit_message": "Fix timing allow chec... | 15 |
Determine whether the code is vulnerable or not. | [
"void RenderView::OnRedo() {\n if (!webview())\n return;",
" webview()->focusedFrame()->executeCommand(WebString::fromUTF8(\"Redo\"));\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2011-2861",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-2861/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_id": "8262245d384be025f13e2a5b3a03b7e5c98374ce",
"commit_message": "DevTools: move DevTool... | 16 |
Determine whether the code is vulnerable or not. | [
"void RenderWidgetHostImpl::AddMouseEventCallback(\n const MouseEventCallback& callback) {\n mouse_event_callbacks_.push_back(callback);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1647",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1647/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/e5787005a9004d7be289cc649c6ae4f3051996cd",
"commit_id": "e5787005a9004d7be289cc649c6ae4f3051996cd",
"commit_message": "Check that RWHI isn't dele... | 17 |
Determine whether the code is vulnerable or not. | [
"void HTMLFormControlElement::didChangeForm() {\n ListedElement::didChangeForm();\n formOwnerSetNeedsValidityCheck();\n if (formOwner() && isConnected() && canBeSuccessfulSubmitButton())\n formOwner()->invalidateDefaultButtonStyle();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2017-5016",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-5016/",
"CWE ID": "CWE-1021",
"codeLink": "https://github.com/chromium/chromium/commit/a8e17a3031b6ad69c399e5e04dd0084e577097fc",
"commit_id": "a8e17a3031b6ad69c399e5e04dd0084e577097fc",
"commit_message": "Form validation: Do ... | 18 |
Determine whether the code is vulnerable or not. | [
"IMPEG2D_ERROR_CODES_T impeg2d_pre_pic_dec_proc(dec_state_t *ps_dec)\n{\n WORD32 u4_get_disp;\n pic_buf_t *ps_disp_pic;\n IMPEG2D_ERROR_CODES_T e_error = (IMPEG2D_ERROR_CODES_T)IVD_ERROR_NONE;",
" u4_get_disp = 0;\n ps_disp_pic = NULL;",
" /* Field Picture */\n if(ps_dec->u2_picture_structure != FRA... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-0824",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-0824/",
"CWE ID": "CWE-254",
"codeLink": "https://android.googlesource.com/platform/external/libmpeg2/+/ffab15eb80630dc799eb410855c93525b75233c3",
"commit_id": "ffab15eb80630dc799eb410855c93525b75233c3",
"commit_message": "Fix... | 19 |
Determine whether the code is vulnerable or not. | [
"static void tg3_remove_one(struct pci_dev *pdev)\n{\n\tstruct net_device *dev = pci_get_drvdata(pdev);",
"\tif (dev) {\n\t\tstruct tg3 *tp = netdev_priv(dev);",
"\t\trelease_firmware(tp->fw);",
"\t\ttg3_reset_task_cancel(tp);",
"\t\tif (tg3_flag(tp, USE_PHYLIB)) {\n\t\t\ttg3_phy_fini(tp);\n\t\t\ttg3_mdio_f... | [
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2013-1929",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-1929/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/torvalds/linux/commit/715230a44310a8cf66fbfb5a46f9a62a9b2de424",
"commit_id": "715230a44310a8cf66fbfb5a46f9a62a9b2de424",
"commit_message": "tg3: fix length overflow... | 20 |
Determine whether the code is vulnerable or not. | [
"void *Type_LUT16_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag)\n{\n cmsUInt8Number InputChannels, OutputChannels, CLUTpoints;\n cmsPipeline* NewLUT = NULL;\n cmsUInt32Number nTabSize;\n cmsFloat64Number Matrix[3*3];\n cmsUInt16Number... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-10165",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-10165/",
"CWE ID": "CWE-125",
"codeLink": "https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2",
"commit_id": "5ca71a7bc18b6897ab21d815d15e218e204581e2",
"commit_message": "Added an extra check t... | 21 |
Determine whether the code is vulnerable or not. | [
"static int start_audio_datapath(struct a2dp_stream_common *common)\n{\n INFO(\"state %d\", common->state);",
" if (common->ctrl_fd == AUDIO_SKT_DISCONNECTED) {\n INFO(\"%s AUDIO_SKT_DISCONNECTED\", __func__);\n return -1;\n }",
" int oldstate = common->state;\n common->state = AUDIO_A2DP_STATE_STA... | [
1,
1,
1,
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-3839",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-3839/",
"CWE ID": "CWE-284",
"codeLink": "https://android.googlesource.com/platform/system/bt/+/472271b153c5dc53c28beac55480a8d8434b2d5c",
"commit_id": "472271b153c5dc53c28beac55480a8d8434b2d5c",
"commit_message": "DO NOT MERG... | 22 |
Determine whether the code is vulnerable or not. | [
"UpdateTouchesForGrab(DeviceIntPtr mouse)\n{\n int i;",
" if (!mouse->touch || mouse->deviceGrab.fromPassiveGrab)\n return;",
" for (i = 0; i < mouse->touch->num_touches; i++) {\n TouchPointInfoPtr ti = mouse->touch->touches + i;\n TouchListener *listener = &ti->listeners[0];\n ... | [
1,
1,
1,
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-10971",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-10971/",
"CWE ID": "CWE-119",
"codeLink": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c",
"commit_id": "215f894965df5fb0bb45b107d84524e700d2073c",
"commit_message": null,
"la... | 23 |
Determine whether the code is vulnerable or not. | [
" virtual ResourceContext* GetResourceContext() {\n return context_;\n }\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2013-0910",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2013-0910/",
"CWE ID": "CWE-287",
"codeLink": "https://github.com/chromium/chromium/commit/ac8bd041b81e46e4e4fcd5021aaa5499703952e6",
"commit_id": "ac8bd041b81e46e4e4fcd5021aaa5499703952e6",
"commit_message": "Follow-on fixes and n... | 24 |
Determine whether the code is vulnerable or not. | [
"static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,\n const ImageInfo *image_info,Image *image)\n{\n char\n s[2];",
" char\n im_vers[32],\n libpng_runv[32],\n libpng_vers[32],\n zlib_runv[32],\n zlib_vers[32];",
" const char\n *name,\n *property,\n *value;",
" const ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | BIGVUL | {
"CVE ID": "CVE-2018-16749",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-16749/",
"CWE ID": "CWE-617",
"codeLink": "https://github.com/ImageMagick/ImageMagick6/commit/1007b98f8795ad4bea6bc5f68a32d83e982fdae4",
"commit_id": "1007b98f8795ad4bea6bc5f68a32d83e982fdae4",
"commit_message": "https://gith... | 25 |
Determine whether the code is vulnerable or not. | [
"v8::Handle<v8::Value> V8WebGLRenderingContext::uniformMatrix2fvCallback(const v8::Arguments& args)\n{\n INC_STATS(\"DOM.WebGLRenderingContext.uniformMatrix2fv()\");\n return uniformMatrixHelper(args, 2);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-3055",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-3055/",
"CWE ID": null,
"codeLink": "https://github.com/chromium/chromium/commit/e9372a1bfd3588a80fcf49aa07321f0971dd6091",
"commit_id": "e9372a1bfd3588a80fcf49aa07321f0971dd6091",
"commit_message": "[V8] Pass Isolate to throw... | 26 |
Determine whether the code is vulnerable or not. | [
"static int decode_putfh(struct xdr_stream *xdr)\n{\n\treturn decode_op_hdr(xdr, OP_PUTFH);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2011-4324",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2011-4324/",
"CWE ID": null,
"codeLink": "https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"commit_id": "dc0b027dfadfcb8a5504f7d8052754bf8d501ab9",
"commit_message": "NFSv4: Convert the open and c... | 27 |
Determine whether the code is vulnerable or not. | [
"xsltCheckExtURI(xsltStylesheetPtr style, const xmlChar * URI)\n{\n xsltExtDefPtr cur;",
" if ((style == NULL) || (style->nsDefs == NULL))\n return (0);\n if (URI == NULL)\n return (0);\n cur = (xsltExtDefPtr) style->nsDefs;\n while (cur != NULL) {\n if (xmlStrEqual(URI, cur->U... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-1683",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-1683/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/chromium/chromium/commit/96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_id": "96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab",
"commit_message": "Roll libxslt to 89168... | 28 |
Determine whether the code is vulnerable or not. | [
"static int bpf_obj_get(const union bpf_attr *attr)\n{\n\tif (CHECK_ATTR(BPF_OBJ) || attr->bpf_fd != 0)\n\t\treturn -EINVAL;",
"\treturn bpf_obj_get_user(u64_to_ptr(attr->pathname));\n}\n"
] | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2016-4558",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2016-4558/",
"CWE ID": null,
"codeLink": "https://github.com/torvalds/linux/commit/92117d8443bc5afacc8d5ba82e541946310f106e",
"commit_id": "92117d8443bc5afacc8d5ba82e541946310f106e",
"commit_message": "bpf: fix refcnt overflow\n\nO... | 29 |
Determine whether the code is vulnerable or not. | [
"bool IsLoaderInterceptionEnabled() {\n return base::FeatureList::IsEnabled(network::features::kNetworkService) ||\n blink::ServiceWorkerUtils::IsServicificationEnabled() ||\n signed_exchange_utils::IsSignedExchangeHandlingEnabled();\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2018-20068",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2018-20068/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/chromium/chromium/commit/4f8104c528f0147c7527718d5aa7c9c38c8220d0",
"commit_id": "4f8104c528f0147c7527718d5aa7c9c38c8220d0",
"commit_message": "Abort navigations on... | 30 |
Determine whether the code is vulnerable or not. | [
"check_switch(int firstcode)\n{\n\treturn (firstcode == SWFACTION_PUSH || firstcode == SWFACTION_JUMP);\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2019-12982",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2019-12982/",
"CWE ID": "CWE-119",
"codeLink": "https://github.com/libming/libming/pull/179/commits/2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9",
"commit_id": "2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9",
"commit_message": "decompileAc... | 31 |
Determine whether the code is vulnerable or not. | [
"xmlParse3986URI(xmlURIPtr uri, const char *str) {\n int ret;",
" ret = xmlParse3986Scheme(uri, &str);\n if (ret != 0) return(ret);\n if (*str != ':') {\n return(1);\n }\n str++;\n ret = xmlParse3986HierPart(uri, &str);\n if (ret != 0) return(ret);\n if (*str == '?') {\n\tstr++;\n\tret = xmlParse3986Quer... | [
1,
1
] | BIGVUL | {
"CVE ID": "CVE-2017-7376",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2017-7376/",
"CWE ID": "CWE-119",
"codeLink": "https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4",
"commit_id": "51e0cb2e5ec18eaf6fb331bc573ff27b743898f4",
"commit_message": "DO N... | 32 |
Determine whether the code is vulnerable or not. | [
"static inline void assign_proto_idx(struct proto *prot)\n{\n}\n"
] | [
1
] | BIGVUL | {
"CVE ID": "CVE-2012-2136",
"CVE Page": "https://www.cvedetails.com/cve/CVE-2012-2136/",
"CWE ID": "CWE-20",
"codeLink": "https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc",
"commit_id": "cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc",
"commit_message": "net: sock: validate data_... | 33 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 5