All the vulnerabilites related to google - v8
Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2024-11-21 02:53
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2016-1485.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3637
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/92053
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1036428
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1038201
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-3041-1
chrome-cve-admin@google.comhttps://codereview.chromium.org/2078403002/
chrome-cve-admin@google.comhttps://codereview.chromium.org/2102243002
chrome-cve-admin@google.comhttps://codereview.chromium.org/2111133002
chrome-cve-admin@google.comhttps://crbug.com/620553
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201610-09
chrome-cve-admin@google.comhttps://source.android.com/security/bulletin/2017-04-01
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1485.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3637
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92053
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036428
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038201
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3041-1
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2078403002/
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2102243002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2111133002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/620553
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-09
af854a3a-2127-422b-91ae-364da2661108https://source.android.com/security/bulletin/2017-04-01
Impacted products
Vendor Product Version
google chrome 51.0.2704.106
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "C413A468-044A-412D-AC99-A2691B22A83F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8377FE4-224C-40A4-AD53-E1E2CDAE56DA",
              "versionEndIncluding": "5.2.360",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "Google V8 en versiones anteriores a 5.2.361.32, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no procesa adecuadamente los objetos recortados por la izquierda, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-5129",
  "lastModified": "2024-11-21T02:53:40.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-23T19:59:11.297",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1038201"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2078403002/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2102243002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2111133002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/620553"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://source.android.com/security/bulletin/2017-04-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2078403002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2102243002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2111133002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/620553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://source.android.com/security/bulletin/2017-04-01"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-21 21:55
Modified
2024-11-21 01:52
Severity ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Impacted products
Vendor Product Version
google chrome *
google v8 *
google v8 3.17.0
google v8 3.17.1
google v8 3.17.2
google v8 3.17.3
google v8 3.17.4
google v8 3.17.5
google v8 3.17.6
google v8 3.17.7
google v8 3.17.8
google v8 3.17.9
google v8 3.17.10
google v8 3.17.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "913E5E2D-2C74-4AE5-8808-4FCEF0FB0AC2",
              "versionEndIncluding": "27.0.1444.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F6776E-25BA-44C4-B9A9-A0B961D838B5",
              "versionEndIncluding": "3.17.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B1935-3469-4540-84F5-4DEA53671FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F251A3F-BEF8-4410-9DFB-5ED8BBC7E61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0659DCB-0831-4862-8905-B3C33DBFD990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DA481F-4E0E-48FE-9552-D7EB466CC024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C066C47-8882-4F54-8071-321960DF1CAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C23E1D-472F-469B-82D2-3D68A3FBE015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A37442-7DC7-40A2-9B45-3B6C4B275E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA01DAB5-0806-4E90-809C-F0AF4E470801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48CC42-FC82-4183-A5BB-35208CDD78A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C831507-B5ED-4CC9-BC91-4046F0DBDACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "128A2521-5428-4199-B745-094083E05E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE1BA769-E534-4C7C-BAB6-29A348521D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
    },
    {
      "lang": "es",
      "value": "Google V8 anterior a v3.17.13, usado en Google Chrome anterior a v27.0.1444.3, permite a atacantes remotos causar una denegaci\u00f3n de servicios (ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otros impactos a trav\u00e9s de c\u00f3digo JavaScript manipulado, como se mostr\u00f3 con el juego Bejewele."
    }
  ],
  "id": "CVE-2013-2632",
  "lastModified": "2024-11-21T01:52:04.957",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-03-21T21:55:00.960",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-05-14 21:59
Modified
2024-11-21 02:46
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2016-1080.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2017-0002.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3590
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/90584
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1035872
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-2960-1
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2017:0879
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2017:0880
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2017:0881
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2017:0882
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2018:0336
chrome-cve-admin@google.comhttps://codereview.chromium.org/1945313002
chrome-cve-admin@google.comhttps://crbug.com/606115
chrome-cve-admin@google.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
chrome-cve-admin@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
chrome-cve-admin@google.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201605-02
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1080.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0002.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90584
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035872
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2960-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0879
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0880
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0881
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0882
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0336
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1945313002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/606115
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201605-02



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "564CADC6-8AB4-4FE0-8E0A-245E87712035",
              "versionEndIncluding": "50.0.2661.87",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D770B4-E1AB-40F6-A9FC-88E0FE860C81",
              "versionEndExcluding": "0.10.46",
              "versionStartIncluding": "0.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D7908B-0B23-4CC4-9585-0120DF187A47",
              "versionEndExcluding": "0.12.15",
              "versionStartIncluding": "0.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "A47FC4F7-1F77-4314-B4B3-3C5D8E335379",
              "versionEndIncluding": "4.1.2",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
              "matchCriteriaId": "9731B34D-C6F6-4129-BFEB-6C5C171F4CC0",
              "versionEndExcluding": "4.4.6",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "30165C60-84D5-49FC-84C9-5CE9CF0DC43D",
              "versionEndExcluding": "5.12.0",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "9ED36E22-DA95-4913-AB4E-4FB696031FFA",
              "versionEndIncluding": "6.2.0",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n Zone::New en zone.cc en Google V8 en versiones anteriores a 5.0.71.47, tal como se utiliza en Google Chrome en versiones anteriores a 50.0.2661.102, no determina correctamente cu\u00e1ndo expandir ciertas asignaciones de memoria, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de buffer) o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1669",
  "lastModified": "2024-11-21T02:46:51.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-05-14T21:59:09.460",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/90584"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1035872"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2960-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2017:0879"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2017:0880"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2017:0881"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2017:0882"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2018:0336"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1945313002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/606115"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201605-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90584"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2960-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2018:0336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1945313002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/606115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201605-02"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3590
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/90876
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1035981
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-2992-1
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2016:1190
chrome-cve-admin@google.comhttps://codereview.chromium.org/1927003003
chrome-cve-admin@google.comhttps://crbug.com/604897
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1927003003
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/604897
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de regexp (tambi\u00e9n conocida como regular expression) en Google V8 en versiones anteriores a 5.0.71.40, como es usada en Google Chrome en versiones anteriores a 51.0.2704.63, no maneja correctamente los tama\u00f1os de cadena externos, lo que permite a atacantes remotos provocar una denegaci\u00f3n del servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1688",
  "lastModified": "2024-11-21T02:46:53.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:17.540",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1927003003"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/604897"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1927003003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/604897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2024-11-21 02:53
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2016-1485.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3637
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/92053
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1036428
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-3041-1
chrome-cve-admin@google.comhttps://codereview.chromium.org/2082633002
chrome-cve-admin@google.comhttps://codereview.chromium.org/2084183004
chrome-cve-admin@google.comhttps://codereview.chromium.org/2085223002
chrome-cve-admin@google.comhttps://codereview.chromium.org/2101983002
chrome-cve-admin@google.comhttps://codereview.chromium.org/2103033002
chrome-cve-admin@google.comhttps://crbug.com/619166
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201610-09
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1485.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3637
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92053
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036428
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3041-1
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2082633002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2084183004
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2085223002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2101983002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2103033002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/619166
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-09
Impacted products
Vendor Product Version
google chrome *
google v8 5.2.360



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC23C474-0857-44A5-ADAE-8AFDEB4EFECE",
              "versionEndIncluding": "51.0.2704.106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FF8F6B-7BAB-4528-88E2-05E52DF7AAF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
    },
    {
      "lang": "es",
      "value": "objects.cc en Google V8 en versiones anteriores a 5.2.361.27, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no impide que los interceptores de la API modifiquen un objetivo de almacenamiento sin ajustar una propiedad, lo que permite a atacantes remotos eludir la Same Origin Policy a trav\u00e9s de un sitio web manipulado."
    }
  ],
  "id": "CVE-2016-5128",
  "lastModified": "2024-11-21T02:53:40.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-23T19:59:10.170",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2082633002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2084183004"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2085223002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2101983002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/2103033002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/619166"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2082633002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2084183004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2085223002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2101983002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2103033002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/619166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-09"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2024-11-21 02:24
Severity ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2015-0816.html
chrome-cve-admin@google.comhttp://ubuntu.com/usn/usn-2570-1
chrome-cve-admin@google.comhttp://www.debian.org/security/2015/dsa-3238
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1032209
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=460917
chrome-cve-admin@google.comhttps://codereview.chromium.org/1000893003
chrome-cve-admin@google.comhttps://codereview.chromium.org/1019033004
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201506-04
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0816.html
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2570-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3238
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032209
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=460917
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1000893003
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1019033004
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201506-04
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9",
              "versionEndIncluding": "4.2.77.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772",
              "versionEndIncluding": "42.0.2311.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ReduceTransitionElementsKind en hydrogen-check-elimination.cc en Google V8 anterior a 4.2.77.8, utilizado en Google Chrome anterior a 42.0.2311.90, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado que aprovecha la \u0027confusi\u00f3n de tipos\u0027 en la optimizaci\u00f3n de la comprobaci\u00f3n de la eliminaci\u00f3n."
    }
  ],
  "evaluatorComment": "\u003ca href=\"https://cwe.mitre.org/data/definitions/843.html\"\u003eCWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)\u003c/a\u003e",
  "id": "CVE-2015-1242",
  "lastModified": "2024-11-21T02:24:58.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-19T10:59:06.757",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1032209"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1000893003"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1019033004"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201506-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1032209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1000893003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1019033004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201506-04"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-10-25 19:55
Modified
2024-11-21 01:31
Severity ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "014BE926-B695-4F9B-8F3E-115F1FAFD480",
              "versionEndIncluding": "15.0.874.101",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
    },
    {
      "lang": "es",
      "value": "Google V8, tal como se utiliza en Google Chrome en versiones anteriores a la 15.0.874.102, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente realizar otras acciones sin especificar a trav\u00e9s de c\u00f3digo JavaScript modificado que provoca operaciones de escritura fuera de los l\u00edmites."
    }
  ],
  "id": "CVE-2011-3886",
  "lastModified": "2024-11-21T01:31:28.813",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-10-25T19:55:01.760",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-21 16:30
Modified
2024-11-21 01:05
Severity ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Impacted products
Vendor Product Version
google v8 *
google chrome *
google chrome 0.2.149.29
google chrome 0.2.149.30
google chrome 0.2.152.1
google chrome 0.2.153.1
google chrome 0.3.154.0
google chrome 0.3.154.3
google chrome 0.4.154.18
google chrome 0.4.154.22
google chrome 0.4.154.31
google chrome 0.4.154.33
google chrome 1.0.154.36
google chrome 1.0.154.39
google chrome 1.0.154.42
google chrome 1.0.154.43
google chrome 1.0.154.46
google chrome 1.0.154.48
google chrome 1.0.154.52
google chrome 1.0.154.53
google chrome 1.0.154.59
google chrome 2.0.156.1
google chrome 2.0.157.0
google chrome 2.0.157.2
google chrome 2.0.158.0
google chrome 2.0.159.0
google chrome 2.0.172
google chrome 2.0.172.30
google chrome 2.0.172.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FB9ABA-F9DB-4F52-A62E-7400F97537A7",
              "versionEndIncluding": "1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BD1820-86D9-4ED4-A502-7F6FE82B80E4",
              "versionEndIncluding": "2.0.172.33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6659833E-E309-4797-84D4-A782237714A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4C0D93-0308-48D4-A953-9398B88E2868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5094C4-1338-4189-B5FD-C9AFFF091D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A8C3D2-82E6-453E-90B7-BA5C5D2CDF54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F95770-F36F-43C0-986F-5C819648271E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCE1FD3-8D27-4304-97F9-6F9689F2498D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6CA696-49AA-4445-B978-96C1D8CE58DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9CFA3BF-6C07-448B-8C83-AD4C524A6577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8497F93-D88A-4FFA-B988-7210608530A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5CDF938-2998-403F-B343-29B620E05D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A9B50D-5B0F-41C9-8FAF-B78CD21A0554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5223F1-85CD-4DF9-9665-BDF7B554A784",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en src/jsregexp.cc en Google V8 anterior a v1.1.10.14, como el utilizado en Google Chrome anterior a v2.0.172.37, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n en el Chrome sandbox a trav\u00e9s de una expresi\u00f3n regular JavaScript manipulada."
    }
  ],
  "id": "CVE-2009-2555",
  "lastModified": "2024-11-21T01:05:09.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-07-21T16:30:00.877",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://codereview.chromium.org/141042"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://codereview.chromium.org/141042/diff/6/1004"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35844"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/55939"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/35722"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1924"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codereview.chromium.org/141042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codereview.chromium.org/141042/diff/6/1004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/55939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/35722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-09-03 22:59
Modified
2024-11-21 02:35
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E69B037-C7E9-4D99-9CF5-12041ACF6DE2",
              "versionEndIncluding": "4.4.63",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBDC4A7D-C94E-42B2-983F-A7660C62A1CD",
              "versionEndIncluding": "44.0.2403",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.5.103.29, como se utiliza en Google Chrome en versiones anteriores a 45.0.2454.85, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-6580",
  "lastModified": "2024-11-21T02:35:14.943",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-09-03T22:59:13.657",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1033472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033472"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2024-11-21 01:44
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
Impacted products
Vendor Product Version
google chrome *
google chrome 23.0.1271.0
google chrome 23.0.1271.1
google chrome 23.0.1271.2
google chrome 23.0.1271.3
google chrome 23.0.1271.4
google chrome 23.0.1271.5
google chrome 23.0.1271.6
google chrome 23.0.1271.7
google chrome 23.0.1271.8
google chrome 23.0.1271.9
google chrome 23.0.1271.10
google chrome 23.0.1271.11
google chrome 23.0.1271.12
google chrome 23.0.1271.13
google chrome 23.0.1271.14
google chrome 23.0.1271.15
google chrome 23.0.1271.16
google chrome 23.0.1271.17
google chrome 23.0.1271.18
google chrome 23.0.1271.19
google chrome 23.0.1271.20
google chrome 23.0.1271.21
google chrome 23.0.1271.22
google chrome 23.0.1271.23
google chrome 23.0.1271.24
google chrome 23.0.1271.26
google chrome 23.0.1271.30
google chrome 23.0.1271.31
google chrome 23.0.1271.32
google chrome 23.0.1271.33
google chrome 23.0.1271.35
google chrome 23.0.1271.36
google chrome 23.0.1271.37
google chrome 23.0.1271.38
google chrome 23.0.1271.39
google chrome 23.0.1271.40
google chrome 23.0.1271.41
google chrome 23.0.1271.44
google chrome 23.0.1271.45
google chrome 23.0.1271.46
google chrome 23.0.1271.49
google chrome 23.0.1271.50
google chrome 23.0.1271.51
google chrome 23.0.1271.52
google chrome 23.0.1271.53
google chrome 23.0.1271.54
google chrome 23.0.1271.55
google chrome 23.0.1271.56
google chrome 23.0.1271.57
google chrome 23.0.1271.58
google chrome 23.0.1271.59
google chrome 23.0.1271.60
google chrome 23.0.1271.61
google v8 *
google v8 1.0
google v8 2.4.0
google v8 2.4.1
google v8 2.4.2
google v8 2.4.3
google v8 2.4.4
google v8 2.4.5
google v8 2.4.6
google v8 2.4.7
google v8 2.4.8
google v8 2.4.9
google v8 2.5.0
google v8 2.5.1
google v8 2.5.2
google v8 2.5.3
google v8 2.5.4
google v8 2.5.5
google v8 2.5.6
google v8 2.5.7
google v8 2.5.8
google v8 2.5.9
google v8 3.0.0
google v8 3.0.1
google v8 3.0.2
google v8 3.0.3
google v8 3.0.4
google v8 3.0.5
google v8 3.0.6
google v8 3.0.7
google v8 3.0.8
google v8 3.0.9
google v8 3.0.10
google v8 3.0.11
google v8 3.0.12
google v8 3.1.0
google v8 3.1.1
google v8 3.1.2
google v8 3.1.3
google v8 3.1.4
google v8 3.1.5
google v8 3.1.6
google v8 3.1.7
google v8 3.1.8
google v8 3.2.0
google v8 3.2.1
google v8 3.2.2
google v8 3.2.3
google v8 3.2.4
google v8 3.2.5
google v8 3.2.6
google v8 3.2.7
google v8 3.2.8
google v8 3.2.9
google v8 3.2.10
google v8 3.3.0
google v8 3.3.1
google v8 3.3.2
google v8 3.3.3
google v8 3.3.4
google v8 3.3.5
google v8 3.3.6
google v8 3.3.7
google v8 3.3.8
google v8 3.3.9
google v8 3.3.10
google v8 3.4.0
google v8 3.4.1
google v8 3.4.2
google v8 3.4.3
google v8 3.4.4
google v8 3.4.5
google v8 3.4.6
google v8 3.4.7
google v8 3.4.8
google v8 3.4.9
google v8 3.4.10
google v8 3.4.11
google v8 3.4.12
google v8 3.4.13
google v8 3.4.14
google v8 3.5.0
google v8 3.5.1
google v8 3.5.2
google v8 3.5.3
google v8 3.5.4
google v8 3.5.5
google v8 3.5.6
google v8 3.5.7
google v8 3.5.8
google v8 3.5.9
google v8 3.5.10
google v8 3.6.0
google v8 3.6.1
google v8 3.6.2
google v8 3.6.3
google v8 3.6.4
google v8 3.6.5
google v8 3.6.6
google v8 3.7.0
google v8 3.7.1
google v8 3.7.2
google v8 3.7.3
google v8 3.7.4
google v8 3.7.5
google v8 3.7.6
google v8 3.7.7
google v8 3.7.8
google v8 3.7.9
google v8 3.7.10
google v8 3.7.11
google v8 3.7.12
google v8 3.8.0
google v8 3.8.1
google v8 3.8.2
google v8 3.8.3
google v8 3.8.4
google v8 3.8.5
google v8 3.8.6
google v8 3.8.7
google v8 3.8.8
google v8 3.8.9
google v8 3.9.0
google v8 3.9.1
google v8 3.9.2
google v8 3.9.3
google v8 3.9.4
google v8 3.9.5
google v8 3.9.6
google v8 3.9.7
google v8 3.9.8
google v8 3.9.9
google v8 3.9.10
google v8 3.9.11
google v8 3.9.12
google v8 3.9.13
google v8 3.9.14
google v8 3.9.15
google v8 3.9.16
google v8 3.9.17
google v8 3.9.18
google v8 3.9.19
google v8 3.9.20
google v8 3.9.21
google v8 3.9.22
google v8 3.9.23
google v8 3.9.24
google v8 3.10.0
google v8 3.10.1
google v8 3.10.2
google v8 3.10.3
google v8 3.10.4
google v8 3.10.5
google v8 3.10.6
google v8 3.10.7
google v8 3.10.8
google v8 3.11.0
google v8 3.11.1
google v8 3.11.2
google v8 3.11.3
google v8 3.11.4
google v8 3.11.5
google v8 3.11.6
google v8 3.11.7
google v8 3.11.8
google v8 3.11.9
google v8 3.11.10
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
linux linux_kernel -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032",
              "versionEndIncluding": "23.0.1271.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E",
              "versionEndIncluding": "3.13.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0FB943-A6D3-4802-A3ED-CCD74974A4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F93F8E3-9C85-43F6-9E7D-47AD90A6260E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87E6D2B-769C-4137-9AFD-9EC4FA697B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1950ECA1-C56C-4C32-A5DA-F6DB4F848625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "20FEF415-3FCD-4008-BE4F-4D1BE87F7ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AC25766-2B74-410A-877F-15685E17462B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECEDCBE7-59CA-4A16-B098-28F37E6AF3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B055FCB-E1BE-4B40-AE3C-5FF0B800D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7AD6435-B632-49C0-8080-CCE8EF6F771F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0F53AC-1980-44DE-897A-FEDDA4BCEE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C32FFF-6D3B-4546-9F30-2E08EE4EA5B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D843D7-646F-4F36-9039-623AD81D5394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "51521515-3A22-4C55-9048-5EE96EFFE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "573802E2-1404-4560-A971-92FE5A4DF747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC919A5A-D4FD-4E7F-8482-B4A046157196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00B997D-4ED0-460C-9398-879F1CF38130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F950D6ED-F7A9-460B-878A-A76A51A3C681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B1BDAD-DEEF-4340-8390-80DC7B8EE3C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7B5EA9-B57D-413A-AADE-DE704AF38289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "903F85A1-CAA2-466E-84FE-171CE57746B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B9101C-2EFD-40AE-8F44-99E9B317C2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A217A47-FAB7-4EE7-80A4-80F6625C4AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5019DC34-F9AB-400C-B0BA-CD745BBCF64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C3AE39-D48F-4D3F-AA2E-1DBC766C5332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2049330D-2110-4E19-95AC-BD12899B580F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87D5E05-7F41-4D07-A582-55E32D315468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C426E3E3-3783-4EB8-AF71-8D5CE61E5AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1BB230-2FFC-4EB9-B241-220E70683861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7694D28-7C7F-4434-A03C-B8A1F727FF9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A5C71B-2A7C-415E-B004-17B9B2BE5609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B3EAA7-AA01-44ED-BEF7-D96FA7783AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF20FBFE-EC21-41D0-A556-0CA85A5AE8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "515F4C07-EC8F-48F8-8FC5-A5AE3009E7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B2EFD6-FD5C-4EF6-82A8-DB269FF638E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD57857-1769-4B65-980E-8918A2F92CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4496715-BEC7-4495-81F6-D7A6F02C993F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B915E17-9A92-4D48-8F87-791DA5EAB46F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD9A39F-F3A7-46DA-AA28-8A03FDEDA423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E9CEB-8CDE-424B-BC80-74F6EA7E403A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52A85C40-CFFA-4448-A678-E35E8DE11FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "10458D4B-EC1B-42D7-B868-3AF043EA92D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65680CC0-57D0-4E6E-8CBE-D853B799DD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7B7E0C-0E07-42D8-A92B-14DB14051A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D978A7-134D-4BD9-B2DD-97F1D9F459B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D055A1-A91D-462B-AD27-8D963564E7DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460C148-9632-409E-A880-E54EAE8AC09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C211998D-6D50-41FC-B21D-21E247E26B90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6FBD9-C103-4B2D-8D31-43747965F934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1013C428-E4B3-497B-B057-3131646263A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E161736-1C08-490B-820D-FC35FACE5144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D67F4F0-3911-4C9E-831D-06390F0C0A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D43E1A-EEA5-4E0E-92DE-1ADFB936AC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "89556CDB-86C7-4909-9EAF-21F985862BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A34E22A-20CC-460C-92BF-E8A9F8B622F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "479F97E2-FBBD-4784-BD27-F94F931050D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E38ED7C-136F-4A88-A762-7790DEAF7373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30D9B21-7941-4BD1-850E-C9B80DFAA314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "232DA7A5-68D4-409C-9A5E-59928189A081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED61B1C-F352-405E-B237-1AA40F593C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE2AE4E-FBA0-432D-A319-16E2F0265A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7FAA54-7A79-4B6D-ABC0-534CD994595C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CAA136B-9404-4BD2-BE3D-D1AB12134E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D369B1-5E98-46C9-9CF9-910C330EEC64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B3631A-471C-40A8-9EB3-ECE921672AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC8D1E9-0FD2-4C87-AD92-ABC460123219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61B1498-7E6C-4CA1-8CBC-0A43CB2A7594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C463B0D-CCD8-49FB-BEA1-EE02AF9A3668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E5B4F1-136A-4AD6-B5D6-E8F118FFC6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D531639-6926-4842-A6A4-F97F7CDEDF7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "51CDF645-3757-4C11-85A2-241DC0639C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB7287E-D015-46F7-BE90-228FB4E771BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E54AB56-AA39-41B9-AC76-8929FBBBC2C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0309560-C695-4300-B6EC-09FFCAE76BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "818D390D-91E7-482D-AC69-7E6261849418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C845DA5-7CBC-440C-9C75-77A4BEA87CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "999DDC92-7924-4461-BB54-82D9F82DECED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "33924A69-F0D8-4E6F-9554-D02A55DC6D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1FC622-E8B7-4756-B609-7754C3C5EE7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4FF2A4-2484-4A29-9F0F-D7BC5015FE2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D43A9A-7820-4097-8AD5-80A4781C2031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A824F502-9FC2-4726-B4E1-660EC74FBC68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5159BF22-2E1C-4A73-B7BA-C78A12D8EEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07140C6-4648-4EB6-8D1F-991F24C2A2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF04257-F8DE-4C14-8F54-BE2CDFECEE34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CB87F4-C655-4200-AB0A-F2CE5C672D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDE3951-8071-475E-84FE-9C8D2EC0670A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A65BE16-D853-488F-9BD2-16BF2181DDF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B96BD0B-E35F-46B2-8583-E57B671ED8AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C4AE78B-6B8E-4AF4-951D-1833F346BC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB357B3E-57E0-46D7-9203-AA6EF73A868D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71E6A99-2B95-4CD7-9EB2-5051AA950FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "9013FCED-2032-47E0-8931-76164AD1DA22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F68D355-67EC-444D-AB75-899AC11B8C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6517275C-EE88-439E-9D0E-ACEE554F251E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7183B8C0-14A5-4889-95CF-B4EA1D2980E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B203B37-0C29-40D8-AFD0-4FDF733623A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F16DF6-7967-43D3-BAC1-4C42E7FDC7FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B37DDE-4652-400D-B2EA-E82AB8DC3622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE56FE77-7BC5-4A31-8060-DDB1900F36CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6531439-1B28-4D9D-B80A-E6BD66813B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A8DCB0-8C09-48CC-8702-89AE3E88B994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4CF2D5-AC6A-46B0-A44C-ECB277BFB1DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CD446-B89C-46CE-8706-536DB87D4E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:-:*:*:*:*:x64:*",
              "matchCriteriaId": "FD90DD84-C896-49DB-8E95-56453C59966D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, en plataformas de 64 bits de Linux, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado que desencadena un acceso fuera de l\u00edmites a una matriz."
    }
  ],
  "evaluatorImpact": "Per: http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html\r\n\r\n\"Linux 64-bit only\"",
  "id": "CVE-2012-5120",
  "lastModified": "2024-11-21T01:44:05.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-11-07T11:43:15.367",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://osvdb.org/87085"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/87085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
References
cve@mitre.orghttp://code.google.com/p/v8/source/detail?r=17800Patch
cve@mitre.orghttp://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
cve@mitre.orghttp://secunia.com/advisories/56216
cve@mitre.orghttp://secunia.com/advisories/56217
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2811
cve@mitre.orghttp://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html
cve@mitre.orghttp://www.securitytracker.com/id/1029442
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=319722
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17800Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319722
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de buffer en runtime.cc en Google V8 anteriores a 3.22.24.7, como se utiliza en Google Chrome anteriores a 31.0.1650.63, permite a atacantes remotos causar denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un array tipado grande, relacionado con las funciones (1) Runtime_TypedArrayInitialize y (2) Runtime_TypedArrayInitializeFromArrayLike."
    }
  ],
  "id": "CVE-2013-6638",
  "lastModified": "2024-11-21T01:59:25.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:03.977",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17800"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-10-15 10:59
Modified
2024-11-21 02:37
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F7F275-A3CD-4A59-9DB4-F577D9DA2A31",
              "versionEndIncluding": "4.6.85.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9908D930-D4BE-4D3A-8503-F162D72C51C2",
              "versionEndIncluding": "45.0.2454.101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.6.85.23, como se utiliza en Google Chrome en versiones anteriores a 46.0.2490.71, permite a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-7834",
  "lastModified": "2024-11-21T02:37:29.597",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-10-15T10:59:12.170",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2770-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2770-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2770-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2770-2"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-10-08 10:55
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49217EEC-AE40-4FBD-A5D4-B4A323CD5645",
              "versionEndIncluding": "38.0.2125.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE7D19C-F45D-4A89-8740-8F9D450093C3",
              "versionEndIncluding": "3.28.69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.28.71.15, utilizado en Google Chrome anterior a 38.0.2125.101, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2014-7967",
  "lastModified": "2024-11-21T02:18:21.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-10-08T10:55:07.080",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2024-11-21 02:29
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9",
              "versionEndIncluding": "4.2.77.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772",
              "versionEndIncluding": "42.0.2311.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.2.77.14, utilizado en Google Chrome anterior a 42.0.2311.90, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-3333",
  "lastModified": "2024-11-21T02:29:11.093",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-19T10:59:13.287",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/74221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74221"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-07-09 10:59
Modified
2024-11-21 02:32
Severity ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
Impacted products
Vendor Product Version
google v8 -
iojs io.js *
iojs io.js 2.0.0
iojs io.js 2.0.1
iojs io.js 2.0.2
iojs io.js 2.1.0
iojs io.js 2.2.0
iojs io.js 2.2.1
iojs io.js 2.3.0
iojs io.js 2.3.1
iojs io.js 2.3.2
nodejs node.js *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iojs:io.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3188BB5-6918-455C-8D25-B4DBA22830D6",
              "versionEndIncluding": "1.8.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABEE90B-14C3-4147-BBDA-6E1186452174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FF9263D-673F-40A4-8D40-56DE5AD63B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BE5478-4021-42D4-B101-A572AAE17DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2233DADC-4FBB-4459-AD8D-B15636DC5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CC13EF-7061-4833-A079-EAB70A32F64B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4A14A1-1D14-4CE8-9198-80C1772A8AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D2B3E1-973D-46ED-ADE4-BECE0CAFD678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8261E351-8CB2-4BCB-AB75-9FDD96DC2BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C236FE4E-1FF0-47E5-91F9-75ADD6C61498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BCBBCD4-2142-44B7-B3ED-6D2A301F85C6",
              "versionEndIncluding": "0.12.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n de Utf8DecoderBase::WriteUtf16Slow en unicode.decoder.cc en Google V8, al igual que como se usa en Node.js anterior a 0.12.6, io.js anterior a 1.8.3 y 2.x antes de 2.3.3 y otros productos, no verifica que haya memoria disponible para un par surrogado UTF-16, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la posibilidad de causar otro impacto a trav\u00e9s de una secuencia de bytes manipulada."
    }
  ],
  "id": "CVE-2015-5380",
  "lastModified": "2024-11-21T02:32:55.317",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-07-09T10:59:00.057",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/75556"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://codereview.chromium.org/1226493003"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/joyent/node/issues/25583"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/75556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1226493003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/joyent/node/issues/25583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-06 01:59
Modified
2024-11-21 02:38
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12CC8E6-3341-4505-99CF-384840C20815",
              "versionEndIncluding": "46.0.2490.86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "698C18EC-5A8D-4F42-88A9-F2BCAA1B8EA3",
              "versionEndIncluding": "4.6.85.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.73, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-8478",
  "lastModified": "2024-11-21T02:38:37.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-12-06T01:59:25.437",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2825-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2825-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-29 10:59
Modified
2024-11-21 02:50
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684",
              "versionEndIncluding": "4.9.385",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E359098-BF8A-4A56-A152-DA06F18096B2",
              "versionEndIncluding": "49.0.2623.95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.33, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.108, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2016-3679",
  "lastModified": "2024-11-21T02:50:29.847",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-29T10:59:05.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1035423"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2955-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2955-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-05-20 10:59
Modified
2024-11-21 02:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B54CC-8096-4708-840D-D8A8C09C7955",
              "versionEndIncluding": "4.3.61.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F238C75-E24A-406F-BEB5-8758C8FE9603",
              "versionEndIncluding": "42.0.2311.152",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.3.61.21, utilizado en Google Chrome anterior a 43.0.2357.65, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-3910",
  "lastModified": "2024-11-21T02:30:04.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-05-20T10:59:19.933",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/74730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74730"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-21 11:14
Modified
2024-11-21 02:07
Severity ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
chrome-cve-admin@google.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html
chrome-cve-admin@google.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html
chrome-cve-admin@google.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
chrome-cve-admin@google.comhttp://secunia.com/advisories/58920
chrome-cve-admin@google.comhttp://secunia.com/advisories/59155
chrome-cve-admin@google.comhttp://secunia.com/advisories/60372
chrome-cve-admin@google.comhttp://www.debian.org/security/2014/dsa-2939
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1030270
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=358057
chrome-cve-admin@google.comhttps://code.google.com/p/v8/source/detail?r=20363
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58920
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59155
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60372
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2939
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030270
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=358057
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=20363
Impacted products
Vendor Product Version
fedoraproject fedora 20
fedoraproject fedora 21
fedoraproject fedora 22
google v8 *
google v8 3.25.0
google v8 3.25.1
google v8 3.25.2
google v8 3.25.3
google v8 3.25.4
google v8 3.25.5
google v8 3.25.6
google v8 3.25.7
google v8 3.25.8
google v8 3.25.9
google v8 3.25.10
google v8 3.25.11
google v8 3.25.12
google v8 3.25.13
google v8 3.25.14
google v8 3.25.15
google v8 3.25.16
google v8 3.25.17
google v8 3.25.18
google v8 3.25.19
google v8 3.25.20
google v8 3.25.21
google v8 3.25.22
google v8 3.25.23
google v8 3.25.24
google v8 3.25.25
google v8 3.25.26
google v8 3.25.27
google chrome *
google chrome 35.0.1916.0
google chrome 35.0.1916.1
google chrome 35.0.1916.2
google chrome 35.0.1916.3
google chrome 35.0.1916.4
google chrome 35.0.1916.5
google chrome 35.0.1916.6
google chrome 35.0.1916.7
google chrome 35.0.1916.8
google chrome 35.0.1916.9
google chrome 35.0.1916.10
google chrome 35.0.1916.11
google chrome 35.0.1916.13
google chrome 35.0.1916.14
google chrome 35.0.1916.15
google chrome 35.0.1916.17
google chrome 35.0.1916.18
google chrome 35.0.1916.19
google chrome 35.0.1916.20
google chrome 35.0.1916.21
google chrome 35.0.1916.22
google chrome 35.0.1916.23
google chrome 35.0.1916.27
google chrome 35.0.1916.31
google chrome 35.0.1916.32
google chrome 35.0.1916.33
google chrome 35.0.1916.34
google chrome 35.0.1916.35
google chrome 35.0.1916.36
google chrome 35.0.1916.37
google chrome 35.0.1916.38
google chrome 35.0.1916.39
google chrome 35.0.1916.40
google chrome 35.0.1916.41
google chrome 35.0.1916.42
google chrome 35.0.1916.43
google chrome 35.0.1916.44
google chrome 35.0.1916.45
google chrome 35.0.1916.46
google chrome 35.0.1916.47
google chrome 35.0.1916.48
google chrome 35.0.1916.49
google chrome 35.0.1916.51
google chrome 35.0.1916.52
google chrome 35.0.1916.54
google chrome 35.0.1916.56
google chrome 35.0.1916.57
google chrome 35.0.1916.59
google chrome 35.0.1916.61
google chrome 35.0.1916.68
google chrome 35.0.1916.69
google chrome 35.0.1916.71
google chrome 35.0.1916.72
google chrome 35.0.1916.74
google chrome 35.0.1916.77
google chrome 35.0.1916.80
google chrome 35.0.1916.82
google chrome 35.0.1916.84
google chrome 35.0.1916.85
google chrome 35.0.1916.86
google chrome 35.0.1916.88
google chrome 35.0.1916.90
google chrome 35.0.1916.92
google chrome 35.0.1916.93
google chrome 35.0.1916.95
google chrome 35.0.1916.96
google chrome 35.0.1916.98
google chrome 35.0.1916.99
google chrome 35.0.1916.101
google chrome 35.0.1916.103
google chrome 35.0.1916.104
google chrome 35.0.1916.105
google chrome 35.0.1916.106
google chrome 35.0.1916.107
google chrome 35.0.1916.108
google chrome 35.0.1916.109
google chrome 35.0.1916.110
google chrome 35.0.1916.111
google chrome 35.0.1916.112



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
              "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9006307-BB0D-49C1-B7CE-B0C645BBB080",
              "versionEndIncluding": "3.25.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84A1139-B995-40F7-9424-EBE8487AE70F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FE6480-321D-401F-9A6D-853D9B2F216E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA187E89-5530-4AE4-B486-8168C1D18D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2542143-7E41-475E-89B0-59E23B2447E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA11334-CCBE-418E-B370-4C439401E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10BFBD8-385A-4419-AC0E-D64A4E4970A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "00BF91BB-623B-4134-A49D-45B86DBD5543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EFB9BF-4E8A-489C-A5EA-1685A10F1AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F95FABF-F383-4F63-9C33-E2DA3D20AB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF0583C-9FE8-4F59-9FEB-603BD3100277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD6EC4E-5E3D-453A-B258-658CB56BBA6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8718DE2-ACA3-452D-901A-9F233C99B3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "407BF16A-6CC9-4279-A819-2360EACF0976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "61265FC3-47D2-4741-A6A7-10B7A7ACF4A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B15C413-3BE0-49DE-9D20-0F01AF6F3C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4738D2F-7169-4FA9-91B8-938989276A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0108D-5E5F-4C6B-A0B1-F2D3CBC53C7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "44080621-DE3C-4E00-956E-D11B3D574ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8B8D82-B3A6-45BA-AB06-40343653B63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD60808B-171A-49E8-9E0C-A75100426562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACC92F2-37F2-42C4-86EF-F747B6E2365E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "5165EFE3-1E24-4C21-86A3-9AE32308C13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE74725F-26B0-484B-9B57-0CE590BD554D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "960DA0A8-79F0-4283-A367-55D73CA64A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7D7FB7-10AB-4291-8DC9-C6E4F9468E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BDE46A-6461-4E65-8B4B-89770494D191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C6188C3-684A-402C-A369-BBE53681FD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEBEA72B-EF8B-4421-BD43-E2F2566F725E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24036B85-837E-46F1-8D2A-7B06E0657979",
              "versionEndIncluding": "35.0.1916.113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7A8B66A-B3CA-44D4-8840-E544D95C5C55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4626CE7E-1135-43BB-A999-D9E9645F4F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B6A451-EF11-47B4-84E7-3EF2554717BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E5FCB33-E3B3-4CB5-8009-67EBAA2AF27A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "825D51C2-BF0E-4A17-B07B-FBBE07FF3430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44AE8107-4530-48A9-BF3D-6CEEFFDE81DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94744496-D0BE-4FAC-B0DE-40E2EF7D2967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18C1D47-733C-4B51-9A04-253D06D20528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6B4DAE-315E-4D49-A4E2-169AE8C659AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E267532-0240-48B5-A8A7-D452DCE68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B073B1B6-37FC-4481-A4A8-D859F9CAD0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "249F1026-0BEE-44FC-BA08-B18A67EC2D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7BF63D-3561-4636-9D0F-5C029DE4FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "65DCFD8D-42CD-4E88-9B66-10D30390A029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B78C9F-2431-4BED-AE00-C9C6F49D91BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "6638F45A-3E2E-47A7-9E29-51BC80E821CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C21673-D3BE-4549-ADBE-86A8C544ACED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "905CE4CB-23CE-46B3-AF25-8300A348D330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D7D729-94F9-406F-9AD7-FD4830234FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B2C2C1-6D3C-416D-8BA2-8A1E8783260C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E4E3A0D-5FFD-49BB-B0DC-D966D4FEE656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09378C5-9960-4DBA-BADF-75F59A670949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5DCFC6-4E56-4C8C-884C-DF1CB3BC7259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BEB034A-ED1A-4692-BC3D-EC87204A6092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DC0366-8512-4679-9C01-92B894CB1E65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "42440388-7439-407F-A753-77B5E196E764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "08529C78-3AEF-4A48-B57A-A3AFD220E717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4418F2D-F462-4E9B-BD09-12D24726BBAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6B7553-A96D-48BC-A555-DB94EB630AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B752A1B-08A6-4D76-9560-4B8287A43D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD5AB04-7B94-4B00-907A-499A19176509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF805B-852D-412D-8B90-A4166041A0F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "741566D6-E3E0-43E6-8B12-19C1CD77C213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9BBD82A-39A6-4CC9-94FE-E3E81E0C06FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "F561EBB8-231D-481F-B109-CFEF3F010FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "3495A795-48EA-4BE9-B6CF-DF934AE3EE1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "4097E83B-5E58-4E70-B1B6-533B97C6405A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF37D299-CB0F-4F94-BBFE-4C1C966A4AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "9965D997-4F96-48BF-94CE-BA471ADE2A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDAB66F-038E-4955-81B7-A6E2157C0BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "F095537D-5045-4450-BCBF-4C93E6E042F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "710040CA-3DEF-484A-88FF-C44D17526B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8B5FDF-5ABE-4A17-B956-FE7CC3F3F1AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "5434C6FD-3C1C-4272-9D8F-5F7AB8E68046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F907549-BEA6-46C7-A528-7E97A8655595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C66DBB18-CA4B-439E-8D2E-8E5E6A42CF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E24A976-B366-412C-8635-CD65687C3A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "717CD257-B2A1-4DE6-83BA-6CE0F58B1B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE9002-9D3A-4D58-A032-1E35364FAFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "313D6BBA-A159-47DA-97E9-CE63AD1DEBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "0576D407-07F9-4163-8937-8D85974918A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F45D58-425C-4ABB-ADD3-2BBADA74A19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC63BF1F-DB9F-4C4E-8460-40A801084020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3D4FD-9707-4B18-96CE-D7CF7EA5F881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "694FBD5C-32E7-4E99-9BDD-8CE8E5D45CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E21C9-50F7-44A3-B642-4BFF4699EBD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE68628B-FEBF-4A75-99C6-C6FA76A5989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "6755C15D-08BD-47DA-B363-6F31F7DE5923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDF01221-5CE0-4559-83E6-3273D573F0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "061A50AD-9D9F-44CA-867B-2E10B9282CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "587440DE-F09E-4789-9B58-4FCDCBFA431E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F1FFDF-509C-4608-9538-EFF07A5031C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0FDEC-2FDB-4902-9904-F2F9E2E6226E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F34690-1EFA-49D3-91B7-E3BD0B3D7056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "44578154-8DFF-4EC7-834C-B54FD6149B91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C2D488-342C-4CAC-A07D-2C198465BC32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D63F62-CC1E-43CF-B1D6-192492796862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5366995-F5FD-4F6E-BFB7-D1E61E52B9DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF55EAB7-A108-4B80-A969-D07A2EDA6184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E16492-4A75-474C-9DEA-B150763843B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431FC69-6C1B-475D-B646-FFB2210C438B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA8FBB0-1004-40C2-AADD-4DE09CFE9326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6CF0AA-AEBE-48FD-A83B-D9ADC25C323F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C6EC014-5EB1-4C19-B828-5DBA6A525194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E90CAB9-09DE-462B-96E4-4FAEC5642F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3CF5D9-E8DE-4751-A873-A3A6769BC19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86895A1-98A7-46C8-8E52-889CB34EEEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E52314C-CB22-4702-8108-F855CEC349D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "379EB1A9-61DB-4A31-8568-DFB5BA3EE610",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de enteros en la funci\u00f3n LCodeGen::PrepareKeyedOperand en arm/lithium-codegen-arm.cc en Google V8 anterior a 3.25.28.16, utilizado en Google Chrome anterior a 35.0.1916.114, permite a atacantes remotos causar una denegaci\u00f3n de servicios o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un valor de clave negativo."
    }
  ],
  "id": "CVE-2014-3152",
  "lastModified": "2024-11-21T02:07:32.923",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-21T11:14:09.990",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/58920"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/59155"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://secunia.com/advisories/60372"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2014/dsa-2939"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1030270"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/v8/source/detail?r=20363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=20363"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-06 02:59
Modified
2024-11-21 02:48
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99CABF0F-D201-46AE-83DC-09257264BF7D",
              "versionEndIncluding": "48.0.2564.116",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684",
              "versionEndIncluding": "4.9.385",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.26, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.75, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2016-2843",
  "lastModified": "2024-11-21T02:48:55.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-06T02:59:13.850",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1035185"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2920-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2920-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-01-22 22:59
Modified
2024-11-21 02:25
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
chromium chromium *
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B248CC65-0394-4432-9520-52E99C17EA4A",
              "versionEndIncluding": "40.0.2214.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:chromium:chromium:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF18F88-88CC-44C7-8695-B37D0AE88DF7",
              "versionEndIncluding": "40.0.2214.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5024444-F7D4-4EE4-9555-BCD1EFE49083",
              "versionEndIncluding": "3.30.33.14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.30.33.15,usado en Google Chrome anterior a 40.0.2214.91, permite a atacantes causar una denegaci\u00f3n de servicio o la posibilidad de tener otro impacto a trav\u00e9s de vectores no conocidos."
    }
  ],
  "id": "CVE-2015-1346",
  "lastModified": "2024-11-21T02:25:13.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-01-22T22:59:29.520",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/62383"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/62575"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1031623"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2476-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/62383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/62575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2476-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2024-11-21 01:44
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google chrome 23.0.1271.0
google chrome 23.0.1271.1
google chrome 23.0.1271.2
google chrome 23.0.1271.3
google chrome 23.0.1271.4
google chrome 23.0.1271.5
google chrome 23.0.1271.6
google chrome 23.0.1271.7
google chrome 23.0.1271.8
google chrome 23.0.1271.9
google chrome 23.0.1271.10
google chrome 23.0.1271.11
google chrome 23.0.1271.12
google chrome 23.0.1271.13
google chrome 23.0.1271.14
google chrome 23.0.1271.15
google chrome 23.0.1271.16
google chrome 23.0.1271.17
google chrome 23.0.1271.18
google chrome 23.0.1271.19
google chrome 23.0.1271.20
google chrome 23.0.1271.21
google chrome 23.0.1271.22
google chrome 23.0.1271.23
google chrome 23.0.1271.24
google chrome 23.0.1271.26
google chrome 23.0.1271.30
google chrome 23.0.1271.31
google chrome 23.0.1271.32
google chrome 23.0.1271.33
google chrome 23.0.1271.35
google chrome 23.0.1271.36
google chrome 23.0.1271.37
google chrome 23.0.1271.38
google chrome 23.0.1271.39
google chrome 23.0.1271.40
google chrome 23.0.1271.41
google chrome 23.0.1271.44
google chrome 23.0.1271.45
google chrome 23.0.1271.46
google chrome 23.0.1271.49
google chrome 23.0.1271.50
google chrome 23.0.1271.51
google chrome 23.0.1271.52
google chrome 23.0.1271.53
google chrome 23.0.1271.54
google chrome 23.0.1271.55
google chrome 23.0.1271.56
google chrome 23.0.1271.57
google chrome 23.0.1271.58
google chrome 23.0.1271.59
google chrome 23.0.1271.60
google chrome 23.0.1271.61
google v8 *
google v8 1.0
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032",
              "versionEndIncluding": "23.0.1271.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E",
              "versionEndIncluding": "3.13.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, no lleva a cabo adecuadamente todas las operaciones de escritura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-5128",
  "lastModified": "2024-11-21T01:44:06.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-11-07T11:43:16.053",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://osvdb.org/87081"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/87081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-15 21:55
Modified
2024-11-21 01:48
Severity ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
google chrome *
google chrome 24.0.1272.0
google chrome 24.0.1272.1
google chrome 24.0.1273.0
google chrome 24.0.1274.0
google chrome 24.0.1275.0
google chrome 24.0.1276.0
google chrome 24.0.1276.1
google chrome 24.0.1277.0
google chrome 24.0.1278.0
google chrome 24.0.1279.0
google chrome 24.0.1280.0
google chrome 24.0.1281.0
google chrome 24.0.1281.1
google chrome 24.0.1281.2
google chrome 24.0.1281.3
google chrome 24.0.1282.0
google chrome 24.0.1283.0
google chrome 24.0.1284.0
google chrome 24.0.1284.1
google chrome 24.0.1284.2
google chrome 24.0.1285.0
google chrome 24.0.1285.1
google chrome 24.0.1285.2
google chrome 24.0.1286.0
google chrome 24.0.1286.1
google chrome 24.0.1287.0
google chrome 24.0.1287.1
google chrome 24.0.1288.0
google chrome 24.0.1288.1
google chrome 24.0.1289.0
google chrome 24.0.1289.1
google chrome 24.0.1290.0
google chrome 24.0.1290.1
google chrome 24.0.1290.2
google chrome 24.0.1291.0
google chrome 24.0.1291.1
google chrome 24.0.1292.0
google chrome 24.0.1292.1
google chrome 24.0.1293.0
google chrome 24.0.1294.0
google chrome 24.0.1295.0
google chrome 24.0.1296.0
google chrome 24.0.1296.1
google chrome 24.0.1297.0
google chrome 24.0.1298.0
google chrome 24.0.1298.1
google chrome 24.0.1299.0
google chrome 24.0.1300.0
google chrome 24.0.1301.0
google chrome 24.0.1301.1
google chrome 24.0.1301.2
google chrome 24.0.1302.0
google chrome 24.0.1303.0
google chrome 24.0.1304.0
google chrome 24.0.1304.1
google chrome 24.0.1305.0
google chrome 24.0.1305.1
google chrome 24.0.1305.2
google chrome 24.0.1305.3
google chrome 24.0.1305.4
google chrome 24.0.1306.0
google chrome 24.0.1306.1
google chrome 24.0.1307.0
google chrome 24.0.1307.1
google chrome 24.0.1308.0
google chrome 24.0.1309.0
google chrome 24.0.1310.0
google chrome 24.0.1311.0
google chrome 24.0.1311.1
google chrome 24.0.1312.0
google chrome 24.0.1312.1
google chrome 24.0.1312.2
google chrome 24.0.1312.3
google chrome 24.0.1312.4
google chrome 24.0.1312.5
google chrome 24.0.1312.6
google chrome 24.0.1312.7
google chrome 24.0.1312.8
google chrome 24.0.1312.9
google chrome 24.0.1312.10
google chrome 24.0.1312.11
google chrome 24.0.1312.12
google chrome 24.0.1312.13
google chrome 24.0.1312.14
google chrome 24.0.1312.15
google chrome 24.0.1312.16
google chrome 24.0.1312.17
google chrome 24.0.1312.18
google chrome 24.0.1312.19
google chrome 24.0.1312.20
google chrome 24.0.1312.21
google chrome 24.0.1312.22
google chrome 24.0.1312.23
google chrome 24.0.1312.24
google chrome 24.0.1312.25
google chrome 24.0.1312.26
google chrome 24.0.1312.27
google chrome 24.0.1312.28
google chrome 24.0.1312.29
google chrome 24.0.1312.30
google chrome 24.0.1312.31
google chrome 24.0.1312.32
google chrome 24.0.1312.33
google chrome 24.0.1312.34
google chrome 24.0.1312.35
google chrome 24.0.1312.36
google chrome 24.0.1312.37
google chrome 24.0.1312.38
google chrome 24.0.1312.39
google chrome 24.0.1312.40
google chrome 24.0.1312.41
google chrome 24.0.1312.42
google chrome 24.0.1312.43
google chrome 24.0.1312.44
google chrome 24.0.1312.45
google chrome 24.0.1312.46
google chrome 24.0.1312.47
google chrome 24.0.1312.48
google chrome 24.0.1312.49
google chrome 24.0.1312.50
google v8 *
google v8 1.0
google v8 2.4.0
google v8 2.4.1
google v8 2.4.2
google v8 2.4.3
google v8 2.4.4
google v8 2.4.5
google v8 2.4.6
google v8 2.4.7
google v8 2.4.8
google v8 2.4.9
google v8 2.5.0
google v8 2.5.1
google v8 2.5.2
google v8 2.5.3
google v8 2.5.4
google v8 2.5.5
google v8 2.5.6
google v8 2.5.7
google v8 2.5.8
google v8 2.5.9
google v8 3.0.0
google v8 3.0.1
google v8 3.0.2
google v8 3.0.3
google v8 3.0.4
google v8 3.0.5
google v8 3.0.6
google v8 3.0.7
google v8 3.0.8
google v8 3.0.9
google v8 3.0.10
google v8 3.0.11
google v8 3.0.12
google v8 3.1.0
google v8 3.1.1
google v8 3.1.2
google v8 3.1.3
google v8 3.1.4
google v8 3.1.5
google v8 3.1.6
google v8 3.1.7
google v8 3.1.8
google v8 3.10.0
google v8 3.10.1
google v8 3.10.2
google v8 3.10.3
google v8 3.10.4
google v8 3.10.5
google v8 3.10.6
google v8 3.10.7
google v8 3.10.8
google v8 3.11.0
google v8 3.11.1
google v8 3.11.2
google v8 3.11.3
google v8 3.11.4
google v8 3.11.5
google v8 3.11.6
google v8 3.11.7
google v8 3.11.8
google v8 3.11.9
google v8 3.11.10
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
google v8 3.13.7
google v8 3.13.7.5
google v8 3.14.0
google v8 3.14.1
google v8 3.14.2
google v8 3.14.3
google v8 3.14.4
opensuse opensuse 12.1
opensuse opensuse 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BACC18D7-0CBD-403E-ADF6-346FF310201C",
              "versionEndIncluding": "24.0.1312.51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5B6148-A65D-4B54-97D2-80C955DFB7BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0733FF37-E04B-47BC-B494-589907245D84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5933EFF8-0F3E-4BFB-863D-8E91E7ABAB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71206885-9BAD-4AAD-853D-08734B925D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE5F777-C936-478F-A270-46174F4D59D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "519386D0-AEBF-40B1-87C6-475FBCF0E9A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EF13A2-4F0D-45AE-B0B1-90A07A00DE07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E9A849-9E6D-4C69-B58B-82F4A7291518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "555CFBE3-5706-4638-83DE-9FDB42775796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4000589-5978-4145-8BEA-541A25E11A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6193DA2-0A92-46F4-AB30-AB8324F086CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF624555-3DAD-4785-9CA7-11123ECCC4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E998F6-6DCD-480E-BEE6-C6E2D610991E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA439D7-9BDC-4CEB-B216-56DE42E43FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF9E13AA-587C-4D97-B96D-94E4F3B8B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D10760-2B34-4571-A797-A9A37D3DC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F58480-76E1-4AE9-88C9-B36AF1B7BCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F45B9B0-4849-4B98-A3D2-21264A581E62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B715500-15C6-4976-83B3-4556AEDE48F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4ECD4FD-37A0-4EDB-9D0C-5EC08CC5735E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "391AE318-EFCF-4126-93E4-D3C3FABDF550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4DB5E-E7C5-4451-88F6-865BFA55F222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4F0CE9-6147-4BA0-9D95-630CB31D1D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "968B45A4-88EF-4AEF-AAFC-AF098568765E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70F824E6-FD16-45A4-9A7B-D411B4EB028A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0964F31E-6337-43CC-B770-A824B2622AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE987D92-9DD5-4487-8AD2-C90123F9FBD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5E7FAB-764B-4320-AB85-BCEB86584B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5AB013-3BCE-469C-A5A3-F912894ACFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0C8072-3CE9-4AF8-8F11-592BABEE5A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFD890B-C22E-417E-B809-9DF9BCF94914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF9E4CE-9F35-4C51-9BD4-59C07605CEFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BCB3DF-A626-43E3-B7E1-561B0BC74144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FFD00C3-EEAC-4E5F-A819-D5FFEFD94782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "842D5CCF-1F5E-49F4-8E56-2D01C85E0293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB9B44-FF61-4C42-BC5D-724841E92231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "838E694E-4BDD-4282-B56F-621438D395C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E41E28F-4D3B-4687-948B-64599B01077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A0CF99-430D-459D-AE27-0DF95BC17699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B0AD98-B4B7-41DA-B718-99CA9051165A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A4CF329-7CC6-4926-98FB-C0A0FEED683B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89E7CB5-D647-49E8-81F2-4B86C9571861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "249EDC4D-481D-467E-8518-107C08A4EBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9141CAF4-096E-448C-A056-62D8C7EC608F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33DA6C9-2389-4AC1-9ADE-1EED5F476E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D03843DD-1147-46FF-85E5-7E040D4815F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E4D98A-1FDE-4852-BCFE-31E9E4A3C09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4786F4BC-CD98-487F-A31D-8B55592D7C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3801F9E4-329F-4700-AB0B-9208923C375D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9CD1B9D-E446-47DC-889B-29DDB2D4F28D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B0BB4F-80B4-4DC0-B763-3C5E92066CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6920B80-BC9E-4217-AA37-4136EB86F32F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "626F8FB4-7165-42C1-90AC-64ECAE0F0A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0A8316-668D-4DF7-BB56-E6D76239C833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA612AE3-D28F-49CE-8573-636BC54D3969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E67CAC-FED4-433D-B350-DC77D83F4E62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB334A25-0DCE-49ED-AADF-CA44645E99DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF27EE64-4654-4AB7-8ABB-B57AE6B9FFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D368FE5A-139E-4930-8361-A0EFFCD1E74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBB2D4E-B856-42B2-85A1-5A0DB491A605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D27E4F9-A42D-4364-8864-506F772A7431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46BEE7CE-FAA8-4C2B-BCD7-09C336F7FC19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9A123B9-C4DB-406F-B934-2A896C7AAB43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE8F018-3CBA-43AA-991E-0E8A42965846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1051D8-1827-4255-9317-840DC7570978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6544BEB1-AD9C-46E7-8E41-9D8D7C1E13A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "241D1EB2-4003-446F-9988-F6AC3FD64705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "634F8D3D-930E-46D1-80E9-6015EA9FECD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4A9FFA-1576-4175-9BD6-CF975EC72847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C2901C-19CA-402A-A937-31D6B5B049CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5255EB-9182-4A76-9E5B-39EFE8D86024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0230123-D8AD-41B3-918E-FB14A3D60E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD797B6-634C-4969-9014-E9540077ED17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2179C71A-9E71-4CF5-B71E-D51C9E14FE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D589505-B631-46A3-8E10-F9FE60BEEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEF94139-56C8-491D-B7D8-FC560631B654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "241AC9EF-E3D8-4B87-93CD-31F5E3AAFE1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82ED399B-C35D-4424-9B9D-215181027616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7738DF62-67D8-480A-AEAE-22A8EA2D4012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "714B6660-0D0A-4651-88D7-2D562C330054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00BDDF2-E8E6-46A2-AF3F-04A7805A9BD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C39AF29-9BB8-42F0-A5CE-00A19CD82317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4436A9ED-A5C9-4F52-90AC-294A9DB7C58A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BAD98B-D29B-446E-BEBE-5D1B91CB318E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37FF867-B515-4207-9FD2-E209B66E4D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "635B73E6-6430-4345-BD9D-427441CAA540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B35C80-44D7-4D29-9CB7-F60CC0E08359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD4FC844-D8D5-49AA-A037-0DEEA1C2D0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDB01647-2D5F-4EC8-AD8D-053C713C3301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "470CC69D-BDD6-43C8-BC4D-EB57C59F372E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DA7A2-7B03-4151-990D-9E3352EFDADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDCC9AC-4EFE-4647-A2B3-0545FE861747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435677-3D60-408F-965B-C3B6F46C465C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CFAD31-FC08-4B1A-81F7-356B4B9D1ED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "A145852B-3183-4F76-A814-C667AB5B4EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A6DD0-A396-4DCB-A52C-E8F3F437AD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2B7A7F-868F-4BBE-B660-9D07E3C0A520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F925CFC2-9537-47CB-99B1-7EB9F2AE6714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A00047-81A5-43AA-B088-F39B98582543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57EEC91-3D36-4EDF-A77A-1ED1EE980A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A20B3E7E-BEA0-4ED1-A869-A31763DADE40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "505E2084-13BC-4C30-BD66-AC0474893767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2391E91-C96C-427B-95DF-448E5508FCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1CB147-0260-41AF-AB00-C7A13310BF54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "2631DFBE-E561-4040-B694-ACDD4CBA9EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4C0DF0-B6C0-42D2-86B4-085EB67F48DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05827D-6FDB-458E-9731-F6EE2AA1F5DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "44161E2D-6F55-48D6-AB39-8CA7CBE1244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "71BCFF0B-C3ED-48DC-A5B1-264DFD5CFA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3CADED-24BC-4C64-9D56-218B663D4B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD93B2D8-9576-499F-A605-FA9482F9A374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "D03E0A1E-1AAC-43BF-940C-229D5E1E5602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2E0C70-49DD-4AA5-8F3C-028D1B4C2EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "1112199E-1E45-4A44-B0D2-AB98D8BB8F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB6D0D9-A0DE-414E-95BF-F6695176D2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "9083D717-088D-46C8-A950-AD7760219234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "222F30BC-8C6C-42B8-BAFF-FFF0365A018A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AA0CBA-CFE3-412A-8F1C-AC65108E3A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2919EA8B-CD6C-4F8B-91BC-0E9BB8EB2493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9328EDE-6345-4F65-AC56-4A0035083E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "238293ED-469D-457C-A048-60B9B880B9DF",
              "versionEndIncluding": "3.14.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "315A6CEA-0BAB-4F6D-9398-90D05FDA8D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7447D1C7-E33C-4E4F-B101-641FCEF01C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "407FA5B6-5156-472C-BF9F-7BD9EB4B0AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8DC11-511B-4222-A4E2-5DE1CEA665EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C658C0B1-3917-4E87-84C4-97D02EC35C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E0854A-F022-4CD8-8E5E-309A323687AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B74EEFE5-A523-41BF-A5D0-586466C0A706",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.14.5.3, tal como se utiliza en Google Chrome antes v24.0.1312.52, no implementa correctamente la recolecci\u00f3n de basura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado."
    }
  ],
  "id": "CVE-2013-0836",
  "lastModified": "2024-11-21T01:48:17.213",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-01-15T21:55:02.260",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3590
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/90876
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1035981
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-2992-1
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2016:1190
chrome-cve-admin@google.comhttps://codereview.chromium.org/1936083002
chrome-cve-admin@google.comhttps://crbug.com/602970
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1936083002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/602970
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC5CA67-5637-4AD0-923D-678947667D6E",
              "versionEndIncluding": "5.1.281",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
    },
    {
      "lang": "es",
      "value": "uri.js en Google V8 en versiones anteriores a 5.1.281.26, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, usa un tipo de matriz incorrecto, lo que permite a atacantes remotos obtener informaci\u00f3n sensible llamando a la funci\u00f3n decodeURI y aprovechando \"confusi\u00f3n de tipo\"."
    }
  ],
  "id": "CVE-2016-1677",
  "lastModified": "2024-11-21T02:46:52.117",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:05.927",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1936083002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/602970"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1936083002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/602970"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-30 01:55
Modified
2024-11-21 01:33
Severity ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Impacted products
Vendor Product Version
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
    },
    {
      "lang": "es",
      "value": "Google V8 calcula los valores hash de los par\u00e1metros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante el env\u00edo de gran cantidad de par\u00e1metros a mano, como lo demuestran los ataques contra Node.js."
    }
  ],
  "id": "CVE-2011-5037",
  "lastModified": "2024-11-21T01:33:28.643",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-30T01:55:01.733",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/903934"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/903934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
References
cve@mitre.orghttp://code.google.com/p/v8/source/detail?r=17801Patch
cve@mitre.orghttp://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
cve@mitre.orghttp://secunia.com/advisories/56216
cve@mitre.orghttp://secunia.com/advisories/56217
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2811
cve@mitre.orghttp://www.securitytracker.com/id/1029442
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=319860
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17801Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319860
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) por medio de c\u00f3digo JavaScript que establece una variable en el valor de un elemento de matriz con un \u00edndice dise\u00f1ado."
    }
  ],
  "id": "CVE-2013-6640",
  "lastModified": "2024-11-21T01:59:25.827",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:04.037",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-05 05:11
Modified
2024-11-21 01:59
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
cve@mitre.orghttp://advisories.mageia.org/MGASA-2014-0516.htmlThird Party Advisory
cve@mitre.orghttp://googlechromereleases.blogspot.com/2014/03/stable-channel-update.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/61184Third Party Advisory
cve@mitre.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21683389Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2014/dsa-2883Third Party Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2015:142Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/65930Third Party Advisory, VDB Entry
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=343964Issue Tracking, Vendor Advisory
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=344186Issue Tracking, Vendor Advisory
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=347909Issue Tracking, Vendor Advisory
cve@mitre.orghttps://code.google.com/p/v8/source/detail?r=19475Vendor Advisory
cve@mitre.orghttps://code.google.com/p/v8/source/detail?r=19553Vendor Advisory
cve@mitre.orghttps://code.google.com/p/v8/source/detail?r=19599Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0516.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61184Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21683389Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2883Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:142Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/65930Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=343964Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=344186Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=347909Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19475Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19553Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19599Vendor Advisory
Impacted products
Vendor Product Version
google chrome *
google chrome 33.0.1750.0
google chrome 33.0.1750.1
google chrome 33.0.1750.2
google chrome 33.0.1750.3
google chrome 33.0.1750.4
google chrome 33.0.1750.5
google chrome 33.0.1750.6
google chrome 33.0.1750.7
google chrome 33.0.1750.8
google chrome 33.0.1750.9
google chrome 33.0.1750.10
google chrome 33.0.1750.11
google chrome 33.0.1750.12
google chrome 33.0.1750.13
google chrome 33.0.1750.14
google chrome 33.0.1750.15
google chrome 33.0.1750.16
google chrome 33.0.1750.18
google chrome 33.0.1750.19
google chrome 33.0.1750.20
google chrome 33.0.1750.21
google chrome 33.0.1750.22
google chrome 33.0.1750.23
google chrome 33.0.1750.24
google chrome 33.0.1750.25
google chrome 33.0.1750.26
google chrome 33.0.1750.27
google chrome 33.0.1750.28
google chrome 33.0.1750.29
google chrome 33.0.1750.30
google chrome 33.0.1750.31
google chrome 33.0.1750.34
google chrome 33.0.1750.35
google chrome 33.0.1750.36
google chrome 33.0.1750.37
google chrome 33.0.1750.38
google chrome 33.0.1750.39
google chrome 33.0.1750.40
google chrome 33.0.1750.41
google chrome 33.0.1750.42
google chrome 33.0.1750.43
google chrome 33.0.1750.44
google chrome 33.0.1750.45
google chrome 33.0.1750.46
google chrome 33.0.1750.47
google chrome 33.0.1750.48
google chrome 33.0.1750.49
google chrome 33.0.1750.50
google chrome 33.0.1750.51
google chrome 33.0.1750.52
google chrome 33.0.1750.53
google chrome 33.0.1750.54
google chrome 33.0.1750.55
google chrome 33.0.1750.56
google chrome 33.0.1750.57
google chrome 33.0.1750.58
google chrome 33.0.1750.59
google chrome 33.0.1750.60
google chrome 33.0.1750.61
google chrome 33.0.1750.62
google chrome 33.0.1750.63
google chrome 33.0.1750.64
google chrome 33.0.1750.65
google chrome 33.0.1750.66
google chrome 33.0.1750.67
google chrome 33.0.1750.68
google chrome 33.0.1750.69
google chrome 33.0.1750.70
google chrome 33.0.1750.71
google chrome 33.0.1750.73
google chrome 33.0.1750.74
google chrome 33.0.1750.75
google chrome 33.0.1750.76
google chrome 33.0.1750.77
google chrome 33.0.1750.79
google chrome 33.0.1750.80
google chrome 33.0.1750.81
google chrome 33.0.1750.82
google chrome 33.0.1750.83
google chrome 33.0.1750.85
google chrome 33.0.1750.88
google chrome 33.0.1750.89
google chrome 33.0.1750.90
google chrome 33.0.1750.91
google chrome 33.0.1750.92
google chrome 33.0.1750.93
google chrome 33.0.1750.104
google chrome 33.0.1750.106
google chrome 33.0.1750.107
google chrome 33.0.1750.108
google chrome 33.0.1750.109
google chrome 33.0.1750.110
google chrome 33.0.1750.111
google chrome 33.0.1750.112
google chrome 33.0.1750.113
google chrome 33.0.1750.115
google chrome 33.0.1750.116
google chrome 33.0.1750.117
google chrome 33.0.1750.124
google chrome 33.0.1750.125
google chrome 33.0.1750.126
google chrome 33.0.1750.132
google chrome 33.0.1750.133
google chrome 33.0.1750.135
google chrome 33.0.1750.136
google v8 *
google v8 3.24.0
google v8 3.24.1
google v8 3.24.2
google v8 3.24.3
google v8 3.24.4
google v8 3.24.5
google v8 3.24.6
google v8 3.24.7
google v8 3.24.8
google v8 3.24.9
google v8 3.24.10
google v8 3.24.11
google v8 3.24.12
google v8 3.24.13
google v8 3.24.14
google v8 3.24.15
google v8 3.24.16
google v8 3.24.17
google v8 3.24.18
google v8 3.24.19
google v8 3.24.20
google v8 3.24.21
google v8 3.24.22
google v8 3.24.23
google v8 3.24.24
google v8 3.24.25
google v8 3.24.26
google v8 3.24.27
google v8 3.24.28
google v8 3.24.29
google v8 3.24.30
google v8 3.24.31
google v8 3.24.32
google v8 3.24.33
google v8 3.24.34
nodejs node.js *
debian debian_linux 7.0
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44CEB321-9295-4743-A24E-A7521F07E717",
              "versionEndIncluding": "33.0.1750.144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
              "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5958A347-83C2-459F-800A-F4F99BD51C29",
              "versionEndIncluding": "3.24.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC3C85C-B7EB-4778-8427-57B6E74548F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FF4C1B-570F-4E10-B247-9E696F5C9A6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "890214C7-65FD-4741-9FA9-DFEEBE815ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD29B493-156E-40EB-A139-22273FC03494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D311A38E-9682-41AD-B8DA-B0FEA3FD6B56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F730F35-E59A-40DC-B384-5CD8131E5394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E6B143-17FE-4709-B37F-3F3F8C90F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "747B3F44-61DD-4E59-AB04-644D0DBA22B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "27386950-9F64-483A-98D9-73C2B2E36E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D30427-F440-4913-AA5C-D25E5546BF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA11A8-2CA0-47F1-8B3A-17E4DD2C5872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B32618-C516-49A4-A207-6AA265DA9E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF5F9B6-87F6-4EE7-99A2-5109FABCDD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "98032A71-91CD-4B04-8A85-46143A446013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAEC7292-992F-4B86-B51F-7FAC51F60A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68568D0-2B36-4F03-85ED-518B08D91F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "312B6E8A-7204-480D-A62F-3A0F5A3EE624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "31610339-EC04-4721-AC82-C004C34B0C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9A420C-4F51-4695-9D0B-F755A35D3A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B360F5E7-D59D-459B-A9E8-84F51793D3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5B5A86-F82A-4B3D-B944-4E64CDB9E877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "225B4456-9CF6-4519-9C15-1ABE2D52C6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E417E-DA11-4333-BDB0-C1C6EE9F2851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD92CD47-D942-44C0-8E71-D307AA05C207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CEBADE4-DD37-447B-8450-10BC57F85875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "610627E6-C828-482B-809D-CE86788A5EE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AFEF41-7AC1-46D0-9AB1-E1C7DFCAD492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DD2CDC-8B85-4DC7-A85D-CC85B65B264E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8963550-CA67-404A-853B-86A0D6C34FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "803F421D-D17E-4E49-BD6E-00D40EDE3B81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "76FAAD85-F326-4AC3-8F2D-DB64F610B502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "898DF7D1-AD9C-414A-A810-F0C2C2CF3F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F4A53AD-04F1-4D8E-9B93-270F0A9A9E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "702FE7B3-A2EF-4409-8130-5EDC6A6BD3A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF36D004-5ED4-47CC-83F4-6FD708EC3B8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EB0A95-92AB-432D-A7AE-7670A5117B95",
              "versionEndExcluding": "0.10.31",
              "versionStartIncluding": "0.10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.24.35.10, utilizado en Google Chrome anterior a 33.0.1750.146, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2013-6668",
  "lastModified": "2024-11-21T01:59:31.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-05T05:11:22.377",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61184"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65930"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19475"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19553"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19599"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-03-09 00:59
Modified
2024-11-21 02:27
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4473BA-37DE-4AF1-A828-99AA9D83AAE7",
              "versionEndIncluding": "40.0.2214.115",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF6B47E-9C19-4B03-A8EC-7C338440EF52",
              "versionEndIncluding": "4.1.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.1.0.21, utilizado en Google Chrome anterior a 41.0.2272.76, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-2238",
  "lastModified": "2024-11-21T02:27:03.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-09T00:59:28.810",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2521-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2521-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:04
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
chrome-cve-admin@google.comhttp://security.gentoo.org/glsa/glsa-201408-16.xml
chrome-cve-admin@google.comhttp://www.debian.org/security/2014/dsa-2883
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1029914
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=328202
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=345715
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=349079
chrome-cve-admin@google.comhttps://code.google.com/p/v8/source/detail?r=18564
chrome-cve-admin@google.comhttps://code.google.com/p/v8/source/detail?r=19614
chrome-cve-admin@google.comhttps://code.google.com/p/v8/source/detail?r=19668
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201408-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2883
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029914
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=328202
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=345715
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=349079
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=18564
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19614
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19668
Impacted products
Vendor Product Version
google chrome *
google chrome 33.0.1750.0
google chrome 33.0.1750.1
google chrome 33.0.1750.2
google chrome 33.0.1750.3
google chrome 33.0.1750.4
google chrome 33.0.1750.5
google chrome 33.0.1750.6
google chrome 33.0.1750.7
google chrome 33.0.1750.8
google chrome 33.0.1750.9
google chrome 33.0.1750.10
google chrome 33.0.1750.11
google chrome 33.0.1750.12
google chrome 33.0.1750.13
google chrome 33.0.1750.14
google chrome 33.0.1750.15
google chrome 33.0.1750.16
google chrome 33.0.1750.18
google chrome 33.0.1750.19
google chrome 33.0.1750.20
google chrome 33.0.1750.21
google chrome 33.0.1750.22
google chrome 33.0.1750.23
google chrome 33.0.1750.24
google chrome 33.0.1750.25
google chrome 33.0.1750.26
google chrome 33.0.1750.27
google chrome 33.0.1750.28
google chrome 33.0.1750.29
google chrome 33.0.1750.30
google chrome 33.0.1750.31
google chrome 33.0.1750.34
google chrome 33.0.1750.35
google chrome 33.0.1750.36
google chrome 33.0.1750.37
google chrome 33.0.1750.38
google chrome 33.0.1750.39
google chrome 33.0.1750.40
google chrome 33.0.1750.41
google chrome 33.0.1750.42
google chrome 33.0.1750.43
google chrome 33.0.1750.44
google chrome 33.0.1750.45
google chrome 33.0.1750.46
google chrome 33.0.1750.47
google chrome 33.0.1750.48
google chrome 33.0.1750.49
google chrome 33.0.1750.50
google chrome 33.0.1750.51
google chrome 33.0.1750.52
google chrome 33.0.1750.53
google chrome 33.0.1750.54
google chrome 33.0.1750.55
google chrome 33.0.1750.56
google chrome 33.0.1750.57
google chrome 33.0.1750.58
google chrome 33.0.1750.59
google chrome 33.0.1750.60
google chrome 33.0.1750.61
google chrome 33.0.1750.62
google chrome 33.0.1750.63
google chrome 33.0.1750.64
google chrome 33.0.1750.65
google chrome 33.0.1750.66
google chrome 33.0.1750.67
google chrome 33.0.1750.68
google chrome 33.0.1750.69
google chrome 33.0.1750.70
google chrome 33.0.1750.71
google chrome 33.0.1750.73
google chrome 33.0.1750.74
google chrome 33.0.1750.75
google chrome 33.0.1750.76
google chrome 33.0.1750.77
google chrome 33.0.1750.79
google chrome 33.0.1750.80
google chrome 33.0.1750.81
google chrome 33.0.1750.82
google chrome 33.0.1750.83
google chrome 33.0.1750.85
google chrome 33.0.1750.88
google chrome 33.0.1750.89
google chrome 33.0.1750.90
google chrome 33.0.1750.91
google chrome 33.0.1750.92
google chrome 33.0.1750.93
google chrome 33.0.1750.104
google chrome 33.0.1750.106
google chrome 33.0.1750.107
google chrome 33.0.1750.108
google chrome 33.0.1750.109
google chrome 33.0.1750.110
google chrome 33.0.1750.111
google chrome 33.0.1750.112
google chrome 33.0.1750.113
google chrome 33.0.1750.115
google chrome 33.0.1750.116
google chrome 33.0.1750.117
google chrome 33.0.1750.124
google chrome 33.0.1750.125
google chrome 33.0.1750.126
google chrome 33.0.1750.132
google chrome 33.0.1750.133
google chrome 33.0.1750.135
google chrome 33.0.1750.136
google chrome 33.0.1750.144
google v8 *
google v8 3.23.0
google v8 3.23.1
google v8 3.23.2
google v8 3.23.3
google v8 3.23.4
google v8 3.23.5
google v8 3.23.6
google v8 3.23.7
google v8 3.23.8
google v8 3.23.9
google v8 3.23.10
google v8 3.23.11
google v8 3.23.12
google v8 3.23.13
google v8 3.23.14
google v8 3.23.15
google v8 3.23.16



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4DDCA3-FC7A-458B-8C0A-8699ACF9CE82",
              "versionEndIncluding": "33.0.1750.146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
              "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "55273418-C87C-4030-8068-BC6B649DEEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CE1AC76-4886-49A6-9FA0-A2B886760A81",
              "versionEndIncluding": "3.23.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92C80E8-FD13-4ECE-94E1-71011B3A8295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA61F17-6FA5-4191-99CA-B88ABBA83CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "222B289E-C7FB-433A-A9C9-B6B9B0650013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53499FFD-624D-417B-B585-B335D458404D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "308736C3-2D4C-418A-9F5E-C1986C526647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "68BFEA9C-BE4C-4F5C-9E75-7C5D27B35F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2F93F9-4651-4BC9-BCDD-95F4B617D59C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3526D70A-943D-4B0D-9F9E-5C06685E0C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB7E28F-C88F-4F2D-97BF-9278C00B1E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA5D6B2-8E57-4210-B1CB-EB16CA3F2224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BE4589-3B1B-4364-A838-A613DF3ECD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A29907D-B6D4-4919-8311-53B6F60CB403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC923E76-640B-4EDF-AC68-D370E8BE308A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4058640B-7756-47F2-852A-F2687C968C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB56717-A7CF-45C9-B8D8-75D2C4E5D4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B70BC69-7CBE-4910-9F12-E01BA9902898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "97DCE3DB-A3BB-4622-A2EC-C1551624B380",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.23.17.18, utilizado en Google Chrome anterior a 33.0.1750.149, permiten a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2014-1704",
  "lastModified": "2024-11-21T02:04:51.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-16T14:06:45.427",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1029914"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/v8/source/detail?r=18564"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/v8/source/detail?r=19614"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/v8/source/detail?r=19668"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=18564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=19614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=19668"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
References
cve@mitre.orghttp://code.google.com/p/v8/source/detail?r=17801Patch
cve@mitre.orghttp://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
cve@mitre.orghttp://secunia.com/advisories/56216
cve@mitre.orghttp://secunia.com/advisories/56217
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2811
cve@mitre.orghttp://www.securitytracker.com/id/1029442
cve@mitre.orghttps://code.google.com/p/chromium/issues/detail?id=319835
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17801Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319835
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) o posiblemente tienen otro impacto no especificado por medio de c\u00f3digo JavaScript que establece el valor de un elemento de matriz con un \u00edndice dise\u00f1ado."
    }
  ],
  "id": "CVE-2013-6639",
  "lastModified": "2024-11-21T01:59:25.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:04.007",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-05-22 13:29
Modified
2024-11-21 01:52
Severity ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Impacted products
Vendor Product Version
google chrome *
google chrome 27.0.1453.0
google chrome 27.0.1453.1
google chrome 27.0.1453.2
google chrome 27.0.1453.3
google chrome 27.0.1453.4
google chrome 27.0.1453.5
google chrome 27.0.1453.6
google chrome 27.0.1453.7
google chrome 27.0.1453.8
google chrome 27.0.1453.9
google chrome 27.0.1453.10
google chrome 27.0.1453.11
google chrome 27.0.1453.12
google chrome 27.0.1453.13
google chrome 27.0.1453.15
google chrome 27.0.1453.34
google chrome 27.0.1453.35
google chrome 27.0.1453.36
google chrome 27.0.1453.37
google chrome 27.0.1453.38
google chrome 27.0.1453.39
google chrome 27.0.1453.40
google chrome 27.0.1453.41
google chrome 27.0.1453.42
google chrome 27.0.1453.43
google chrome 27.0.1453.44
google chrome 27.0.1453.45
google chrome 27.0.1453.46
google chrome 27.0.1453.47
google chrome 27.0.1453.49
google chrome 27.0.1453.50
google chrome 27.0.1453.51
google chrome 27.0.1453.52
google chrome 27.0.1453.54
google chrome 27.0.1453.55
google chrome 27.0.1453.56
google chrome 27.0.1453.57
google chrome 27.0.1453.58
google chrome 27.0.1453.59
google chrome 27.0.1453.60
google chrome 27.0.1453.61
google chrome 27.0.1453.62
google chrome 27.0.1453.63
google chrome 27.0.1453.64
google chrome 27.0.1453.65
google chrome 27.0.1453.66
google chrome 27.0.1453.67
google chrome 27.0.1453.68
google chrome 27.0.1453.69
google chrome 27.0.1453.70
google chrome 27.0.1453.71
google chrome 27.0.1453.72
google chrome 27.0.1453.73
google chrome 27.0.1453.74
google chrome 27.0.1453.75
google chrome 27.0.1453.76
google chrome 27.0.1453.77
google chrome 27.0.1453.78
google chrome 27.0.1453.79
google chrome 27.0.1453.80
google chrome 27.0.1453.81
google chrome 27.0.1453.82
google chrome 27.0.1453.83
google chrome 27.0.1453.84
google chrome 27.0.1453.85
google chrome 27.0.1453.86
google chrome 27.0.1453.87
google chrome 27.0.1453.88
google chrome 27.0.1453.89
google chrome 27.0.1453.90
google v8 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAB43EE-4A88-4B1F-8167-6917FD095F81",
              "versionEndIncluding": "27.0.1453.91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB7C7-519D-4084-9F48-9D992A829246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D7F7CA-6DE0-4F03-A7AC-C99C91A57913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A874B4-CA16-4FEC-B67C-6707D58DF338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BFC6C5-455A-4F64-9BE8-8C65E7196650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F569848F-1558-447F-8852-F240FEEFAC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD52267-6CC1-403E-AEF8-D2B257E8013D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4DB744-7805-4CEC-8720-207031051F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5B5169-6135-4B1B-99E4-31813005B601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33356AF-7F3F-4CC9-AC6A-09669FF1E842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A98AF9-A23C-4B67-A93C-7E6F39917DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F26B1CB-9B8F-4FD3-9BAC-32141EBBD766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8005EA70-8B99-4653-9F58-D7EA3A538A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7E711E-1240-4875-B824-FBA5FAB4BBAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9DFC6EF-C4F6-4861-8712-27C335DE9E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "11667B12-9FAE-4043-B23D-983F178BFC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "57180BB1-D41C-42BE-B35E-532D451CC0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BEDF20-33CB-42AF-9335-9BF41B53DB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "80356017-C7C6-4F72-9A92-2F13C9ADE762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "513A84A5-8EA5-4095-84C1-5B55E07CE332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "268DE157-0335-404D-9568-F54D5AB1F4DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC8931C-122D-4E0C-8855-456070822EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138D90F-0954-4627-A6CF-4671AC474FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5FE20F-29B9-4E48-88A8-E00AD790E93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E19C352-0C20-4AC1-BF53-1B0A416F0FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6271E601-9E4D-4765-B71D-7FA2B9FE0013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9702130A-CB3F-433E-892B-7B4338A048B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "129CCA51-B755-4A61-8B63-EC69AA2970F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "D572B358-361A-49E2-B9E9-CC97F6424418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "841CA94D-859E-425A-A735-62A35B20E23F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F1B5E4-BA8B-440B-B8D2-2E2093F4B32E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE6989D-BE91-4C92-9734-61A7F234E9F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4481D4-4143-4BC0-983C-974695711F54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A5927A-3182-4BB5-8AC2-72EC2F43027C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "2780C1B8-F4B6-4C11-974C-AB0205896782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "08808A78-646E-4D6D-BD57-5EC533D904FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F526E2-8625-4337-9855-0FB3FB135BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AF361A-32B7-40A6-9863-793ED2C29C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E9901E-F811-4736-B7C7-847584B162C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9762D5-D548-4910-B8F1-3A0E3664C6CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "540B23F2-8434-4E40-9CBE-E8A60D7DB05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1FD2F21-FB01-4D78-8C05-0BBD2D257C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8E2340-ED37-4942-B0D6-72E25AF8886C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "892CABA3-5B2C-4168-9F1D-03D58D212A0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95B8C085-3EDE-4363-973C-EC649E6F07EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "6775A3FB-7B3C-4713-B1F7-82D49C8867E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A6E53E-EEE8-4D16-BEE0-1549E3C4FBE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C48274-9025-4909-AA5F-2A6C90902646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C9EBB3-3329-43C6-998F-BAB480181BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A9D90E-1827-4F82-B2C6-214E0733B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCD6FE8-504F-4B2B-B401-91F31862063E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD33D555-75B1-43BC-B32E-B5D794419882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F8257E-D36C-4799-BD3D-CA8AE2E7701E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AB2B3D-EFE4-48BA-8D70-DAC500321472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E40617D-2EB9-4773-A81B-5BA4F1BA6786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44A775E-C82A-4B5C-BA3B-20022408CF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E21A34-4AFB-4A44-BC09-68B6672DFD93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0450801-F2EB-48B5-9DE4-6A0BCF7E3F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50BF3E0-4AFB-43CD-A7BF-13827000D0A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5BD9A8-A717-4398-847F-4C7D71AD5588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24422D7-523C-4A21-9649-06BB0A1908B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "040EF42D-185F-446C-944B-712AE2A62036",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C139C6E-3FA7-4295-9DE3-938EDEB09D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "A518C048-1CB5-4BB9-B2D7-85A4399E8AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "92874CC7-49E9-4A7F-9021-1C7ECE35B2AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "345DA945-0490-4A5E-8E20-7FC5886AB170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA7F6E3-F872-4EF4-B2E5-C1677867F166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383A496-84BF-427F-88A0-1620A36E9177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "482C95EF-FA97-4709-9FB4-B7AB3437C69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D5B77B-5860-4855-B416-E84E43E267EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E157716D-4FC2-4F3A-B5ED-96C098408D1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Google V8, que se utiliza en Google Chrome anterior a v27.0.1453.93, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fuera de los l\u00edmites de lectura) a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2013-2838",
  "lastModified": "2024-11-21T01:52:28.370",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-22T13:29:55.987",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2013/dsa-2695"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
chrome-cve-admin@google.comhttp://www.debian.org/security/2016/dsa-3590
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/90876
chrome-cve-admin@google.comhttp://www.securitytracker.com/id/1035981
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-2992-1
chrome-cve-admin@google.comhttps://access.redhat.com/errata/RHSA-2016:1190
chrome-cve-admin@google.comhttps://codereview.chromium.org/1875053002
chrome-cve-admin@google.comhttps://crbug.com/595259
chrome-cve-admin@google.comhttps://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1875053002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/595259
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "objects.cc en Google V8 en versiones anteriores a 5.0.71.32, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, no restringe adecuadamente el empeoramiento descuidado, lo que permite a atacantes remotos provocar un denegaci\u00f3n de servicio (desbordamiento de buffer basado en memoria din\u00e1mica) o posiblmente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1678",
  "lastModified": "2024-11-21T02:46:52.237",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:06.880",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://codereview.chromium.org/1875053002"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://crbug.com/595259"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1875053002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/595259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-14 11:59
Modified
2024-11-21 02:38
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB5A295-363E-4C75-8EB0-8672F50AF303",
              "versionEndIncluding": "4.7.80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F830030-A662-45C2-950D-EC2598644202",
              "versionEndIncluding": "47.0.2526.73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.80, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos, un problema diferente a CVE-2015-8478."
    }
  ],
  "id": "CVE-2015-8548",
  "lastModified": "2024-11-21T02:38:42.440",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-12-14T11:59:04.967",
  "references": [
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
    },
    {
      "source": "chrome-cve-admin@google.com",
      "url": "http://www.ubuntu.com/usn/USN-2860-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2860-1"
    }
  ],
  "sourceIdentifier": "chrome-cve-admin@google.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2013-6639
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17801"
          },
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17801"
        },
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6639",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17801",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17801"
            },
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319835",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6639",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1242
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 04:33
Severity ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:33:20.662Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2015:0816",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
          },
          {
            "name": "USN-2570-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-2570-1"
          },
          {
            "name": "DSA-3238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3238"
          },
          {
            "name": "openSUSE-SU-2015:1887",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
          },
          {
            "name": "GLSA-201506-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201506-04"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1019033004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1000893003"
          },
          {
            "name": "1032209",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032209"
          },
          {
            "name": "openSUSE-SU-2015:0748",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "RHSA-2015:0816",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
        },
        {
          "name": "USN-2570-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-2570-1"
        },
        {
          "name": "DSA-3238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3238"
        },
        {
          "name": "openSUSE-SU-2015:1887",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
        },
        {
          "name": "GLSA-201506-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201506-04"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1019033004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1000893003"
        },
        {
          "name": "1032209",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032209"
        },
        {
          "name": "openSUSE-SU-2015:0748",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-1242",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2015:0816",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
            },
            {
              "name": "USN-2570-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-2570-1"
            },
            {
              "name": "DSA-3238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3238"
            },
            {
              "name": "openSUSE-SU-2015:1887",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
            },
            {
              "name": "GLSA-201506-04",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201506-04"
            },
            {
              "name": "https://codereview.chromium.org/1019033004",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1019033004"
            },
            {
              "name": "https://codereview.chromium.org/1000893003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1000893003"
            },
            {
              "name": "1032209",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032209"
            },
            {
              "name": "openSUSE-SU-2015:0748",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=460917",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-1242",
    "datePublished": "2015-04-19T10:00:00",
    "dateReserved": "2015-01-21T00:00:00",
    "dateUpdated": "2024-08-06T04:33:20.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3886
Vulnerability from cvelistv5
Published
2011-10-25 19:00
Modified
2024-08-06 23:53
Severity ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:31.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:13201",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
          },
          {
            "name": "google-chrome-v8-code-exec(70964)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:13201",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
        },
        {
          "name": "google-chrome-v8-code-exec(70964)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2011-3886",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:13201",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=98773",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=99167",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
            },
            {
              "name": "google-chrome-v8-code-exec(70964)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3886",
    "datePublished": "2011-10-25T19:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:31.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-5128
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:53:47.358Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1868",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
          },
          {
            "name": "openSUSE-SU-2016:1869",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
          },
          {
            "name": "92053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2101983002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2082633002"
          },
          {
            "name": "USN-3041-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3041-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2085223002"
          },
          {
            "name": "openSUSE-SU-2016:1918",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2084183004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2103033002"
          },
          {
            "name": "GLSA-201610-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201610-09"
          },
          {
            "name": "openSUSE-SU-2016:1865",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
          },
          {
            "name": "RHSA-2016:1485",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/619166"
          },
          {
            "name": "1036428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036428"
          },
          {
            "name": "DSA-3637",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1868",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
        },
        {
          "name": "openSUSE-SU-2016:1869",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
        },
        {
          "name": "92053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2101983002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2082633002"
        },
        {
          "name": "USN-3041-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3041-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2085223002"
        },
        {
          "name": "openSUSE-SU-2016:1918",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2084183004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2103033002"
        },
        {
          "name": "GLSA-201610-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201610-09"
        },
        {
          "name": "openSUSE-SU-2016:1865",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
        },
        {
          "name": "RHSA-2016:1485",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/619166"
        },
        {
          "name": "1036428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036428"
        },
        {
          "name": "DSA-3637",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-5128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1868",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
            },
            {
              "name": "openSUSE-SU-2016:1869",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
            },
            {
              "name": "92053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92053"
            },
            {
              "name": "https://codereview.chromium.org/2101983002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2101983002"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
            },
            {
              "name": "https://codereview.chromium.org/2082633002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2082633002"
            },
            {
              "name": "USN-3041-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3041-1"
            },
            {
              "name": "https://codereview.chromium.org/2085223002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2085223002"
            },
            {
              "name": "openSUSE-SU-2016:1918",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
            },
            {
              "name": "https://codereview.chromium.org/2084183004",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2084183004"
            },
            {
              "name": "https://codereview.chromium.org/2103033002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2103033002"
            },
            {
              "name": "GLSA-201610-09",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201610-09"
            },
            {
              "name": "openSUSE-SU-2016:1865",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
            },
            {
              "name": "RHSA-2016:1485",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
            },
            {
              "name": "https://crbug.com/619166",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/619166"
            },
            {
              "name": "1036428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036428"
            },
            {
              "name": "DSA-3637",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-5128",
    "datePublished": "2016-07-23T19:00:00",
    "dateReserved": "2016-05-31T00:00:00",
    "dateUpdated": "2024-08-06T00:53:47.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-1346
Vulnerability from cvelistv5
Published
2015-01-22 22:00
Modified
2024-08-06 04:40
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
http://googlechromereleases.blogspot.com/2015/01/stable-update.htmlx_refsource_CONFIRM
http://secunia.com/advisories/62575third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/100361vdb-entry, x_refsource_XF
http://www.ubuntu.com/usn/USN-2476-1vendor-advisory, x_refsource_UBUNTU
http://security.gentoo.org/glsa/glsa-201502-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securitytracker.com/id/1031623vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2015-0093.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/62383third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:40:18.662Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
          },
          {
            "name": "62575",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62575"
          },
          {
            "name": "google-v8-cve20151346-code-exec(100361)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
          },
          {
            "name": "USN-2476-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2476-1"
          },
          {
            "name": "GLSA-201502-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
          },
          {
            "name": "1031623",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031623"
          },
          {
            "name": "RHSA-2015:0093",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
          },
          {
            "name": "62383",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62383"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
        },
        {
          "name": "62575",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62575"
        },
        {
          "name": "google-v8-cve20151346-code-exec(100361)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
        },
        {
          "name": "USN-2476-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2476-1"
        },
        {
          "name": "GLSA-201502-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
        },
        {
          "name": "1031623",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031623"
        },
        {
          "name": "RHSA-2015:0093",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
        },
        {
          "name": "62383",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62383"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-1346",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
            },
            {
              "name": "62575",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62575"
            },
            {
              "name": "google-v8-cve20151346-code-exec(100361)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
            },
            {
              "name": "USN-2476-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2476-1"
            },
            {
              "name": "GLSA-201502-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
            },
            {
              "name": "1031623",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031623"
            },
            {
              "name": "RHSA-2015:0093",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
            },
            {
              "name": "62383",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62383"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-1346",
    "datePublished": "2015-01-22T22:00:00",
    "dateReserved": "2015-01-22T00:00:00",
    "dateUpdated": "2024-08-06T04:40:18.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-7834
Vulnerability from cvelistv5
Published
2015-10-15 10:00
Modified
2024-08-06 07:59
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-2770-1vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2770-2vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:59:00.379Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
          },
          {
            "name": "USN-2770-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2770-1"
          },
          {
            "name": "USN-2770-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2770-2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-22T18:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
        },
        {
          "name": "USN-2770-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2770-1"
        },
        {
          "name": "USN-2770-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2770-2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-7834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
            },
            {
              "name": "USN-2770-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2770-1"
            },
            {
              "name": "USN-2770-2",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2770-2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-7834",
    "datePublished": "2015-10-15T10:00:00",
    "dateReserved": "2015-10-14T00:00:00",
    "dateUpdated": "2024-08-06T07:59:00.379Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-3333
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 05:47
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:47:57.084Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-2570-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-2570-1"
          },
          {
            "name": "DSA-3238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3238"
          },
          {
            "name": "74221",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74221"
          },
          {
            "name": "openSUSE-SU-2015:0748",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-2570-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-2570-1"
        },
        {
          "name": "DSA-3238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3238"
        },
        {
          "name": "74221",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74221"
        },
        {
          "name": "openSUSE-SU-2015:0748",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-3333",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-2570-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-2570-1"
            },
            {
              "name": "DSA-3238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3238"
            },
            {
              "name": "74221",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74221"
            },
            {
              "name": "openSUSE-SU-2015:0748",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3333",
    "datePublished": "2015-04-19T10:00:00",
    "dateReserved": "2015-04-19T00:00:00",
    "dateUpdated": "2024-08-06T05:47:57.084Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8548
Vulnerability from cvelistv5
Published
2015-12-14 11:00
Modified
2024-08-06 08:20
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:20:43.104Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
          },
          {
            "name": "RHSA-2015:2618",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
          },
          {
            "name": "USN-2860-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2860-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-05T14:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
        },
        {
          "name": "RHSA-2015:2618",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
        },
        {
          "name": "USN-2860-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2860-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-8548",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
            },
            {
              "name": "RHSA-2015:2618",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
            },
            {
              "name": "USN-2860-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2860-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-8548",
    "datePublished": "2015-12-14T11:00:00",
    "dateReserved": "2015-12-13T00:00:00",
    "dateUpdated": "2024-08-06T08:20:43.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-0836
Vulnerability from cvelistv5
Published
2013-01-15 21:00
Modified
2024-08-06 14:41
Severity ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:41:47.384Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:0236",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
          },
          {
            "name": "oval:org.mitre.oval:def:16459",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:0236",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
        },
        {
          "name": "oval:org.mitre.oval:def:16459",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2013-0836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:0236",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=150545",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
            },
            {
              "name": "oval:org.mitre.oval:def:16459",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2013-0836",
    "datePublished": "2013-01-15T21:00:00",
    "dateReserved": "2013-01-07T00:00:00",
    "dateUpdated": "2024-08-06T14:41:47.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-5380
Vulnerability from cvelistv5
Published
2015-07-09 10:00
Modified
2024-08-06 06:50
Severity ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:02.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1226493003"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/joyent/node/issues/25583"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
          },
          {
            "name": "75556",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75556"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1226493003"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/joyent/node/issues/25583"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
        },
        {
          "name": "75556",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75556"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-5380",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://codereview.chromium.org/1226493003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1226493003"
            },
            {
              "name": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852",
              "refsource": "CONFIRM",
              "url": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
            },
            {
              "name": "https://github.com/joyent/node/issues/25583",
              "refsource": "CONFIRM",
              "url": "https://github.com/joyent/node/issues/25583"
            },
            {
              "name": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/",
              "refsource": "CONFIRM",
              "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
            },
            {
              "name": "75556",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75556"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-5380",
    "datePublished": "2015-07-09T10:00:00",
    "dateReserved": "2015-07-06T00:00:00",
    "dateUpdated": "2024-08-06T06:50:02.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-5129
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:53:47.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1868",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
          },
          {
            "name": "openSUSE-SU-2016:1869",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2017-04-01"
          },
          {
            "name": "92053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
          },
          {
            "name": "USN-3041-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3041-1"
          },
          {
            "name": "openSUSE-SU-2016:1918",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2078403002/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/620553"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2102243002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2111133002"
          },
          {
            "name": "GLSA-201610-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201610-09"
          },
          {
            "name": "openSUSE-SU-2016:1865",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
          },
          {
            "name": "RHSA-2016:1485",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
          },
          {
            "name": "1036428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036428"
          },
          {
            "name": "1038201",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038201"
          },
          {
            "name": "DSA-3637",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1868",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
        },
        {
          "name": "openSUSE-SU-2016:1869",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://source.android.com/security/bulletin/2017-04-01"
        },
        {
          "name": "92053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
        },
        {
          "name": "USN-3041-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3041-1"
        },
        {
          "name": "openSUSE-SU-2016:1918",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2078403002/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/620553"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2102243002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2111133002"
        },
        {
          "name": "GLSA-201610-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201610-09"
        },
        {
          "name": "openSUSE-SU-2016:1865",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
        },
        {
          "name": "RHSA-2016:1485",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
        },
        {
          "name": "1036428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036428"
        },
        {
          "name": "1038201",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038201"
        },
        {
          "name": "DSA-3637",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-5129",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1868",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
            },
            {
              "name": "openSUSE-SU-2016:1869",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
            },
            {
              "name": "https://source.android.com/security/bulletin/2017-04-01",
              "refsource": "CONFIRM",
              "url": "https://source.android.com/security/bulletin/2017-04-01"
            },
            {
              "name": "92053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92053"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
            },
            {
              "name": "USN-3041-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3041-1"
            },
            {
              "name": "openSUSE-SU-2016:1918",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
            },
            {
              "name": "https://codereview.chromium.org/2078403002/",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2078403002/"
            },
            {
              "name": "https://crbug.com/620553",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/620553"
            },
            {
              "name": "https://codereview.chromium.org/2102243002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2102243002"
            },
            {
              "name": "https://codereview.chromium.org/2111133002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2111133002"
            },
            {
              "name": "GLSA-201610-09",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201610-09"
            },
            {
              "name": "openSUSE-SU-2016:1865",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
            },
            {
              "name": "RHSA-2016:1485",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
            },
            {
              "name": "1036428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036428"
            },
            {
              "name": "1038201",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038201"
            },
            {
              "name": "DSA-3637",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-5129",
    "datePublished": "2016-07-23T19:00:00",
    "dateReserved": "2016-05-31T00:00:00",
    "dateUpdated": "2024-08-06T00:53:47.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-1678
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/595259"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1875053002"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/595259"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1875053002"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-1678",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "https://crbug.com/595259",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/595259"
            },
            {
              "name": "https://codereview.chromium.org/1875053002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1875053002"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1678",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6638
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17800"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17800"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6638",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17800",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17800"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
              "refsource": "MLIST",
              "url": "http://www.mail-archive.com/v8-dev@googlegroups.com/msg79646.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319722",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6638",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-6580
Vulnerability from cvelistv5
Published
2015-09-03 22:00
Modified
2024-08-06 07:22
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:22:22.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
          },
          {
            "name": "1033472",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033472"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-09-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-20T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
        },
        {
          "name": "1033472",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1033472"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-6580",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
            },
            {
              "name": "1033472",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1033472"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-6580",
    "datePublished": "2015-09-03T22:00:00",
    "dateReserved": "2015-08-21T00:00:00",
    "dateUpdated": "2024-08-06T07:22:22.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6640
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.253Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17801"
          },
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17801"
        },
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17801",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17801"
            },
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319860",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6640",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-1688
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.959Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/604897"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1927003003"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/604897"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1927003003"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-1688",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "https://crbug.com/604897",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/604897"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "https://codereview.chromium.org/1927003003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1927003003"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1688",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-3910
Vulnerability from cvelistv5
Published
2015-05-20 10:00
Modified
2024-08-06 05:56
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:56:16.030Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2015:0969",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
          },
          {
            "name": "74730",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74730"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2015:0969",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
        },
        {
          "name": "74730",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74730"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-3910",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2015:0969",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
            },
            {
              "name": "74730",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74730"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-3910",
    "datePublished": "2015-05-20T10:00:00",
    "dateReserved": "2015-05-12T00:00:00",
    "dateUpdated": "2024-08-06T05:56:16.030Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-3679
Vulnerability from cvelistv5
Published
2016-03-29 10:00
Modified
2024-08-06 00:03
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:03:34.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2016:0525",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
          },
          {
            "name": "openSUSE-SU-2016:0929",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
          },
          {
            "name": "openSUSE-SU-2016:1059",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
          },
          {
            "name": "1035423",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035423"
          },
          {
            "name": "openSUSE-SU-2016:0930",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
          },
          {
            "name": "USN-2955-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2955-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-30T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2016:0525",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
        },
        {
          "name": "openSUSE-SU-2016:0929",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
        },
        {
          "name": "openSUSE-SU-2016:1059",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
        },
        {
          "name": "1035423",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035423"
        },
        {
          "name": "openSUSE-SU-2016:0930",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
        },
        {
          "name": "USN-2955-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2955-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-3679",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2016:0525",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
            },
            {
              "name": "openSUSE-SU-2016:0929",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
            },
            {
              "name": "openSUSE-SU-2016:1059",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
            },
            {
              "name": "1035423",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035423"
            },
            {
              "name": "openSUSE-SU-2016:0930",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
            },
            {
              "name": "USN-2955-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2955-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-3679",
    "datePublished": "2016-03-29T10:00:00",
    "dateReserved": "2016-03-28T00:00:00",
    "dateUpdated": "2024-08-06T00:03:34.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6668
Vulnerability from cvelistv5
Published
2014-03-05 02:00
Modified
2024-08-06 17:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
          },
          {
            "name": "65930",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65930"
          },
          {
            "name": "DSA-2883",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2883"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
          },
          {
            "name": "61184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19475"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19553"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19599"
          },
          {
            "name": "MDVSA-2015:142",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-04T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
        },
        {
          "name": "65930",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65930"
        },
        {
          "name": "DSA-2883",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2883"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
        },
        {
          "name": "61184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19475"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19553"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19599"
        },
        {
          "name": "MDVSA-2015:142",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6668",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=344186",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
            },
            {
              "name": "65930",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65930"
            },
            {
              "name": "DSA-2883",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2883"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0516.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
            },
            {
              "name": "61184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61184"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19475",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19475"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=343964",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=347909",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19553",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19553"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19599",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19599"
            },
            {
              "name": "MDVSA-2015:142",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6668",
    "datePublished": "2014-03-05T02:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3152
Vulnerability from cvelistv5
Published
2014-05-21 10:00
Modified
2024-08-06 10:35
Severity ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:56.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2015-6845",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=20363"
          },
          {
            "name": "FEDORA-2015-6890",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
          },
          {
            "name": "FEDORA-2015-6908",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
          },
          {
            "name": "DSA-2939",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2939"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
          },
          {
            "name": "60372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60372"
          },
          {
            "name": "openSUSE-SU-2014:0783",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
          },
          {
            "name": "59155",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59155"
          },
          {
            "name": "58920",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58920"
          },
          {
            "name": "1030270",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030270"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "FEDORA-2015-6845",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=20363"
        },
        {
          "name": "FEDORA-2015-6890",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
        },
        {
          "name": "FEDORA-2015-6908",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
        },
        {
          "name": "DSA-2939",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2939"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
        },
        {
          "name": "60372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60372"
        },
        {
          "name": "openSUSE-SU-2014:0783",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
        },
        {
          "name": "59155",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59155"
        },
        {
          "name": "58920",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58920"
        },
        {
          "name": "1030270",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030270"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2014-3152",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2015-6845",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=20363",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=20363"
            },
            {
              "name": "FEDORA-2015-6890",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
            },
            {
              "name": "FEDORA-2015-6908",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
            },
            {
              "name": "DSA-2939",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2939"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
            },
            {
              "name": "60372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60372"
            },
            {
              "name": "openSUSE-SU-2014:0783",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=358057",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
            },
            {
              "name": "59155",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59155"
            },
            {
              "name": "58920",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58920"
            },
            {
              "name": "1030270",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030270"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-3152",
    "datePublished": "2014-05-21T10:00:00",
    "dateReserved": "2014-05-03T00:00:00",
    "dateUpdated": "2024-08-06T10:35:56.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-1677
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:13.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/602970"
          },
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1936083002"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/602970"
        },
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1936083002"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-1677",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://crbug.com/602970",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/602970"
            },
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "https://codereview.chromium.org/1936083002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1936083002"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1677",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:13.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7967
Vulnerability from cvelistv5
Published
2014-10-08 10:00
Modified
2024-08-06 13:03
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-10-08T08:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2014-7967",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-7967",
    "datePublished": "2014-10-08T10:00:00",
    "dateReserved": "2014-10-08T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2555
Vulnerability from cvelistv5
Published
2009-07-21 16:00
Modified
2024-08-07 05:52
Severity ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:15.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
          },
          {
            "name": "35722",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35722"
          },
          {
            "name": "googlechrome-javascript-bo(51801)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
          },
          {
            "name": "35844",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35844"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codereview.chromium.org/141042"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codereview.chromium.org/141042/diff/6/1004"
          },
          {
            "name": "ADV-2009-1924",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1924"
          },
          {
            "name": "55939",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55939"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
        },
        {
          "name": "35722",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35722"
        },
        {
          "name": "googlechrome-javascript-bo(51801)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
        },
        {
          "name": "35844",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35844"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codereview.chromium.org/141042"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codereview.chromium.org/141042/diff/6/1004"
        },
        {
          "name": "ADV-2009-1924",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1924"
        },
        {
          "name": "55939",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55939"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=14719",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
            },
            {
              "name": "35722",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35722"
            },
            {
              "name": "googlechrome-javascript-bo(51801)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
            },
            {
              "name": "35844",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35844"
            },
            {
              "name": "http://codereview.chromium.org/141042",
              "refsource": "CONFIRM",
              "url": "http://codereview.chromium.org/141042"
            },
            {
              "name": "http://codereview.chromium.org/141042/diff/6/1004",
              "refsource": "CONFIRM",
              "url": "http://codereview.chromium.org/141042/diff/6/1004"
            },
            {
              "name": "ADV-2009-1924",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1924"
            },
            {
              "name": "55939",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55939"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2555",
    "datePublished": "2009-07-21T16:00:00",
    "dateReserved": "2009-07-21T00:00:00",
    "dateUpdated": "2024-08-07T05:52:15.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-2632
Vulnerability from cvelistv5
Published
2013-03-21 21:00
Modified
2024-09-17 00:11
Severity ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:44:32.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-21T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=194749",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2632",
    "datePublished": "2013-03-21T21:00:00Z",
    "dateReserved": "2013-03-21T00:00:00Z",
    "dateUpdated": "2024-09-17T00:11:00.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-5037
Vulnerability from cvelistv5
Published
2011-12-30 01:00
Modified
2024-08-07 00:23
Severity ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.836Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
          },
          {
            "name": "VU#903934",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/903934"
          },
          {
            "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-06T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
        },
        {
          "name": "VU#903934",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/903934"
        },
        {
          "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5037",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.nruns.com/_downloads/advisory28122011.pdf",
              "refsource": "MISC",
              "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
            },
            {
              "name": "VU#903934",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/903934"
            },
            {
              "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
            },
            {
              "name": "http://www.ocert.org/advisories/ocert-2011-003.html",
              "refsource": "MISC",
              "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5037",
    "datePublished": "2011-12-30T01:00:00",
    "dateReserved": "2011-12-29T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-5120
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:01.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56413",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56413"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
          },
          {
            "name": "87085",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/87085"
          },
          {
            "name": "chrome-cve20125120-code-exec(79867)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "56413",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56413"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
        },
        {
          "name": "87085",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/87085"
        },
        {
          "name": "chrome-cve20125120-code-exec(79867)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-5120",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56413",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56413"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=150729",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
            },
            {
              "name": "87085",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/87085"
            },
            {
              "name": "chrome-cve20125120-code-exec(79867)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5120",
    "datePublished": "2012-11-07T11:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:01.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-1704
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 09:50
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:50:10.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2883",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2883"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
          },
          {
            "name": "GLSA-201408-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=18564"
          },
          {
            "name": "1029914",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029914"
          },
          {
            "name": "openSUSE-SU-2014:0501",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19668"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19614"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-04T17:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "DSA-2883",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2883"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
        },
        {
          "name": "GLSA-201408-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=18564"
        },
        {
          "name": "1029914",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029914"
        },
        {
          "name": "openSUSE-SU-2014:0501",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19668"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19614"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2014-1704",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2883",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2883"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
            },
            {
              "name": "GLSA-201408-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=18564",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=18564"
            },
            {
              "name": "1029914",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029914"
            },
            {
              "name": "openSUSE-SU-2014:0501",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=345715",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19668",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19668"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19614",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19614"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=349079",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=328202",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-1704",
    "datePublished": "2014-03-16T10:00:00",
    "dateReserved": "2014-01-29T00:00:00",
    "dateUpdated": "2024-08-06T09:50:10.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-1669
Vulnerability from cvelistv5
Published
2016-05-14 21:00
Modified
2024-08-05 23:02
Severity ?
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
http://www.securityfocus.com/bid/90584vdb-entry, x_refsource_BID
https://access.redhat.com/errata/RHSA-2017:0880vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1035872vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2016-1080.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.htmlvendor-advisory, x_refsource_SUSE
https://access.redhat.com/errata/RHSA-2017:0881vendor-advisory, x_refsource_REDHAT
https://codereview.chromium.org/1945313002x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2018:0336vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2017:0882vendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2016/dsa-3590vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-2960-1vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/vendor-advisory, x_refsource_FEDORA
https://crbug.com/606115x_refsource_CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2017:0879vendor-advisory, x_refsource_REDHAT
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2017-0002.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.htmlvendor-advisory, x_refsource_SUSE
https://security.gentoo.org/glsa/201605-02vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90584",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90584"
          },
          {
            "name": "RHSA-2017:0880",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0880"
          },
          {
            "name": "1035872",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035872"
          },
          {
            "name": "RHSA-2016:1080",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
          },
          {
            "name": "openSUSE-SU-2016:1304",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
          },
          {
            "name": "RHSA-2017:0881",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0881"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1945313002"
          },
          {
            "name": "RHSA-2018:0336",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2018:0336"
          },
          {
            "name": "RHSA-2017:0882",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0882"
          },
          {
            "name": "openSUSE-SU-2016:1655",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "name": "USN-2960-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2960-1"
          },
          {
            "name": "FEDORA-2016-6fd3131c03",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
          },
          {
            "name": "FEDORA-2016-e720bc8451",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/606115"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
          },
          {
            "name": "RHSA-2017:0879",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0879"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2016:1834",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
          },
          {
            "name": "RHSA-2017:0002",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
          },
          {
            "name": "openSUSE-SU-2016:1319",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
          },
          {
            "name": "GLSA-201605-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201605-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-22T10:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90584",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90584"
        },
        {
          "name": "RHSA-2017:0880",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0880"
        },
        {
          "name": "1035872",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035872"
        },
        {
          "name": "RHSA-2016:1080",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
        },
        {
          "name": "openSUSE-SU-2016:1304",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
        },
        {
          "name": "RHSA-2017:0881",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0881"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1945313002"
        },
        {
          "name": "RHSA-2018:0336",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2018:0336"
        },
        {
          "name": "RHSA-2017:0882",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0882"
        },
        {
          "name": "openSUSE-SU-2016:1655",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "name": "USN-2960-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2960-1"
        },
        {
          "name": "FEDORA-2016-6fd3131c03",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
        },
        {
          "name": "FEDORA-2016-e720bc8451",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/606115"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
        },
        {
          "name": "RHSA-2017:0879",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0879"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2016:1834",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
        },
        {
          "name": "RHSA-2017:0002",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
        },
        {
          "name": "openSUSE-SU-2016:1319",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
        },
        {
          "name": "GLSA-201605-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201605-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-1669",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90584",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90584"
            },
            {
              "name": "RHSA-2017:0880",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0880"
            },
            {
              "name": "1035872",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035872"
            },
            {
              "name": "RHSA-2016:1080",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
            },
            {
              "name": "openSUSE-SU-2016:1304",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
            },
            {
              "name": "RHSA-2017:0881",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0881"
            },
            {
              "name": "https://codereview.chromium.org/1945313002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1945313002"
            },
            {
              "name": "RHSA-2018:0336",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2018:0336"
            },
            {
              "name": "RHSA-2017:0882",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0882"
            },
            {
              "name": "openSUSE-SU-2016:1655",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "USN-2960-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2960-1"
            },
            {
              "name": "FEDORA-2016-6fd3131c03",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
            },
            {
              "name": "FEDORA-2016-e720bc8451",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
            },
            {
              "name": "https://crbug.com/606115",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/606115"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
            },
            {
              "name": "RHSA-2017:0879",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0879"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2016:1834",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
            },
            {
              "name": "RHSA-2017:0002",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
            },
            {
              "name": "openSUSE-SU-2016:1319",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
            },
            {
              "name": "GLSA-201605-02",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201605-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1669",
    "datePublished": "2016-05-14T21:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-2843
Vulnerability from cvelistv5
Published
2016-03-06 02:00
Modified
2024-08-05 23:32
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:32:21.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1035185",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035185"
          },
          {
            "name": "USN-2920-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2920-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-01T15:57:02",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "1035185",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035185"
        },
        {
          "name": "USN-2920-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2920-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2016-2843",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1035185",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035185"
            },
            {
              "name": "USN-2920-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2920-1"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-2843",
    "datePublished": "2016-03-06T02:00:00",
    "dateReserved": "2016-03-05T00:00:00",
    "dateUpdated": "2024-08-05T23:32:21.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-2838
Vulnerability from cvelistv5
Published
2013-05-22 10:00
Modified
2024-08-06 15:52
Severity ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:52:20.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
          },
          {
            "name": "DSA-2695",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2695"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
          },
          {
            "name": "oval:org.mitre.oval:def:16625",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
        },
        {
          "name": "DSA-2695",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2695"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
        },
        {
          "name": "oval:org.mitre.oval:def:16625",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2013-2838",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=235311",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
            },
            {
              "name": "DSA-2695",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2695"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
            },
            {
              "name": "oval:org.mitre.oval:def:16625",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2013-2838",
    "datePublished": "2013-05-22T10:00:00",
    "dateReserved": "2013-04-11T00:00:00",
    "dateUpdated": "2024-08-06T15:52:20.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8478
Vulnerability from cvelistv5
Published
2015-12-06 01:00
Modified
2024-08-06 08:20
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:20:41.782Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
          },
          {
            "name": "USN-2825-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2825-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-05T20:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
        },
        {
          "name": "USN-2825-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2825-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2015-8478",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
            },
            {
              "name": "USN-2825-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2825-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-8478",
    "datePublished": "2015-12-06T01:00:00",
    "dateReserved": "2015-12-05T00:00:00",
    "dateUpdated": "2024-08-06T08:20:41.782Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-2238
Vulnerability from cvelistv5
Published
2015-03-09 00:00
Modified
2024-08-06 05:10
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:10:15.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-2521-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2521-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-13T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-2521-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2521-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-2238",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-2521-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2521-1"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-2238",
    "datePublished": "2015-03-09T00:00:00",
    "dateReserved": "2015-03-08T00:00:00",
    "dateUpdated": "2024-08-06T05:10:15.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-5128
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:02.695Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56413",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56413"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
          },
          {
            "name": "87081",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/87081"
          },
          {
            "name": "oval:org.mitre.oval:def:15221",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "56413",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56413"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
        },
        {
          "name": "87081",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/87081"
        },
        {
          "name": "oval:org.mitre.oval:def:15221",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-5128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56413",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56413"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=157124",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
            },
            {
              "name": "87081",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/87081"
            },
            {
              "name": "oval:org.mitre.oval:def:15221",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5128",
    "datePublished": "2012-11-07T11:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:02.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}