All the vulnerabilites related to google - v8
Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2024-11-21 02:53
Severity ?
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*", "matchCriteriaId": "C413A468-044A-412D-AC99-A2691B22A83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8377FE4-224C-40A4-AD53-E1E2CDAE56DA", "versionEndIncluding": "5.2.360", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code." }, { "lang": "es", "value": "Google V8 en versiones anteriores a 5.2.361.32, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no procesa adecuadamente los objetos recortados por la izquierda, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado." } ], "id": "CVE-2016-5129", "lastModified": "2024-11-21T02:53:40.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-23T19:59:11.297", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3637" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/92053" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1036428" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1038201" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2078403002/" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2102243002" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2111133002" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/620553" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201610-09" }, { "source": "chrome-cve-admin@google.com", "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2078403002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2102243002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2111133002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/620553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://source.android.com/security/bulletin/2017-04-01" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 21:55
Modified
2024-11-21 01:52
Severity ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "913E5E2D-2C74-4AE5-8808-4FCEF0FB0AC2", "versionEndIncluding": "27.0.1444.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7F6776E-25BA-44C4-B9A9-A0B961D838B5", "versionEndIncluding": "3.17.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "C96B1935-3469-4540-84F5-4DEA53671FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F251A3F-BEF8-4410-9DFB-5ED8BBC7E61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "B0659DCB-0831-4862-8905-B3C33DBFD990", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1DA481F-4E0E-48FE-9552-D7EB466CC024", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "9C066C47-8882-4F54-8071-321960DF1CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "D0C23E1D-472F-469B-82D2-3D68A3FBE015", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.6:*:*:*:*:*:*:*", "matchCriteriaId": "12A37442-7DC7-40A2-9B45-3B6C4B275E8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA01DAB5-0806-4E90-809C-F0AF4E470801", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.8:*:*:*:*:*:*:*", "matchCriteriaId": "1D48CC42-FC82-4183-A5BB-35208CDD78A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.9:*:*:*:*:*:*:*", "matchCriteriaId": "5C831507-B5ED-4CC9-BC91-4046F0DBDACF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.10:*:*:*:*:*:*:*", "matchCriteriaId": "128A2521-5428-4199-B745-094083E05E03", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.17.11:*:*:*:*:*:*:*", "matchCriteriaId": "DE1BA769-E534-4C7C-BAB6-29A348521D53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game." }, { "lang": "es", "value": "Google V8 anterior a v3.17.13, usado en Google Chrome anterior a v27.0.1444.3, permite a atacantes remotos causar una denegaci\u00f3n de servicios (ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otros impactos a trav\u00e9s de c\u00f3digo JavaScript manipulado, como se mostr\u00f3 con el juego Bejewele." } ], "id": "CVE-2013-2632", "lastModified": "2024-11-21T01:52:04.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-03-21T21:55:00.960", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://code.google.com/p/chromium/issues/detail?id=194749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://code.google.com/p/chromium/issues/detail?id=194749" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-05-14 21:59
Modified
2024-11-21 02:46
Severity ?
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "564CADC6-8AB4-4FE0-8E0A-245E87712035", "versionEndIncluding": "50.0.2661.87", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1", "versionEndIncluding": "5.0.71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D770B4-E1AB-40F6-A9FC-88E0FE860C81", "versionEndExcluding": "0.10.46", "versionStartIncluding": "0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "90D7908B-0B23-4CC4-9585-0120DF187A47", "versionEndExcluding": "0.12.15", "versionStartIncluding": "0.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "A47FC4F7-1F77-4314-B4B3-3C5D8E335379", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "9731B34D-C6F6-4129-BFEB-6C5C171F4CC0", "versionEndExcluding": "4.4.6", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "30165C60-84D5-49FC-84C9-5CE9CF0DC43D", "versionEndExcluding": "5.12.0", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "9ED36E22-DA95-4913-AB4E-4FB696031FFA", "versionEndIncluding": "6.2.0", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." }, { "lang": "es", "value": "La funci\u00f3n Zone::New en zone.cc en Google V8 en versiones anteriores a 5.0.71.47, tal como se utiliza en Google Chrome en versiones anteriores a 50.0.2661.102, no determina correctamente cu\u00e1ndo expandir ciertas asignaciones de memoria, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de buffer) o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado." } ], "id": "CVE-2016-1669", "lastModified": "2024-11-21T02:46:51.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-14T21:59:09.460", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/90584" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035872" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1945313002" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/606115" }, { "source": "chrome-cve-admin@google.com", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "chrome-cve-admin@google.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/" }, { "source": "chrome-cve-admin@google.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201605-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1945313002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/606115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201605-02" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Severity ?
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 42.1 | |
opensuse | opensuse | 13.2 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
suse | linux_enterprise | 12.0 | |
chrome | * | ||
v8 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23", "versionEndIncluding": "50.0.2661.102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1", "versionEndIncluding": "5.0.71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code." }, { "lang": "es", "value": "La implementaci\u00f3n de regexp (tambi\u00e9n conocida como regular expression) en Google V8 en versiones anteriores a 5.0.71.40, como es usada en Google Chrome en versiones anteriores a 51.0.2704.63, no maneja correctamente los tama\u00f1os de cadena externos, lo que permite a atacantes remotos provocar una denegaci\u00f3n del servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un c\u00f3digo JavaScript manipulado." } ], "id": "CVE-2016-1688", "lastModified": "2024-11-21T02:46:53.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-05T23:59:17.540", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1927003003" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/604897" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201607-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1927003003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/604897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201607-07" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2024-11-21 02:53
Severity ?
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC23C474-0857-44A5-ADAE-8AFDEB4EFECE", "versionEndIncluding": "51.0.2704.106", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*", "matchCriteriaId": "E8FF8F6B-7BAB-4528-88E2-05E52DF7AAF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site." }, { "lang": "es", "value": "objects.cc en Google V8 en versiones anteriores a 5.2.361.27, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no impide que los interceptores de la API modifiquen un objetivo de almacenamiento sin ajustar una propiedad, lo que permite a atacantes remotos eludir la Same Origin Policy a trav\u00e9s de un sitio web manipulado." } ], "id": "CVE-2016-5128", "lastModified": "2024-11-21T02:53:40.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-23T19:59:10.170", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3637" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/92053" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1036428" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2082633002" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2084183004" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2085223002" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2101983002" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/2103033002" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/619166" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201610-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2082633002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2084183004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2085223002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2101983002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/2103033002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/619166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-09" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2024-11-21 02:24
Severity ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
v8 | * | ||
chrome | * | ||
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9", "versionEndIncluding": "4.2.77.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772", "versionEndIncluding": "42.0.2311.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization." }, { "lang": "es", "value": "La funci\u00f3n ReduceTransitionElementsKind en hydrogen-check-elimination.cc en Google V8 anterior a 4.2.77.8, utilizado en Google Chrome anterior a 42.0.2311.90, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado que aprovecha la \u0027confusi\u00f3n de tipos\u0027 en la optimizaci\u00f3n de la comprobaci\u00f3n de la eliminaci\u00f3n." } ], "evaluatorComment": "\u003ca href=\"https://cwe.mitre.org/data/definitions/843.html\"\u003eCWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)\u003c/a\u003e", "id": "CVE-2015-1242", "lastModified": "2024-11-21T02:24:58.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-19T10:59:06.757", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1032209" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=460917" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1000893003" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1019033004" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201506-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=460917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1000893003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1019033004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201506-04" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-25 19:55
Modified
2024-11-21 01:31
Severity ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "014BE926-B695-4F9B-8F3E-115F1FAFD480", "versionEndIncluding": "15.0.874.101", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations." }, { "lang": "es", "value": "Google V8, tal como se utiliza en Google Chrome en versiones anteriores a la 15.0.874.102, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente realizar otras acciones sin especificar a trav\u00e9s de c\u00f3digo JavaScript modificado que provoca operaciones de escritura fuera de los l\u00edmites." } ], "id": "CVE-2011-3886", "lastModified": "2024-11-21T01:31:28.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-10-25T19:55:01.760", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://code.google.com/p/chromium/issues/detail?id=98773" }, { "source": "chrome-cve-admin@google.com", "url": "http://code.google.com/p/chromium/issues/detail?id=99167" }, { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964" }, { "source": "chrome-cve-admin@google.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/chromium/issues/detail?id=98773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/chromium/issues/detail?id=99167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-21 16:30
Modified
2024-11-21 01:05
Severity ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
v8 | * | ||
chrome | * | ||
chrome | 0.2.149.29 | ||
chrome | 0.2.149.30 | ||
chrome | 0.2.152.1 | ||
chrome | 0.2.153.1 | ||
chrome | 0.3.154.0 | ||
chrome | 0.3.154.3 | ||
chrome | 0.4.154.18 | ||
chrome | 0.4.154.22 | ||
chrome | 0.4.154.31 | ||
chrome | 0.4.154.33 | ||
chrome | 1.0.154.36 | ||
chrome | 1.0.154.39 | ||
chrome | 1.0.154.42 | ||
chrome | 1.0.154.43 | ||
chrome | 1.0.154.46 | ||
chrome | 1.0.154.48 | ||
chrome | 1.0.154.52 | ||
chrome | 1.0.154.53 | ||
chrome | 1.0.154.59 | ||
chrome | 2.0.156.1 | ||
chrome | 2.0.157.0 | ||
chrome | 2.0.157.2 | ||
chrome | 2.0.158.0 | ||
chrome | 2.0.159.0 | ||
chrome | 2.0.172 | ||
chrome | 2.0.172.30 | ||
chrome | 2.0.172.31 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "75FB9ABA-F9DB-4F52-A62E-7400F97537A7", "versionEndIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "23BD1820-86D9-4ED4-A502-7F6FE82B80E4", "versionEndIncluding": "2.0.172.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*", "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*", "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*", "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*", "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*", "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*", "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*", "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*", "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*", "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*", "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*", "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*", "matchCriteriaId": "6659833E-E309-4797-84D4-A782237714A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*", "matchCriteriaId": "FE4C0D93-0308-48D4-A953-9398B88E2868", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*", "matchCriteriaId": "FE5094C4-1338-4189-B5FD-C9AFFF091D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*", "matchCriteriaId": "51A8C3D2-82E6-453E-90B7-BA5C5D2CDF54", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2F95770-F36F-43C0-986F-5C819648271E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECCE1FD3-8D27-4304-97F9-6F9689F2498D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F6CA696-49AA-4445-B978-96C1D8CE58DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9CFA3BF-6C07-448B-8C83-AD4C524A6577", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8497F93-D88A-4FFA-B988-7210608530A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*", "matchCriteriaId": "E5CDF938-2998-403F-B343-29B620E05D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*", "matchCriteriaId": "B4A9B50D-5B0F-41C9-8FAF-B78CD21A0554", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*", "matchCriteriaId": "4F5223F1-85CD-4DF9-9665-BDF7B554A784", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en src/jsregexp.cc en Google V8 anterior a v1.1.10.14, como el utilizado en Google Chrome anterior a v2.0.172.37, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n en el Chrome sandbox a trav\u00e9s de una expresi\u00f3n regular JavaScript manipulada." } ], "id": "CVE-2009-2555", "lastModified": "2024-11-21T01:05:09.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-07-21T16:30:00.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://code.google.com/p/chromium/issues/detail?id=14719" }, { "source": "cve@mitre.org", "url": "http://codereview.chromium.org/141042" }, { "source": "cve@mitre.org", "url": "http://codereview.chromium.org/141042/diff/6/1004" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35844" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/55939" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35722" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1924" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://code.google.com/p/chromium/issues/detail?id=14719" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://codereview.chromium.org/141042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://codereview.chromium.org/141042/diff/6/1004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/55939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-03 22:59
Modified
2024-11-21 02:35
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E69B037-C7E9-4D99-9CF5-12041ACF6DE2", "versionEndIncluding": "4.4.63", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDC4A7D-C94E-42B2-983F-A7660C62A1CD", "versionEndIncluding": "44.0.2403", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.5.103.29, como se utiliza en Google Chrome en versiones anteriores a 45.0.2454.85, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-6580", "lastModified": "2024-11-21T02:35:14.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-03T22:59:13.657", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1033472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033472" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2024-11-21 01:44
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 23.0.1271.0 | ||
chrome | 23.0.1271.1 | ||
chrome | 23.0.1271.2 | ||
chrome | 23.0.1271.3 | ||
chrome | 23.0.1271.4 | ||
chrome | 23.0.1271.5 | ||
chrome | 23.0.1271.6 | ||
chrome | 23.0.1271.7 | ||
chrome | 23.0.1271.8 | ||
chrome | 23.0.1271.9 | ||
chrome | 23.0.1271.10 | ||
chrome | 23.0.1271.11 | ||
chrome | 23.0.1271.12 | ||
chrome | 23.0.1271.13 | ||
chrome | 23.0.1271.14 | ||
chrome | 23.0.1271.15 | ||
chrome | 23.0.1271.16 | ||
chrome | 23.0.1271.17 | ||
chrome | 23.0.1271.18 | ||
chrome | 23.0.1271.19 | ||
chrome | 23.0.1271.20 | ||
chrome | 23.0.1271.21 | ||
chrome | 23.0.1271.22 | ||
chrome | 23.0.1271.23 | ||
chrome | 23.0.1271.24 | ||
chrome | 23.0.1271.26 | ||
chrome | 23.0.1271.30 | ||
chrome | 23.0.1271.31 | ||
chrome | 23.0.1271.32 | ||
chrome | 23.0.1271.33 | ||
chrome | 23.0.1271.35 | ||
chrome | 23.0.1271.36 | ||
chrome | 23.0.1271.37 | ||
chrome | 23.0.1271.38 | ||
chrome | 23.0.1271.39 | ||
chrome | 23.0.1271.40 | ||
chrome | 23.0.1271.41 | ||
chrome | 23.0.1271.44 | ||
chrome | 23.0.1271.45 | ||
chrome | 23.0.1271.46 | ||
chrome | 23.0.1271.49 | ||
chrome | 23.0.1271.50 | ||
chrome | 23.0.1271.51 | ||
chrome | 23.0.1271.52 | ||
chrome | 23.0.1271.53 | ||
chrome | 23.0.1271.54 | ||
chrome | 23.0.1271.55 | ||
chrome | 23.0.1271.56 | ||
chrome | 23.0.1271.57 | ||
chrome | 23.0.1271.58 | ||
chrome | 23.0.1271.59 | ||
chrome | 23.0.1271.60 | ||
chrome | 23.0.1271.61 | ||
v8 | * | ||
v8 | 1.0 | ||
v8 | 2.4.0 | ||
v8 | 2.4.1 | ||
v8 | 2.4.2 | ||
v8 | 2.4.3 | ||
v8 | 2.4.4 | ||
v8 | 2.4.5 | ||
v8 | 2.4.6 | ||
v8 | 2.4.7 | ||
v8 | 2.4.8 | ||
v8 | 2.4.9 | ||
v8 | 2.5.0 | ||
v8 | 2.5.1 | ||
v8 | 2.5.2 | ||
v8 | 2.5.3 | ||
v8 | 2.5.4 | ||
v8 | 2.5.5 | ||
v8 | 2.5.6 | ||
v8 | 2.5.7 | ||
v8 | 2.5.8 | ||
v8 | 2.5.9 | ||
v8 | 3.0.0 | ||
v8 | 3.0.1 | ||
v8 | 3.0.2 | ||
v8 | 3.0.3 | ||
v8 | 3.0.4 | ||
v8 | 3.0.5 | ||
v8 | 3.0.6 | ||
v8 | 3.0.7 | ||
v8 | 3.0.8 | ||
v8 | 3.0.9 | ||
v8 | 3.0.10 | ||
v8 | 3.0.11 | ||
v8 | 3.0.12 | ||
v8 | 3.1.0 | ||
v8 | 3.1.1 | ||
v8 | 3.1.2 | ||
v8 | 3.1.3 | ||
v8 | 3.1.4 | ||
v8 | 3.1.5 | ||
v8 | 3.1.6 | ||
v8 | 3.1.7 | ||
v8 | 3.1.8 | ||
v8 | 3.2.0 | ||
v8 | 3.2.1 | ||
v8 | 3.2.2 | ||
v8 | 3.2.3 | ||
v8 | 3.2.4 | ||
v8 | 3.2.5 | ||
v8 | 3.2.6 | ||
v8 | 3.2.7 | ||
v8 | 3.2.8 | ||
v8 | 3.2.9 | ||
v8 | 3.2.10 | ||
v8 | 3.3.0 | ||
v8 | 3.3.1 | ||
v8 | 3.3.2 | ||
v8 | 3.3.3 | ||
v8 | 3.3.4 | ||
v8 | 3.3.5 | ||
v8 | 3.3.6 | ||
v8 | 3.3.7 | ||
v8 | 3.3.8 | ||
v8 | 3.3.9 | ||
v8 | 3.3.10 | ||
v8 | 3.4.0 | ||
v8 | 3.4.1 | ||
v8 | 3.4.2 | ||
v8 | 3.4.3 | ||
v8 | 3.4.4 | ||
v8 | 3.4.5 | ||
v8 | 3.4.6 | ||
v8 | 3.4.7 | ||
v8 | 3.4.8 | ||
v8 | 3.4.9 | ||
v8 | 3.4.10 | ||
v8 | 3.4.11 | ||
v8 | 3.4.12 | ||
v8 | 3.4.13 | ||
v8 | 3.4.14 | ||
v8 | 3.5.0 | ||
v8 | 3.5.1 | ||
v8 | 3.5.2 | ||
v8 | 3.5.3 | ||
v8 | 3.5.4 | ||
v8 | 3.5.5 | ||
v8 | 3.5.6 | ||
v8 | 3.5.7 | ||
v8 | 3.5.8 | ||
v8 | 3.5.9 | ||
v8 | 3.5.10 | ||
v8 | 3.6.0 | ||
v8 | 3.6.1 | ||
v8 | 3.6.2 | ||
v8 | 3.6.3 | ||
v8 | 3.6.4 | ||
v8 | 3.6.5 | ||
v8 | 3.6.6 | ||
v8 | 3.7.0 | ||
v8 | 3.7.1 | ||
v8 | 3.7.2 | ||
v8 | 3.7.3 | ||
v8 | 3.7.4 | ||
v8 | 3.7.5 | ||
v8 | 3.7.6 | ||
v8 | 3.7.7 | ||
v8 | 3.7.8 | ||
v8 | 3.7.9 | ||
v8 | 3.7.10 | ||
v8 | 3.7.11 | ||
v8 | 3.7.12 | ||
v8 | 3.8.0 | ||
v8 | 3.8.1 | ||
v8 | 3.8.2 | ||
v8 | 3.8.3 | ||
v8 | 3.8.4 | ||
v8 | 3.8.5 | ||
v8 | 3.8.6 | ||
v8 | 3.8.7 | ||
v8 | 3.8.8 | ||
v8 | 3.8.9 | ||
v8 | 3.9.0 | ||
v8 | 3.9.1 | ||
v8 | 3.9.2 | ||
v8 | 3.9.3 | ||
v8 | 3.9.4 | ||
v8 | 3.9.5 | ||
v8 | 3.9.6 | ||
v8 | 3.9.7 | ||
v8 | 3.9.8 | ||
v8 | 3.9.9 | ||
v8 | 3.9.10 | ||
v8 | 3.9.11 | ||
v8 | 3.9.12 | ||
v8 | 3.9.13 | ||
v8 | 3.9.14 | ||
v8 | 3.9.15 | ||
v8 | 3.9.16 | ||
v8 | 3.9.17 | ||
v8 | 3.9.18 | ||
v8 | 3.9.19 | ||
v8 | 3.9.20 | ||
v8 | 3.9.21 | ||
v8 | 3.9.22 | ||
v8 | 3.9.23 | ||
v8 | 3.9.24 | ||
v8 | 3.10.0 | ||
v8 | 3.10.1 | ||
v8 | 3.10.2 | ||
v8 | 3.10.3 | ||
v8 | 3.10.4 | ||
v8 | 3.10.5 | ||
v8 | 3.10.6 | ||
v8 | 3.10.7 | ||
v8 | 3.10.8 | ||
v8 | 3.11.0 | ||
v8 | 3.11.1 | ||
v8 | 3.11.2 | ||
v8 | 3.11.3 | ||
v8 | 3.11.4 | ||
v8 | 3.11.5 | ||
v8 | 3.11.6 | ||
v8 | 3.11.7 | ||
v8 | 3.11.8 | ||
v8 | 3.11.9 | ||
v8 | 3.11.10 | ||
v8 | 3.12.0 | ||
v8 | 3.12.1 | ||
v8 | 3.12.2 | ||
v8 | 3.12.3 | ||
v8 | 3.12.4 | ||
v8 | 3.12.5 | ||
v8 | 3.12.6 | ||
v8 | 3.12.7 | ||
v8 | 3.12.8 | ||
v8 | 3.12.9 | ||
v8 | 3.12.10 | ||
v8 | 3.12.11 | ||
v8 | 3.12.12 | ||
v8 | 3.12.13 | ||
v8 | 3.12.14 | ||
v8 | 3.12.15 | ||
v8 | 3.12.16 | ||
v8 | 3.12.17 | ||
v8 | 3.12.18 | ||
v8 | 3.12.19 | ||
v8 | 3.13.0 | ||
v8 | 3.13.1 | ||
v8 | 3.13.2 | ||
v8 | 3.13.3 | ||
v8 | 3.13.4 | ||
v8 | 3.13.5 | ||
v8 | 3.13.6 | ||
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032", "versionEndIncluding": "23.0.1271.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*", "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*", "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*", "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*", "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*", "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*", "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*", "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*", "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*", "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*", "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*", "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*", "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*", "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*", "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*", "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*", "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*", "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*", "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*", "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*", "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*", "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*", "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*", "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*", "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*", "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*", "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*", "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*", "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*", "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*", "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*", "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*", "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*", "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*", "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*", "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*", "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*", "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*", "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*", "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*", "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*", "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*", "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*", "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*", "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*", "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*", "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*", "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*", "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E", "versionEndIncluding": "3.13.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D0FB943-A6D3-4802-A3ED-CCD74974A4F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F93F8E3-9C85-43F6-9E7D-47AD90A6260E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E87E6D2B-769C-4137-9AFD-9EC4FA697B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1950ECA1-C56C-4C32-A5DA-F6DB4F848625", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "20FEF415-3FCD-4008-BE4F-4D1BE87F7ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AC25766-2B74-410A-877F-15685E17462B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "ECEDCBE7-59CA-4A16-B098-28F37E6AF3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0B055FCB-E1BE-4B40-AE3C-5FF0B800D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "A7AD6435-B632-49C0-8080-CCE8EF6F771F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "8D0F53AC-1980-44DE-897A-FEDDA4BCEE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "24C32FFF-6D3B-4546-9F30-2E08EE4EA5B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "60D843D7-646F-4F36-9039-623AD81D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "51521515-3A22-4C55-9048-5EE96EFFE0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "573802E2-1404-4560-A971-92FE5A4DF747", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC919A5A-D4FD-4E7F-8482-B4A046157196", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00B997D-4ED0-460C-9398-879F1CF38130", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F950D6ED-F7A9-460B-878A-A76A51A3C681", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "46B1BDAD-DEEF-4340-8390-80DC7B8EE3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F7B5EA9-B57D-413A-AADE-DE704AF38289", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "903F85A1-CAA2-466E-84FE-171CE57746B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "D1B9101C-2EFD-40AE-8F44-99E9B317C2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "9A217A47-FAB7-4EE7-80A4-80F6625C4AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5019DC34-F9AB-400C-B0BA-CD745BBCF64C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "14C3AE39-D48F-4D3F-AA2E-1DBC766C5332", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2049330D-2110-4E19-95AC-BD12899B580F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "D87D5E05-7F41-4D07-A582-55E32D315468", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "C426E3E3-3783-4EB8-AF71-8D5CE61E5AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "BF1BB230-2FFC-4EB9-B241-220E70683861", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "A7694D28-7C7F-4434-A03C-B8A1F727FF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "61A5C71B-2A7C-415E-B004-17B9B2BE5609", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B3B3EAA7-AA01-44ED-BEF7-D96FA7783AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "AF20FBFE-EC21-41D0-A556-0CA85A5AE8D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "515F4C07-EC8F-48F8-8FC5-A5AE3009E7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "16B2EFD6-FD5C-4EF6-82A8-DB269FF638E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "CDD57857-1769-4B65-980E-8918A2F92CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "F4496715-BEC7-4495-81F6-D7A6F02C993F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "6B915E17-9A92-4D48-8F87-791DA5EAB46F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AD9A39F-F3A7-46DA-AA28-8A03FDEDA423", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "635E9CEB-8CDE-424B-BC80-74F6EA7E403A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "52A85C40-CFFA-4448-A678-E35E8DE11FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "10458D4B-EC1B-42D7-B868-3AF043EA92D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "65680CC0-57D0-4E6E-8CBE-D853B799DD50", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FD7B7E0C-0E07-42D8-A92B-14DB14051A87", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "84D978A7-134D-4BD9-B2DD-97F1D9F459B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D055A1-A91D-462B-AD27-8D963564E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "E460C148-9632-409E-A880-E54EAE8AC09E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "C211998D-6D50-41FC-B21D-21E247E26B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "96D6FBD9-C103-4B2D-8D31-43747965F934", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1013C428-E4B3-497B-B057-3131646263A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E161736-1C08-490B-820D-FC35FACE5144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D67F4F0-3911-4C9E-831D-06390F0C0A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "10D43E1A-EEA5-4E0E-92DE-1ADFB936AC84", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "89556CDB-86C7-4909-9EAF-21F985862BE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A34E22A-20CC-460C-92BF-E8A9F8B622F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "479F97E2-FBBD-4784-BD27-F94F931050D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E38ED7C-136F-4A88-A762-7790DEAF7373", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B30D9B21-7941-4BD1-850E-C9B80DFAA314", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "232DA7A5-68D4-409C-9A5E-59928189A081", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "EED61B1C-F352-405E-B237-1AA40F593C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AE2AE4E-FBA0-432D-A319-16E2F0265A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F7FAA54-7A79-4B6D-ABC0-534CD994595C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "9CAA136B-9404-4BD2-BE3D-D1AB12134E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "62D369B1-5E98-46C9-9CF9-910C330EEC64", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "60B3631A-471C-40A8-9EB3-ECE921672AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC8D1E9-0FD2-4C87-AD92-ABC460123219", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D61B1498-7E6C-4CA1-8CBC-0A43CB2A7594", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "0C463B0D-CCD8-49FB-BEA1-EE02AF9A3668", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "A0E5B4F1-136A-4AD6-B5D6-E8F118FFC6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D531639-6926-4842-A6A4-F97F7CDEDF7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "51CDF645-3757-4C11-85A2-241DC0639C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DB7287E-D015-46F7-BE90-228FB4E771BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "9E54AB56-AA39-41B9-AC76-8929FBBBC2C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0309560-C695-4300-B6EC-09FFCAE76BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "818D390D-91E7-482D-AC69-7E6261849418", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C845DA5-7CBC-440C-9C75-77A4BEA87CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "999DDC92-7924-4461-BB54-82D9F82DECED", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "33924A69-F0D8-4E6F-9554-D02A55DC6D42", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1FC622-E8B7-4756-B609-7754C3C5EE7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA4FF2A4-2484-4A29-9F0F-D7BC5015FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "66D43A9A-7820-4097-8AD5-80A4781C2031", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A824F502-9FC2-4726-B4E1-660EC74FBC68", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "5159BF22-2E1C-4A73-B7BA-C78A12D8EEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "E07140C6-4648-4EB6-8D1F-991F24C2A2C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "3BF04257-F8DE-4C14-8F54-BE2CDFECEE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "00CB87F4-C655-4200-AB0A-F2CE5C672D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "8DDE3951-8071-475E-84FE-9C8D2EC0670A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "6A65BE16-D853-488F-9BD2-16BF2181DDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "9B96BD0B-E35F-46B2-8583-E57B671ED8AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "7C4AE78B-6B8E-4AF4-951D-1833F346BC27", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "CB357B3E-57E0-46D7-9203-AA6EF73A868D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "A71E6A99-2B95-4CD7-9EB2-5051AA950FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "9013FCED-2032-47E0-8931-76164AD1DA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "8F68D355-67EC-444D-AB75-899AC11B8C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "6517275C-EE88-439E-9D0E-ACEE554F251E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "7183B8C0-14A5-4889-95CF-B4EA1D2980E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "9B203B37-0C29-40D8-AFD0-4FDF733623A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "E2F16DF6-7967-43D3-BAC1-4C42E7FDC7FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.19:*:*:*:*:*:*:*", "matchCriteriaId": "26B37DDE-4652-400D-B2EA-E82AB8DC3622", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "EE56FE77-7BC5-4A31-8060-DDB1900F36CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.21:*:*:*:*:*:*:*", "matchCriteriaId": "A6531439-1B28-4D9D-B80A-E6BD66813B88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.22:*:*:*:*:*:*:*", "matchCriteriaId": "A7A8DCB0-8C09-48CC-8702-89AE3E88B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.23:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CF2D5-AC6A-46B0-A44C-ECB277BFB1DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.9.24:*:*:*:*:*:*:*", "matchCriteriaId": "059CD446-B89C-46CE-8706-536DB87D4E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*", "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*", "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*", "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*", "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*", "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*", "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*", "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*", "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*", "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*", "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:-:*:*:*:*:x64:*", "matchCriteriaId": "FD90DD84-C896-49DB-8E95-56453C59966D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array." }, { "lang": "es", "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, en plataformas de 64 bits de Linux, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado que desencadena un acceso fuera de l\u00edmites a una matriz." } ], "evaluatorImpact": "Per: http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html\r\n\r\n\"Linux 64-bit only\"", "id": "CVE-2012-5120", "lastModified": "2024-11-21T01:44:05.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-07T11:43:15.367", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://osvdb.org/87085" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/56413" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=150729" }, { "source": "chrome-cve-admin@google.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/87085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=150729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 31.0.1650.0 | ||
chrome | 31.0.1650.2 | ||
chrome | 31.0.1650.3 | ||
chrome | 31.0.1650.4 | ||
chrome | 31.0.1650.5 | ||
chrome | 31.0.1650.6 | ||
chrome | 31.0.1650.7 | ||
chrome | 31.0.1650.8 | ||
chrome | 31.0.1650.9 | ||
chrome | 31.0.1650.10 | ||
chrome | 31.0.1650.11 | ||
chrome | 31.0.1650.12 | ||
chrome | 31.0.1650.13 | ||
chrome | 31.0.1650.14 | ||
chrome | 31.0.1650.15 | ||
chrome | 31.0.1650.16 | ||
chrome | 31.0.1650.17 | ||
chrome | 31.0.1650.18 | ||
chrome | 31.0.1650.19 | ||
chrome | 31.0.1650.20 | ||
chrome | 31.0.1650.22 | ||
chrome | 31.0.1650.23 | ||
chrome | 31.0.1650.25 | ||
chrome | 31.0.1650.26 | ||
chrome | 31.0.1650.27 | ||
chrome | 31.0.1650.28 | ||
chrome | 31.0.1650.29 | ||
chrome | 31.0.1650.30 | ||
chrome | 31.0.1650.31 | ||
chrome | 31.0.1650.32 | ||
chrome | 31.0.1650.33 | ||
chrome | 31.0.1650.34 | ||
chrome | 31.0.1650.35 | ||
chrome | 31.0.1650.36 | ||
chrome | 31.0.1650.37 | ||
chrome | 31.0.1650.38 | ||
chrome | 31.0.1650.39 | ||
chrome | 31.0.1650.41 | ||
chrome | 31.0.1650.42 | ||
chrome | 31.0.1650.43 | ||
chrome | 31.0.1650.44 | ||
chrome | 31.0.1650.45 | ||
chrome | 31.0.1650.46 | ||
chrome | 31.0.1650.47 | ||
chrome | 31.0.1650.48 | ||
chrome | 31.0.1650.49 | ||
chrome | 31.0.1650.50 | ||
chrome | 31.0.1650.51 | ||
chrome | 31.0.1650.52 | ||
chrome | 31.0.1650.53 | ||
chrome | 31.0.1650.54 | ||
chrome | 31.0.1650.55 | ||
chrome | 31.0.1650.57 | ||
chrome | 31.0.1650.58 | ||
chrome | 31.0.1650.59 | ||
chrome | 31.0.1650.60 | ||
chrome | 31.0.1650.61 | ||
v8 | * | ||
v8 | 3.22.0 | ||
v8 | 3.22.1 | ||
v8 | 3.22.2 | ||
v8 | 3.22.3 | ||
v8 | 3.22.4 | ||
v8 | 3.22.5 | ||
v8 | 3.22.6 | ||
v8 | 3.22.7 | ||
v8 | 3.22.8 | ||
v8 | 3.22.9 | ||
v8 | 3.22.10 | ||
v8 | 3.22.11 | ||
v8 | 3.22.12 | ||
v8 | 3.22.13 | ||
v8 | 3.22.14 | ||
v8 | 3.22.15 | ||
v8 | 3.22.16 | ||
v8 | 3.22.17 | ||
v8 | 3.22.18 | ||
v8 | 3.22.19 | ||
v8 | 3.22.20 | ||
v8 | 3.22.21 | ||
v8 | 3.22.22 | ||
v8 | 3.22.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742", "versionEndIncluding": "31.0.1650.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*", "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*", "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*", "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*", "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*", "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*", "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*", "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*", "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*", "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*", "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*", "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*", "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*", "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*", "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*", "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*", "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*", "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*", "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*", "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*", "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*", "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*", "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*", "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*", "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*", "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*", "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*", "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*", "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*", "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*", "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*", "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*", "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*", "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*", "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*", "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*", "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*", "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*", "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*", "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*", "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*", "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*", "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*", "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*", "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*", "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*", "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*", "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*", "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*", "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*", "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*", "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*", "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*", "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2", "versionEndIncluding": "3.22.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*", "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*", "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*", "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*", "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*", "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*", "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*", "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*", "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*", "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*", "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*", "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*", "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*", "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*", "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*", "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*", "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en runtime.cc en Google V8 anteriores a 3.22.24.7, como se utiliza en Google Chrome anteriores a 31.0.1650.63, permite a atacantes remotos causar denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un array tipado grande, relacionado con las funciones (1) Runtime_TypedArrayInitialize y (2) Runtime_TypedArrayInitializeFromArrayLike." } ], "id": "CVE-2013-6638", "lastModified": "2024-11-21T01:59:25.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-07T00:55:03.977", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17800" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56216" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56217" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "cve@mitre.org", "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "cve@mitre.org", "url": "https://code.google.com/p/chromium/issues/detail?id=319722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=319722" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-10-15 10:59
Modified
2024-11-21 02:37
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3F7F275-A3CD-4A59-9DB4-F577D9DA2A31", "versionEndIncluding": "4.6.85.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "9908D930-D4BE-4D3A-8503-F162D72C51C2", "versionEndIncluding": "45.0.2454.101", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.6.85.23, como se utiliza en Google Chrome en versiones anteriores a 46.0.2490.71, permite a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-7834", "lastModified": "2024-11-21T02:37:29.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-15T10:59:12.170", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2770-1" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2770-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2770-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2770-2" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-08 10:55
Modified
2024-11-21 02:18
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "49217EEC-AE40-4FBD-A5D4-B4A323CD5645", "versionEndIncluding": "38.0.2125.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DE7D19C-F45D-4A89-8740-8F9D450093C3", "versionEndIncluding": "3.28.69", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.28.71.15, utilizado en Google Chrome anterior a 38.0.2125.101, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2014-7967", "lastModified": "2024-11-21T02:18:21.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-08T10:55:07.080", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2024-11-21 02:29
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
v8 | * | ||
debian | debian_linux | 8.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
canonical | ubuntu_linux | 15.04 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9", "versionEndIncluding": "4.2.77.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772", "versionEndIncluding": "42.0.2311.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.2.77.14, utilizado en Google Chrome anterior a 42.0.2311.90, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-3333", "lastModified": "2024-11-21T02:29:11.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-19T10:59:13.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "source": "cve@mitre.org", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74221" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-09 10:59
Modified
2024-11-21 02:32
Severity ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*", "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:iojs:io.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3188BB5-6918-455C-8D25-B4DBA22830D6", "versionEndIncluding": "1.8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FABEE90B-14C3-4147-BBDA-6E1186452174", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FF9263D-673F-40A4-8D40-56DE5AD63B73", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "52BE5478-4021-42D4-B101-A572AAE17DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2233DADC-4FBB-4459-AD8D-B15636DC5970", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "72CC13EF-7061-4833-A079-EAB70A32F64B", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BA4A14A1-1D14-4CE8-9198-80C1772A8AC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9D2B3E1-973D-46ED-ADE4-BECE0CAFD678", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "8261E351-8CB2-4BCB-AB75-9FDD96DC2BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:iojs:io.js:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C236FE4E-1FF0-47E5-91F9-75ADD6C61498", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BCBBCD4-2142-44B7-B3ED-6D2A301F85C6", "versionEndIncluding": "0.12.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence." }, { "lang": "es", "value": "La funci\u00f3n de Utf8DecoderBase::WriteUtf16Slow en unicode.decoder.cc en Google V8, al igual que como se usa en Node.js anterior a 0.12.6, io.js anterior a 1.8.3 y 2.x antes de 2.3.3 y otros productos, no verifica que haya memoria disponible para un par surrogado UTF-16, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la posibilidad de causar otro impacto a trav\u00e9s de una secuencia de bytes manipulada." } ], "id": "CVE-2015-5380", "lastModified": "2024-11-21T02:32:55.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-09T10:59:00.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75556" }, { "source": "cve@mitre.org", "url": "https://codereview.chromium.org/1226493003" }, { "source": "cve@mitre.org", "url": "https://github.com/joyent/node/issues/25583" }, { "source": "cve@mitre.org", "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1226493003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/joyent/node/issues/25583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-06 01:59
Modified
2024-11-21 02:38
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "C12CC8E6-3341-4505-99CF-384840C20815", "versionEndIncluding": "46.0.2490.86", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "698C18EC-5A8D-4F42-88A9-F2BCAA1B8EA3", "versionEndIncluding": "4.6.85.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.73, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-8478", "lastModified": "2024-11-21T02:38:37.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-12-06T01:59:25.437", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2825-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2825-1" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-03-29 10:59
Modified
2024-11-21 02:50
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
v8 | * | ||
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
opensuse | opensuse | 13.1 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684", "versionEndIncluding": "4.9.385", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E359098-BF8A-4A56-A152-DA06F18096B2", "versionEndIncluding": "49.0.2623.95", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.33, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.108, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2016-3679", "lastModified": "2024-11-21T02:50:29.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-03-29T10:59:05.147", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035423" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2955-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2955-1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-05-20 10:59
Modified
2024-11-21 02:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B54CC-8096-4708-840D-D8A8C09C7955", "versionEndIncluding": "4.3.61.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F238C75-E24A-406F-BEB5-8758C8FE9603", "versionEndIncluding": "42.0.2311.152", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.3.61.21, utilizado en Google Chrome anterior a 43.0.2357.65, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-3910", "lastModified": "2024-11-21T02:30:04.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-20T10:59:19.933", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/74730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74730" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-21 11:14
Modified
2024-11-21 02:07
Severity ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 20 | |
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
v8 | * | ||
v8 | 3.25.0 | ||
v8 | 3.25.1 | ||
v8 | 3.25.2 | ||
v8 | 3.25.3 | ||
v8 | 3.25.4 | ||
v8 | 3.25.5 | ||
v8 | 3.25.6 | ||
v8 | 3.25.7 | ||
v8 | 3.25.8 | ||
v8 | 3.25.9 | ||
v8 | 3.25.10 | ||
v8 | 3.25.11 | ||
v8 | 3.25.12 | ||
v8 | 3.25.13 | ||
v8 | 3.25.14 | ||
v8 | 3.25.15 | ||
v8 | 3.25.16 | ||
v8 | 3.25.17 | ||
v8 | 3.25.18 | ||
v8 | 3.25.19 | ||
v8 | 3.25.20 | ||
v8 | 3.25.21 | ||
v8 | 3.25.22 | ||
v8 | 3.25.23 | ||
v8 | 3.25.24 | ||
v8 | 3.25.25 | ||
v8 | 3.25.26 | ||
v8 | 3.25.27 | ||
chrome | * | ||
chrome | 35.0.1916.0 | ||
chrome | 35.0.1916.1 | ||
chrome | 35.0.1916.2 | ||
chrome | 35.0.1916.3 | ||
chrome | 35.0.1916.4 | ||
chrome | 35.0.1916.5 | ||
chrome | 35.0.1916.6 | ||
chrome | 35.0.1916.7 | ||
chrome | 35.0.1916.8 | ||
chrome | 35.0.1916.9 | ||
chrome | 35.0.1916.10 | ||
chrome | 35.0.1916.11 | ||
chrome | 35.0.1916.13 | ||
chrome | 35.0.1916.14 | ||
chrome | 35.0.1916.15 | ||
chrome | 35.0.1916.17 | ||
chrome | 35.0.1916.18 | ||
chrome | 35.0.1916.19 | ||
chrome | 35.0.1916.20 | ||
chrome | 35.0.1916.21 | ||
chrome | 35.0.1916.22 | ||
chrome | 35.0.1916.23 | ||
chrome | 35.0.1916.27 | ||
chrome | 35.0.1916.31 | ||
chrome | 35.0.1916.32 | ||
chrome | 35.0.1916.33 | ||
chrome | 35.0.1916.34 | ||
chrome | 35.0.1916.35 | ||
chrome | 35.0.1916.36 | ||
chrome | 35.0.1916.37 | ||
chrome | 35.0.1916.38 | ||
chrome | 35.0.1916.39 | ||
chrome | 35.0.1916.40 | ||
chrome | 35.0.1916.41 | ||
chrome | 35.0.1916.42 | ||
chrome | 35.0.1916.43 | ||
chrome | 35.0.1916.44 | ||
chrome | 35.0.1916.45 | ||
chrome | 35.0.1916.46 | ||
chrome | 35.0.1916.47 | ||
chrome | 35.0.1916.48 | ||
chrome | 35.0.1916.49 | ||
chrome | 35.0.1916.51 | ||
chrome | 35.0.1916.52 | ||
chrome | 35.0.1916.54 | ||
chrome | 35.0.1916.56 | ||
chrome | 35.0.1916.57 | ||
chrome | 35.0.1916.59 | ||
chrome | 35.0.1916.61 | ||
chrome | 35.0.1916.68 | ||
chrome | 35.0.1916.69 | ||
chrome | 35.0.1916.71 | ||
chrome | 35.0.1916.72 | ||
chrome | 35.0.1916.74 | ||
chrome | 35.0.1916.77 | ||
chrome | 35.0.1916.80 | ||
chrome | 35.0.1916.82 | ||
chrome | 35.0.1916.84 | ||
chrome | 35.0.1916.85 | ||
chrome | 35.0.1916.86 | ||
chrome | 35.0.1916.88 | ||
chrome | 35.0.1916.90 | ||
chrome | 35.0.1916.92 | ||
chrome | 35.0.1916.93 | ||
chrome | 35.0.1916.95 | ||
chrome | 35.0.1916.96 | ||
chrome | 35.0.1916.98 | ||
chrome | 35.0.1916.99 | ||
chrome | 35.0.1916.101 | ||
chrome | 35.0.1916.103 | ||
chrome | 35.0.1916.104 | ||
chrome | 35.0.1916.105 | ||
chrome | 35.0.1916.106 | ||
chrome | 35.0.1916.107 | ||
chrome | 35.0.1916.108 | ||
chrome | 35.0.1916.109 | ||
chrome | 35.0.1916.110 | ||
chrome | 35.0.1916.111 | ||
chrome | 35.0.1916.112 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9006307-BB0D-49C1-B7CE-B0C645BBB080", "versionEndIncluding": "3.25.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "D84A1139-B995-40F7-9424-EBE8487AE70F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE6480-321D-401F-9A6D-853D9B2F216E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA187E89-5530-4AE4-B486-8168C1D18D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*", "matchCriteriaId": "B2542143-7E41-475E-89B0-59E23B2447E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*", "matchCriteriaId": "ACA11334-CCBE-418E-B370-4C439401E17B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*", "matchCriteriaId": "F10BFBD8-385A-4419-AC0E-D64A4E4970A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*", "matchCriteriaId": "00BF91BB-623B-4134-A49D-45B86DBD5543", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*", "matchCriteriaId": "15EFB9BF-4E8A-489C-A5EA-1685A10F1AD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*", "matchCriteriaId": "1F95FABF-F383-4F63-9C33-E2DA3D20AB8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*", "matchCriteriaId": "9EF0583C-9FE8-4F59-9FEB-603BD3100277", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*", "matchCriteriaId": "ACD6EC4E-5E3D-453A-B258-658CB56BBA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*", "matchCriteriaId": "B8718DE2-ACA3-452D-901A-9F233C99B3AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*", "matchCriteriaId": "407BF16A-6CC9-4279-A819-2360EACF0976", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*", "matchCriteriaId": "61265FC3-47D2-4741-A6A7-10B7A7ACF4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*", "matchCriteriaId": "2B15C413-3BE0-49DE-9D20-0F01AF6F3C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*", "matchCriteriaId": "E4738D2F-7169-4FA9-91B8-938989276A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*", "matchCriteriaId": "4FF0108D-5E5F-4C6B-A0B1-F2D3CBC53C7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*", "matchCriteriaId": "44080621-DE3C-4E00-956E-D11B3D574ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*", "matchCriteriaId": "9F8B8D82-B3A6-45BA-AB06-40343653B63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*", "matchCriteriaId": "FD60808B-171A-49E8-9E0C-A75100426562", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*", "matchCriteriaId": "5ACC92F2-37F2-42C4-86EF-F747B6E2365E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*", "matchCriteriaId": "5165EFE3-1E24-4C21-86A3-9AE32308C13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*", "matchCriteriaId": "CE74725F-26B0-484B-9B57-0CE590BD554D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*", "matchCriteriaId": "960DA0A8-79F0-4283-A367-55D73CA64A64", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*", "matchCriteriaId": "4E7D7FB7-10AB-4291-8DC9-C6E4F9468E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*", "matchCriteriaId": "08BDE46A-6461-4E65-8B4B-89770494D191", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*", "matchCriteriaId": "7C6188C3-684A-402C-A369-BBE53681FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEA72B-EF8B-4421-BD43-E2F2566F725E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "24036B85-837E-46F1-8D2A-7B06E0657979", "versionEndIncluding": "35.0.1916.113", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7A8B66A-B3CA-44D4-8840-E544D95C5C55", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*", "matchCriteriaId": "4626CE7E-1135-43BB-A999-D9E9645F4F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*", "matchCriteriaId": "15B6A451-EF11-47B4-84E7-3EF2554717BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E5FCB33-E3B3-4CB5-8009-67EBAA2AF27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*", "matchCriteriaId": "825D51C2-BF0E-4A17-B07B-FBBE07FF3430", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*", "matchCriteriaId": "44AE8107-4530-48A9-BF3D-6CEEFFDE81DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*", "matchCriteriaId": "94744496-D0BE-4FAC-B0DE-40E2EF7D2967", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*", "matchCriteriaId": "D18C1D47-733C-4B51-9A04-253D06D20528", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*", "matchCriteriaId": "BC6B4DAE-315E-4D49-A4E2-169AE8C659AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E267532-0240-48B5-A8A7-D452DCE68545", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*", "matchCriteriaId": "B073B1B6-37FC-4481-A4A8-D859F9CAD0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*", "matchCriteriaId": "249F1026-0BEE-44FC-BA08-B18A67EC2D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*", "matchCriteriaId": "1D7BF63D-3561-4636-9D0F-5C029DE4FDE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*", "matchCriteriaId": "65DCFD8D-42CD-4E88-9B66-10D30390A029", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*", "matchCriteriaId": "E8B78C9F-2431-4BED-AE00-C9C6F49D91BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*", "matchCriteriaId": "6638F45A-3E2E-47A7-9E29-51BC80E821CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*", "matchCriteriaId": "97C21673-D3BE-4549-ADBE-86A8C544ACED", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*", "matchCriteriaId": "905CE4CB-23CE-46B3-AF25-8300A348D330", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*", "matchCriteriaId": "63D7D729-94F9-406F-9AD7-FD4830234FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*", "matchCriteriaId": "70B2C2C1-6D3C-416D-8BA2-8A1E8783260C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*", "matchCriteriaId": "4E4E3A0D-5FFD-49BB-B0DC-D966D4FEE656", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*", "matchCriteriaId": "B09378C5-9960-4DBA-BADF-75F59A670949", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*", "matchCriteriaId": "FB5DCFC6-4E56-4C8C-884C-DF1CB3BC7259", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*", "matchCriteriaId": "0BEB034A-ED1A-4692-BC3D-EC87204A6092", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*", "matchCriteriaId": "D7DC0366-8512-4679-9C01-92B894CB1E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*", "matchCriteriaId": "42440388-7439-407F-A753-77B5E196E764", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*", "matchCriteriaId": "08529C78-3AEF-4A48-B57A-A3AFD220E717", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*", "matchCriteriaId": "E4418F2D-F462-4E9B-BD09-12D24726BBAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*", "matchCriteriaId": "DC6B7553-A96D-48BC-A555-DB94EB630AAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*", "matchCriteriaId": "1B752A1B-08A6-4D76-9560-4B8287A43D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*", "matchCriteriaId": "2BD5AB04-7B94-4B00-907A-499A19176509", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*", "matchCriteriaId": "63AF805B-852D-412D-8B90-A4166041A0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*", "matchCriteriaId": "741566D6-E3E0-43E6-8B12-19C1CD77C213", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*", "matchCriteriaId": "D9BBD82A-39A6-4CC9-94FE-E3E81E0C06FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*", "matchCriteriaId": "F561EBB8-231D-481F-B109-CFEF3F010FC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*", "matchCriteriaId": "3495A795-48EA-4BE9-B6CF-DF934AE3EE1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*", "matchCriteriaId": "4097E83B-5E58-4E70-B1B6-533B97C6405A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*", "matchCriteriaId": "CF37D299-CB0F-4F94-BBFE-4C1C966A4AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*", "matchCriteriaId": "9965D997-4F96-48BF-94CE-BA471ADE2A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*", "matchCriteriaId": "ADDAB66F-038E-4955-81B7-A6E2157C0BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*", "matchCriteriaId": "F095537D-5045-4450-BCBF-4C93E6E042F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*", "matchCriteriaId": "710040CA-3DEF-484A-88FF-C44D17526B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*", "matchCriteriaId": "6E8B5FDF-5ABE-4A17-B956-FE7CC3F3F1AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*", "matchCriteriaId": "5434C6FD-3C1C-4272-9D8F-5F7AB8E68046", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*", "matchCriteriaId": "5F907549-BEA6-46C7-A528-7E97A8655595", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*", "matchCriteriaId": "C66DBB18-CA4B-439E-8D2E-8E5E6A42CF62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E24A976-B366-412C-8635-CD65687C3A0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*", "matchCriteriaId": "717CD257-B2A1-4DE6-83BA-6CE0F58B1B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*", "matchCriteriaId": "66BE9002-9D3A-4D58-A032-1E35364FAFD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*", "matchCriteriaId": "313D6BBA-A159-47DA-97E9-CE63AD1DEBF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*", "matchCriteriaId": "0576D407-07F9-4163-8937-8D85974918A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*", "matchCriteriaId": "72F45D58-425C-4ABB-ADD3-2BBADA74A19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*", "matchCriteriaId": "FC63BF1F-DB9F-4C4E-8460-40A801084020", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3D4FD-9707-4B18-96CE-D7CF7EA5F881", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*", "matchCriteriaId": "694FBD5C-32E7-4E99-9BDD-8CE8E5D45CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*", "matchCriteriaId": "CF7E21C9-50F7-44A3-B642-4BFF4699EBD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*", "matchCriteriaId": "AE68628B-FEBF-4A75-99C6-C6FA76A5989E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*", "matchCriteriaId": "6755C15D-08BD-47DA-B363-6F31F7DE5923", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*", "matchCriteriaId": "FDF01221-5CE0-4559-83E6-3273D573F0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*", "matchCriteriaId": "061A50AD-9D9F-44CA-867B-2E10B9282CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*", "matchCriteriaId": "587440DE-F09E-4789-9B58-4FCDCBFA431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*", "matchCriteriaId": "A3F1FFDF-509C-4608-9538-EFF07A5031C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*", "matchCriteriaId": "5CE0FDEC-2FDB-4902-9904-F2F9E2E6226E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*", "matchCriteriaId": "05F34690-1EFA-49D3-91B7-E3BD0B3D7056", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*", "matchCriteriaId": "44578154-8DFF-4EC7-834C-B54FD6149B91", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*", "matchCriteriaId": "D2C2D488-342C-4CAC-A07D-2C198465BC32", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*", "matchCriteriaId": "D1D63F62-CC1E-43CF-B1D6-192492796862", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*", "matchCriteriaId": "B5366995-F5FD-4F6E-BFB7-D1E61E52B9DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*", "matchCriteriaId": "CF55EAB7-A108-4B80-A969-D07A2EDA6184", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*", "matchCriteriaId": "17E16492-4A75-474C-9DEA-B150763843B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*", "matchCriteriaId": "E431FC69-6C1B-475D-B646-FFB2210C438B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*", "matchCriteriaId": "1FA8FBB0-1004-40C2-AADD-4DE09CFE9326", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*", "matchCriteriaId": "CF6CF0AA-AEBE-48FD-A83B-D9ADC25C323F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*", "matchCriteriaId": "1C6EC014-5EB1-4C19-B828-5DBA6A525194", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*", "matchCriteriaId": "8E90CAB9-09DE-462B-96E4-4FAEC5642F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*", "matchCriteriaId": "2B3CF5D9-E8DE-4751-A873-A3A6769BC19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*", "matchCriteriaId": "B86895A1-98A7-46C8-8E52-889CB34EEEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*", "matchCriteriaId": "3E52314C-CB22-4702-8108-F855CEC349D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*", "matchCriteriaId": "379EB1A9-61DB-4A31-8568-DFB5BA3EE610", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value." }, { "lang": "es", "value": "Desbordamiento de enteros en la funci\u00f3n LCodeGen::PrepareKeyedOperand en arm/lithium-codegen-arm.cc en Google V8 anterior a 3.25.28.16, utilizado en Google Chrome anterior a 35.0.1916.114, permite a atacantes remotos causar una denegaci\u00f3n de servicios o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un valor de clave negativo." } ], "id": "CVE-2014-3152", "lastModified": "2024-11-21T02:07:32.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-21T11:14:09.990", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/58920" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/59155" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/60372" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2014/dsa-2939" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1030270" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=358057" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/v8/source/detail?r=20363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=358057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/v8/source/detail?r=20363" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-03-06 02:59
Modified
2024-11-21 02:48
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "99CABF0F-D201-46AE-83DC-09257264BF7D", "versionEndIncluding": "48.0.2564.116", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684", "versionEndIncluding": "4.9.385", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.26, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.75, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2016-2843", "lastModified": "2024-11-21T02:48:55.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-03-06T02:59:13.850", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035185" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2920-1" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-22 22:59
Modified
2024-11-21 02:25
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chromium | chromium | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
v8 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "B248CC65-0394-4432-9520-52E99C17EA4A", "versionEndIncluding": "40.0.2214.85", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chromium:chromium:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BF18F88-88CC-44C7-8695-B37D0AE88DF7", "versionEndIncluding": "40.0.2214.94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5024444-F7D4-4EE4-9555-BCD1EFE49083", "versionEndIncluding": "3.30.33.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.30.33.15,usado en Google Chrome anterior a 40.0.2214.91, permite a atacantes causar una denegaci\u00f3n de servicio o la posibilidad de tener otro impacto a trav\u00e9s de vectores no conocidos." } ], "id": "CVE-2015-1346", "lastModified": "2024-11-21T02:25:13.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-22T22:59:29.520", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62383" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62575" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031623" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2024-11-21 01:44
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 23.0.1271.0 | ||
chrome | 23.0.1271.1 | ||
chrome | 23.0.1271.2 | ||
chrome | 23.0.1271.3 | ||
chrome | 23.0.1271.4 | ||
chrome | 23.0.1271.5 | ||
chrome | 23.0.1271.6 | ||
chrome | 23.0.1271.7 | ||
chrome | 23.0.1271.8 | ||
chrome | 23.0.1271.9 | ||
chrome | 23.0.1271.10 | ||
chrome | 23.0.1271.11 | ||
chrome | 23.0.1271.12 | ||
chrome | 23.0.1271.13 | ||
chrome | 23.0.1271.14 | ||
chrome | 23.0.1271.15 | ||
chrome | 23.0.1271.16 | ||
chrome | 23.0.1271.17 | ||
chrome | 23.0.1271.18 | ||
chrome | 23.0.1271.19 | ||
chrome | 23.0.1271.20 | ||
chrome | 23.0.1271.21 | ||
chrome | 23.0.1271.22 | ||
chrome | 23.0.1271.23 | ||
chrome | 23.0.1271.24 | ||
chrome | 23.0.1271.26 | ||
chrome | 23.0.1271.30 | ||
chrome | 23.0.1271.31 | ||
chrome | 23.0.1271.32 | ||
chrome | 23.0.1271.33 | ||
chrome | 23.0.1271.35 | ||
chrome | 23.0.1271.36 | ||
chrome | 23.0.1271.37 | ||
chrome | 23.0.1271.38 | ||
chrome | 23.0.1271.39 | ||
chrome | 23.0.1271.40 | ||
chrome | 23.0.1271.41 | ||
chrome | 23.0.1271.44 | ||
chrome | 23.0.1271.45 | ||
chrome | 23.0.1271.46 | ||
chrome | 23.0.1271.49 | ||
chrome | 23.0.1271.50 | ||
chrome | 23.0.1271.51 | ||
chrome | 23.0.1271.52 | ||
chrome | 23.0.1271.53 | ||
chrome | 23.0.1271.54 | ||
chrome | 23.0.1271.55 | ||
chrome | 23.0.1271.56 | ||
chrome | 23.0.1271.57 | ||
chrome | 23.0.1271.58 | ||
chrome | 23.0.1271.59 | ||
chrome | 23.0.1271.60 | ||
chrome | 23.0.1271.61 | ||
v8 | * | ||
v8 | 1.0 | ||
v8 | 3.12.0 | ||
v8 | 3.12.1 | ||
v8 | 3.12.2 | ||
v8 | 3.12.3 | ||
v8 | 3.12.4 | ||
v8 | 3.12.5 | ||
v8 | 3.12.6 | ||
v8 | 3.12.7 | ||
v8 | 3.12.8 | ||
v8 | 3.12.9 | ||
v8 | 3.12.10 | ||
v8 | 3.12.11 | ||
v8 | 3.12.12 | ||
v8 | 3.12.13 | ||
v8 | 3.12.14 | ||
v8 | 3.12.15 | ||
v8 | 3.12.16 | ||
v8 | 3.12.17 | ||
v8 | 3.12.18 | ||
v8 | 3.12.19 | ||
v8 | 3.13.0 | ||
v8 | 3.13.1 | ||
v8 | 3.13.2 | ||
v8 | 3.13.3 | ||
v8 | 3.13.4 | ||
v8 | 3.13.5 | ||
v8 | 3.13.6 | ||
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032", "versionEndIncluding": "23.0.1271.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*", "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*", "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*", "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*", "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*", "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*", "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*", "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*", "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*", "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*", "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*", "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*", "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*", "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*", "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*", "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*", "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*", "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*", "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*", "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*", "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*", "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*", "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*", "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*", "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*", "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*", "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*", "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*", "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*", "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*", "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*", "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*", "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*", "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*", "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*", "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*", "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*", "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*", "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*", "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*", "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*", "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*", "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*", "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*", "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*", "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*", "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*", "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*", "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*", "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E", "versionEndIncluding": "3.13.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*", "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*", "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*", "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*", "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*", "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*", "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*", "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*", "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors." }, { "lang": "es", "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, no lleva a cabo adecuadamente todas las operaciones de escritura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-5128", "lastModified": "2024-11-21T01:44:06.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-07T11:43:16.053", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://osvdb.org/87081" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/56413" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=157124" }, { "source": "chrome-cve-admin@google.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/87081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=157124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-01-15 21:55
Modified
2024-11-21 01:48
Severity ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 24.0.1272.0 | ||
chrome | 24.0.1272.1 | ||
chrome | 24.0.1273.0 | ||
chrome | 24.0.1274.0 | ||
chrome | 24.0.1275.0 | ||
chrome | 24.0.1276.0 | ||
chrome | 24.0.1276.1 | ||
chrome | 24.0.1277.0 | ||
chrome | 24.0.1278.0 | ||
chrome | 24.0.1279.0 | ||
chrome | 24.0.1280.0 | ||
chrome | 24.0.1281.0 | ||
chrome | 24.0.1281.1 | ||
chrome | 24.0.1281.2 | ||
chrome | 24.0.1281.3 | ||
chrome | 24.0.1282.0 | ||
chrome | 24.0.1283.0 | ||
chrome | 24.0.1284.0 | ||
chrome | 24.0.1284.1 | ||
chrome | 24.0.1284.2 | ||
chrome | 24.0.1285.0 | ||
chrome | 24.0.1285.1 | ||
chrome | 24.0.1285.2 | ||
chrome | 24.0.1286.0 | ||
chrome | 24.0.1286.1 | ||
chrome | 24.0.1287.0 | ||
chrome | 24.0.1287.1 | ||
chrome | 24.0.1288.0 | ||
chrome | 24.0.1288.1 | ||
chrome | 24.0.1289.0 | ||
chrome | 24.0.1289.1 | ||
chrome | 24.0.1290.0 | ||
chrome | 24.0.1290.1 | ||
chrome | 24.0.1290.2 | ||
chrome | 24.0.1291.0 | ||
chrome | 24.0.1291.1 | ||
chrome | 24.0.1292.0 | ||
chrome | 24.0.1292.1 | ||
chrome | 24.0.1293.0 | ||
chrome | 24.0.1294.0 | ||
chrome | 24.0.1295.0 | ||
chrome | 24.0.1296.0 | ||
chrome | 24.0.1296.1 | ||
chrome | 24.0.1297.0 | ||
chrome | 24.0.1298.0 | ||
chrome | 24.0.1298.1 | ||
chrome | 24.0.1299.0 | ||
chrome | 24.0.1300.0 | ||
chrome | 24.0.1301.0 | ||
chrome | 24.0.1301.1 | ||
chrome | 24.0.1301.2 | ||
chrome | 24.0.1302.0 | ||
chrome | 24.0.1303.0 | ||
chrome | 24.0.1304.0 | ||
chrome | 24.0.1304.1 | ||
chrome | 24.0.1305.0 | ||
chrome | 24.0.1305.1 | ||
chrome | 24.0.1305.2 | ||
chrome | 24.0.1305.3 | ||
chrome | 24.0.1305.4 | ||
chrome | 24.0.1306.0 | ||
chrome | 24.0.1306.1 | ||
chrome | 24.0.1307.0 | ||
chrome | 24.0.1307.1 | ||
chrome | 24.0.1308.0 | ||
chrome | 24.0.1309.0 | ||
chrome | 24.0.1310.0 | ||
chrome | 24.0.1311.0 | ||
chrome | 24.0.1311.1 | ||
chrome | 24.0.1312.0 | ||
chrome | 24.0.1312.1 | ||
chrome | 24.0.1312.2 | ||
chrome | 24.0.1312.3 | ||
chrome | 24.0.1312.4 | ||
chrome | 24.0.1312.5 | ||
chrome | 24.0.1312.6 | ||
chrome | 24.0.1312.7 | ||
chrome | 24.0.1312.8 | ||
chrome | 24.0.1312.9 | ||
chrome | 24.0.1312.10 | ||
chrome | 24.0.1312.11 | ||
chrome | 24.0.1312.12 | ||
chrome | 24.0.1312.13 | ||
chrome | 24.0.1312.14 | ||
chrome | 24.0.1312.15 | ||
chrome | 24.0.1312.16 | ||
chrome | 24.0.1312.17 | ||
chrome | 24.0.1312.18 | ||
chrome | 24.0.1312.19 | ||
chrome | 24.0.1312.20 | ||
chrome | 24.0.1312.21 | ||
chrome | 24.0.1312.22 | ||
chrome | 24.0.1312.23 | ||
chrome | 24.0.1312.24 | ||
chrome | 24.0.1312.25 | ||
chrome | 24.0.1312.26 | ||
chrome | 24.0.1312.27 | ||
chrome | 24.0.1312.28 | ||
chrome | 24.0.1312.29 | ||
chrome | 24.0.1312.30 | ||
chrome | 24.0.1312.31 | ||
chrome | 24.0.1312.32 | ||
chrome | 24.0.1312.33 | ||
chrome | 24.0.1312.34 | ||
chrome | 24.0.1312.35 | ||
chrome | 24.0.1312.36 | ||
chrome | 24.0.1312.37 | ||
chrome | 24.0.1312.38 | ||
chrome | 24.0.1312.39 | ||
chrome | 24.0.1312.40 | ||
chrome | 24.0.1312.41 | ||
chrome | 24.0.1312.42 | ||
chrome | 24.0.1312.43 | ||
chrome | 24.0.1312.44 | ||
chrome | 24.0.1312.45 | ||
chrome | 24.0.1312.46 | ||
chrome | 24.0.1312.47 | ||
chrome | 24.0.1312.48 | ||
chrome | 24.0.1312.49 | ||
chrome | 24.0.1312.50 | ||
v8 | * | ||
v8 | 1.0 | ||
v8 | 2.4.0 | ||
v8 | 2.4.1 | ||
v8 | 2.4.2 | ||
v8 | 2.4.3 | ||
v8 | 2.4.4 | ||
v8 | 2.4.5 | ||
v8 | 2.4.6 | ||
v8 | 2.4.7 | ||
v8 | 2.4.8 | ||
v8 | 2.4.9 | ||
v8 | 2.5.0 | ||
v8 | 2.5.1 | ||
v8 | 2.5.2 | ||
v8 | 2.5.3 | ||
v8 | 2.5.4 | ||
v8 | 2.5.5 | ||
v8 | 2.5.6 | ||
v8 | 2.5.7 | ||
v8 | 2.5.8 | ||
v8 | 2.5.9 | ||
v8 | 3.0.0 | ||
v8 | 3.0.1 | ||
v8 | 3.0.2 | ||
v8 | 3.0.3 | ||
v8 | 3.0.4 | ||
v8 | 3.0.5 | ||
v8 | 3.0.6 | ||
v8 | 3.0.7 | ||
v8 | 3.0.8 | ||
v8 | 3.0.9 | ||
v8 | 3.0.10 | ||
v8 | 3.0.11 | ||
v8 | 3.0.12 | ||
v8 | 3.1.0 | ||
v8 | 3.1.1 | ||
v8 | 3.1.2 | ||
v8 | 3.1.3 | ||
v8 | 3.1.4 | ||
v8 | 3.1.5 | ||
v8 | 3.1.6 | ||
v8 | 3.1.7 | ||
v8 | 3.1.8 | ||
v8 | 3.10.0 | ||
v8 | 3.10.1 | ||
v8 | 3.10.2 | ||
v8 | 3.10.3 | ||
v8 | 3.10.4 | ||
v8 | 3.10.5 | ||
v8 | 3.10.6 | ||
v8 | 3.10.7 | ||
v8 | 3.10.8 | ||
v8 | 3.11.0 | ||
v8 | 3.11.1 | ||
v8 | 3.11.2 | ||
v8 | 3.11.3 | ||
v8 | 3.11.4 | ||
v8 | 3.11.5 | ||
v8 | 3.11.6 | ||
v8 | 3.11.7 | ||
v8 | 3.11.8 | ||
v8 | 3.11.9 | ||
v8 | 3.11.10 | ||
v8 | 3.12.0 | ||
v8 | 3.12.1 | ||
v8 | 3.12.2 | ||
v8 | 3.12.3 | ||
v8 | 3.12.4 | ||
v8 | 3.12.5 | ||
v8 | 3.12.6 | ||
v8 | 3.12.7 | ||
v8 | 3.12.8 | ||
v8 | 3.12.9 | ||
v8 | 3.12.10 | ||
v8 | 3.12.11 | ||
v8 | 3.12.12 | ||
v8 | 3.12.13 | ||
v8 | 3.12.14 | ||
v8 | 3.12.15 | ||
v8 | 3.12.16 | ||
v8 | 3.12.17 | ||
v8 | 3.12.18 | ||
v8 | 3.12.19 | ||
v8 | 3.13.0 | ||
v8 | 3.13.1 | ||
v8 | 3.13.2 | ||
v8 | 3.13.3 | ||
v8 | 3.13.4 | ||
v8 | 3.13.5 | ||
v8 | 3.13.6 | ||
v8 | 3.13.7 | ||
v8 | 3.13.7.5 | ||
v8 | 3.14.0 | ||
v8 | 3.14.1 | ||
v8 | 3.14.2 | ||
v8 | 3.14.3 | ||
v8 | 3.14.4 | ||
opensuse | opensuse | 12.1 | |
opensuse | opensuse | 12.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BACC18D7-0CBD-403E-ADF6-346FF310201C", "versionEndIncluding": "24.0.1312.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D5B6148-A65D-4B54-97D2-80C955DFB7BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*", "matchCriteriaId": "0733FF37-E04B-47BC-B494-589907245D84", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*", "matchCriteriaId": "5933EFF8-0F3E-4BFB-863D-8E91E7ABAB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*", "matchCriteriaId": "71206885-9BAD-4AAD-853D-08734B925D46", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*", "matchCriteriaId": "FBE5F777-C936-478F-A270-46174F4D59D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*", "matchCriteriaId": "519386D0-AEBF-40B1-87C6-475FBCF0E9A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*", "matchCriteriaId": "10EF13A2-4F0D-45AE-B0B1-90A07A00DE07", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*", "matchCriteriaId": "41E9A849-9E6D-4C69-B58B-82F4A7291518", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*", "matchCriteriaId": "555CFBE3-5706-4638-83DE-9FDB42775796", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*", "matchCriteriaId": "E4000589-5978-4145-8BEA-541A25E11A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6193DA2-0A92-46F4-AB30-AB8324F086CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF624555-3DAD-4785-9CA7-11123ECCC4F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*", "matchCriteriaId": "24E998F6-6DCD-480E-BEE6-C6E2D610991E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*", "matchCriteriaId": "ACA439D7-9BDC-4CEB-B216-56DE42E43FF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF9E13AA-587C-4D97-B96D-94E4F3B8B47A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0D10760-2B34-4571-A797-A9A37D3DC54F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*", "matchCriteriaId": "49F58480-76E1-4AE9-88C9-B36AF1B7BCC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F45B9B0-4849-4B98-A3D2-21264A581E62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B715500-15C6-4976-83B3-4556AEDE48F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4ECD4FD-37A0-4EDB-9D0C-5EC08CC5735E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*", "matchCriteriaId": "391AE318-EFCF-4126-93E4-D3C3FABDF550", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0B4DB5E-E7C5-4451-88F6-865BFA55F222", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A4F0CE9-6147-4BA0-9D95-630CB31D1D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*", "matchCriteriaId": "968B45A4-88EF-4AEF-AAFC-AF098568765E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*", "matchCriteriaId": "70F824E6-FD16-45A4-9A7B-D411B4EB028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*", "matchCriteriaId": "0964F31E-6337-43CC-B770-A824B2622AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE987D92-9DD5-4487-8AD2-C90123F9FBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC5E7FAB-764B-4320-AB85-BCEB86584B88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF5AB013-3BCE-469C-A5A3-F912894ACFC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A0C8072-3CE9-4AF8-8F11-592BABEE5A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AFD890B-C22E-417E-B809-9DF9BCF94914", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9E4CE-9F35-4C51-9BD4-59C07605CEFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*", "matchCriteriaId": "94BCB3DF-A626-43E3-B7E1-561B0BC74144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FFD00C3-EEAC-4E5F-A819-D5FFEFD94782", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*", "matchCriteriaId": "842D5CCF-1F5E-49F4-8E56-2D01C85E0293", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*", "matchCriteriaId": "0FFB9B44-FF61-4C42-BC5D-724841E92231", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*", "matchCriteriaId": "838E694E-4BDD-4282-B56F-621438D395C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E41E28F-4D3B-4687-948B-64599B01077F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6A0CF99-430D-459D-AE27-0DF95BC17699", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4B0AD98-B4B7-41DA-B718-99CA9051165A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A4CF329-7CC6-4926-98FB-C0A0FEED683B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*", "matchCriteriaId": "D89E7CB5-D647-49E8-81F2-4B86C9571861", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*", "matchCriteriaId": "249EDC4D-481D-467E-8518-107C08A4EBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*", "matchCriteriaId": "9141CAF4-096E-448C-A056-62D8C7EC608F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*", "matchCriteriaId": "C33DA6C9-2389-4AC1-9ADE-1EED5F476E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*", "matchCriteriaId": "D03843DD-1147-46FF-85E5-7E040D4815F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2E4D98A-1FDE-4852-BCFE-31E9E4A3C09E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*", "matchCriteriaId": "4786F4BC-CD98-487F-A31D-8B55592D7C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*", "matchCriteriaId": "3801F9E4-329F-4700-AB0B-9208923C375D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*", "matchCriteriaId": "A9CD1B9D-E446-47DC-889B-29DDB2D4F28D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1B0BB4F-80B4-4DC0-B763-3C5E92066CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6920B80-BC9E-4217-AA37-4136EB86F32F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*", "matchCriteriaId": "626F8FB4-7165-42C1-90AC-64ECAE0F0A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B0A8316-668D-4DF7-BB56-E6D76239C833", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA612AE3-D28F-49CE-8573-636BC54D3969", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3E67CAC-FED4-433D-B350-DC77D83F4E62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB334A25-0DCE-49ED-AADF-CA44645E99DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF27EE64-4654-4AB7-8ABB-B57AE6B9FFC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*", "matchCriteriaId": "D368FE5A-139E-4930-8361-A0EFFCD1E74F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*", "matchCriteriaId": "2CBB2D4E-B856-42B2-85A1-5A0DB491A605", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D27E4F9-A42D-4364-8864-506F772A7431", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*", "matchCriteriaId": "46BEE7CE-FAA8-4C2B-BCD7-09C336F7FC19", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9A123B9-C4DB-406F-B934-2A896C7AAB43", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE8F018-3CBA-43AA-991E-0E8A42965846", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB1051D8-1827-4255-9317-840DC7570978", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*", "matchCriteriaId": "6544BEB1-AD9C-46E7-8E41-9D8D7C1E13A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*", "matchCriteriaId": "241D1EB2-4003-446F-9988-F6AC3FD64705", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*", "matchCriteriaId": "634F8D3D-930E-46D1-80E9-6015EA9FECD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F4A9FFA-1576-4175-9BD6-CF975EC72847", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5C2901C-19CA-402A-A937-31D6B5B049CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E5255EB-9182-4A76-9E5B-39EFE8D86024", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0230123-D8AD-41B3-918E-FB14A3D60E33", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*", "matchCriteriaId": "EBD797B6-634C-4969-9014-E9540077ED17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*", "matchCriteriaId": "2179C71A-9E71-4CF5-B71E-D51C9E14FE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*", "matchCriteriaId": "4D589505-B631-46A3-8E10-F9FE60BEEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*", "matchCriteriaId": "FEF94139-56C8-491D-B7D8-FC560631B654", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*", "matchCriteriaId": "241AC9EF-E3D8-4B87-93CD-31F5E3AAFE1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*", "matchCriteriaId": "82ED399B-C35D-4424-9B9D-215181027616", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*", "matchCriteriaId": "7738DF62-67D8-480A-AEAE-22A8EA2D4012", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*", "matchCriteriaId": "714B6660-0D0A-4651-88D7-2D562C330054", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*", "matchCriteriaId": "B00BDDF2-E8E6-46A2-AF3F-04A7805A9BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*", "matchCriteriaId": "9C39AF29-9BB8-42F0-A5CE-00A19CD82317", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*", "matchCriteriaId": "4436A9ED-A5C9-4F52-90AC-294A9DB7C58A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*", "matchCriteriaId": "17BAD98B-D29B-446E-BEBE-5D1B91CB318E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*", "matchCriteriaId": "B37FF867-B515-4207-9FD2-E209B66E4D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*", "matchCriteriaId": "635B73E6-6430-4345-BD9D-427441CAA540", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*", "matchCriteriaId": "24B35C80-44D7-4D29-9CB7-F60CC0E08359", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*", "matchCriteriaId": "AD4FC844-D8D5-49AA-A037-0DEEA1C2D0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*", "matchCriteriaId": "CDB01647-2D5F-4EC8-AD8D-053C713C3301", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*", "matchCriteriaId": "470CC69D-BDD6-43C8-BC4D-EB57C59F372E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*", "matchCriteriaId": "492DA7A2-7B03-4151-990D-9E3352EFDADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*", "matchCriteriaId": "ACDCC9AC-4EFE-4647-A2B3-0545FE861747", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*", "matchCriteriaId": "8E435677-3D60-408F-965B-C3B6F46C465C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*", "matchCriteriaId": "67CFAD31-FC08-4B1A-81F7-356B4B9D1ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*", "matchCriteriaId": "A145852B-3183-4F76-A814-C667AB5B4EFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A6DD0-A396-4DCB-A52C-E8F3F437AD60", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*", "matchCriteriaId": "AC2B7A7F-868F-4BBE-B660-9D07E3C0A520", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*", "matchCriteriaId": "F925CFC2-9537-47CB-99B1-7EB9F2AE6714", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*", "matchCriteriaId": "E1A00047-81A5-43AA-B088-F39B98582543", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*", "matchCriteriaId": "A57EEC91-3D36-4EDF-A77A-1ED1EE980A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*", "matchCriteriaId": "A20B3E7E-BEA0-4ED1-A869-A31763DADE40", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*", "matchCriteriaId": "505E2084-13BC-4C30-BD66-AC0474893767", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*", "matchCriteriaId": "F2391E91-C96C-427B-95DF-448E5508FCD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE1CB147-0260-41AF-AB00-C7A13310BF54", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*", "matchCriteriaId": "2631DFBE-E561-4040-B694-ACDD4CBA9EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*", "matchCriteriaId": "CE4C0DF0-B6C0-42D2-86B4-085EB67F48DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*", "matchCriteriaId": "DD05827D-6FDB-458E-9731-F6EE2AA1F5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*", "matchCriteriaId": "44161E2D-6F55-48D6-AB39-8CA7CBE1244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*", "matchCriteriaId": "71BCFF0B-C3ED-48DC-A5B1-264DFD5CFA26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*", "matchCriteriaId": "9C3CADED-24BC-4C64-9D56-218B663D4B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*", "matchCriteriaId": "DD93B2D8-9576-499F-A605-FA9482F9A374", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*", "matchCriteriaId": "D03E0A1E-1AAC-43BF-940C-229D5E1E5602", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*", "matchCriteriaId": "1F2E0C70-49DD-4AA5-8F3C-028D1B4C2EC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*", "matchCriteriaId": "1112199E-1E45-4A44-B0D2-AB98D8BB8F2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6D0D9-A0DE-414E-95BF-F6695176D2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*", "matchCriteriaId": "9083D717-088D-46C8-A950-AD7760219234", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*", "matchCriteriaId": "222F30BC-8C6C-42B8-BAFF-FFF0365A018A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*", "matchCriteriaId": "06AA0CBA-CFE3-412A-8F1C-AC65108E3A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*", "matchCriteriaId": "2919EA8B-CD6C-4F8B-91BC-0E9BB8EB2493", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*", "matchCriteriaId": "A9328EDE-6345-4F65-AC56-4A0035083E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "238293ED-469D-457C-A048-60B9B880B9DF", "versionEndIncluding": "3.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*", "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*", "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*", "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*", "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*", "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*", "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*", "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*", "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*", "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*", "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.7:*:*:*:*:*:*:*", "matchCriteriaId": "315A6CEA-0BAB-4F6D-9398-90D05FDA8D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.13.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "7447D1C7-E33C-4E4F-B101-641FCEF01C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "407FA5B6-5156-472C-BF9F-7BD9EB4B0AFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BB8DC11-511B-4222-A4E2-5DE1CEA665EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "C658C0B1-3917-4E87-84C4-97D02EC35C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "59E0854A-F022-4CD8-8E5E-309A323687AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "B74EEFE5-A523-41BF-A5D0-586466C0A706", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code." }, { "lang": "es", "value": "Google V8 antes de v3.14.5.3, tal como se utiliza en Google Chrome antes v24.0.1312.52, no implementa correctamente la recolecci\u00f3n de basura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado." } ], "id": "CVE-2013-0836", "lastModified": "2024-11-21T01:48:17.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-01-15T21:55:02.260", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=150545" }, { "source": "chrome-cve-admin@google.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=150545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Severity ?
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 42.1 | |
opensuse | opensuse | 13.2 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
suse | linux_enterprise | 12.0 | |
v8 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23", "versionEndIncluding": "50.0.2661.102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC5CA67-5637-4AD0-923D-678947667D6E", "versionEndIncluding": "5.1.281", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\"" }, { "lang": "es", "value": "uri.js en Google V8 en versiones anteriores a 5.1.281.26, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, usa un tipo de matriz incorrecto, lo que permite a atacantes remotos obtener informaci\u00f3n sensible llamando a la funci\u00f3n decodeURI y aprovechando \"confusi\u00f3n de tipo\"." } ], "id": "CVE-2016-1677", "lastModified": "2024-11-21T02:46:52.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-05T23:59:05.927", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1936083002" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/602970" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201607-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1936083002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/602970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201607-07" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-30 01:55
Modified
2024-11-21 01:33
Severity ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js." }, { "lang": "es", "value": "Google V8 calcula los valores hash de los par\u00e1metros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante el env\u00edo de gran cantidad de par\u00e1metros a mano, como lo demuestran los ataques contra Node.js." } ], "id": "CVE-2011-5037", "lastModified": "2024-11-21T01:33:28.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-30T01:55:01.733", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "cve@mitre.org", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 31.0.1650.0 | ||
chrome | 31.0.1650.2 | ||
chrome | 31.0.1650.3 | ||
chrome | 31.0.1650.4 | ||
chrome | 31.0.1650.5 | ||
chrome | 31.0.1650.6 | ||
chrome | 31.0.1650.7 | ||
chrome | 31.0.1650.8 | ||
chrome | 31.0.1650.9 | ||
chrome | 31.0.1650.10 | ||
chrome | 31.0.1650.11 | ||
chrome | 31.0.1650.12 | ||
chrome | 31.0.1650.13 | ||
chrome | 31.0.1650.14 | ||
chrome | 31.0.1650.15 | ||
chrome | 31.0.1650.16 | ||
chrome | 31.0.1650.17 | ||
chrome | 31.0.1650.18 | ||
chrome | 31.0.1650.19 | ||
chrome | 31.0.1650.20 | ||
chrome | 31.0.1650.22 | ||
chrome | 31.0.1650.23 | ||
chrome | 31.0.1650.25 | ||
chrome | 31.0.1650.26 | ||
chrome | 31.0.1650.27 | ||
chrome | 31.0.1650.28 | ||
chrome | 31.0.1650.29 | ||
chrome | 31.0.1650.30 | ||
chrome | 31.0.1650.31 | ||
chrome | 31.0.1650.32 | ||
chrome | 31.0.1650.33 | ||
chrome | 31.0.1650.34 | ||
chrome | 31.0.1650.35 | ||
chrome | 31.0.1650.36 | ||
chrome | 31.0.1650.37 | ||
chrome | 31.0.1650.38 | ||
chrome | 31.0.1650.39 | ||
chrome | 31.0.1650.41 | ||
chrome | 31.0.1650.42 | ||
chrome | 31.0.1650.43 | ||
chrome | 31.0.1650.44 | ||
chrome | 31.0.1650.45 | ||
chrome | 31.0.1650.46 | ||
chrome | 31.0.1650.47 | ||
chrome | 31.0.1650.48 | ||
chrome | 31.0.1650.49 | ||
chrome | 31.0.1650.50 | ||
chrome | 31.0.1650.51 | ||
chrome | 31.0.1650.52 | ||
chrome | 31.0.1650.53 | ||
chrome | 31.0.1650.54 | ||
chrome | 31.0.1650.55 | ||
chrome | 31.0.1650.57 | ||
chrome | 31.0.1650.58 | ||
chrome | 31.0.1650.59 | ||
chrome | 31.0.1650.60 | ||
chrome | 31.0.1650.61 | ||
v8 | * | ||
v8 | 3.22.0 | ||
v8 | 3.22.1 | ||
v8 | 3.22.2 | ||
v8 | 3.22.3 | ||
v8 | 3.22.4 | ||
v8 | 3.22.5 | ||
v8 | 3.22.6 | ||
v8 | 3.22.7 | ||
v8 | 3.22.8 | ||
v8 | 3.22.9 | ||
v8 | 3.22.10 | ||
v8 | 3.22.11 | ||
v8 | 3.22.12 | ||
v8 | 3.22.13 | ||
v8 | 3.22.14 | ||
v8 | 3.22.15 | ||
v8 | 3.22.16 | ||
v8 | 3.22.17 | ||
v8 | 3.22.18 | ||
v8 | 3.22.19 | ||
v8 | 3.22.20 | ||
v8 | 3.22.21 | ||
v8 | 3.22.22 | ||
v8 | 3.22.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742", "versionEndIncluding": "31.0.1650.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*", "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*", "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*", "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*", "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*", "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*", "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*", "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*", "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*", "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*", "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*", "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*", "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*", "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*", "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*", "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*", "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*", "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*", "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*", "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*", "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*", "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*", "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*", "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*", "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*", "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*", "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*", "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*", "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*", "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*", "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*", "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*", "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*", "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*", "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*", "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*", "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*", "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*", "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*", "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*", "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*", "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*", "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*", "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*", "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*", "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*", "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*", "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*", "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*", "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*", "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*", "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*", "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*", "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2", "versionEndIncluding": "3.22.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*", "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*", "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*", "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*", "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*", "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*", "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*", "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*", "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*", "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*", "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*", "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*", "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*", "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*", "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*", "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*", "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index." }, { "lang": "es", "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) por medio de c\u00f3digo JavaScript que establece una variable en el valor de un elemento de matriz con un \u00edndice dise\u00f1ado." } ], "id": "CVE-2013-6640", "lastModified": "2024-11-21T01:59:25.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-07T00:55:04.037", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56216" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56217" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "cve@mitre.org", "url": "https://code.google.com/p/chromium/issues/detail?id=319860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=319860" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-05 05:11
Modified
2024-11-21 01:59
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 33.0.1750.0 | ||
chrome | 33.0.1750.1 | ||
chrome | 33.0.1750.2 | ||
chrome | 33.0.1750.3 | ||
chrome | 33.0.1750.4 | ||
chrome | 33.0.1750.5 | ||
chrome | 33.0.1750.6 | ||
chrome | 33.0.1750.7 | ||
chrome | 33.0.1750.8 | ||
chrome | 33.0.1750.9 | ||
chrome | 33.0.1750.10 | ||
chrome | 33.0.1750.11 | ||
chrome | 33.0.1750.12 | ||
chrome | 33.0.1750.13 | ||
chrome | 33.0.1750.14 | ||
chrome | 33.0.1750.15 | ||
chrome | 33.0.1750.16 | ||
chrome | 33.0.1750.18 | ||
chrome | 33.0.1750.19 | ||
chrome | 33.0.1750.20 | ||
chrome | 33.0.1750.21 | ||
chrome | 33.0.1750.22 | ||
chrome | 33.0.1750.23 | ||
chrome | 33.0.1750.24 | ||
chrome | 33.0.1750.25 | ||
chrome | 33.0.1750.26 | ||
chrome | 33.0.1750.27 | ||
chrome | 33.0.1750.28 | ||
chrome | 33.0.1750.29 | ||
chrome | 33.0.1750.30 | ||
chrome | 33.0.1750.31 | ||
chrome | 33.0.1750.34 | ||
chrome | 33.0.1750.35 | ||
chrome | 33.0.1750.36 | ||
chrome | 33.0.1750.37 | ||
chrome | 33.0.1750.38 | ||
chrome | 33.0.1750.39 | ||
chrome | 33.0.1750.40 | ||
chrome | 33.0.1750.41 | ||
chrome | 33.0.1750.42 | ||
chrome | 33.0.1750.43 | ||
chrome | 33.0.1750.44 | ||
chrome | 33.0.1750.45 | ||
chrome | 33.0.1750.46 | ||
chrome | 33.0.1750.47 | ||
chrome | 33.0.1750.48 | ||
chrome | 33.0.1750.49 | ||
chrome | 33.0.1750.50 | ||
chrome | 33.0.1750.51 | ||
chrome | 33.0.1750.52 | ||
chrome | 33.0.1750.53 | ||
chrome | 33.0.1750.54 | ||
chrome | 33.0.1750.55 | ||
chrome | 33.0.1750.56 | ||
chrome | 33.0.1750.57 | ||
chrome | 33.0.1750.58 | ||
chrome | 33.0.1750.59 | ||
chrome | 33.0.1750.60 | ||
chrome | 33.0.1750.61 | ||
chrome | 33.0.1750.62 | ||
chrome | 33.0.1750.63 | ||
chrome | 33.0.1750.64 | ||
chrome | 33.0.1750.65 | ||
chrome | 33.0.1750.66 | ||
chrome | 33.0.1750.67 | ||
chrome | 33.0.1750.68 | ||
chrome | 33.0.1750.69 | ||
chrome | 33.0.1750.70 | ||
chrome | 33.0.1750.71 | ||
chrome | 33.0.1750.73 | ||
chrome | 33.0.1750.74 | ||
chrome | 33.0.1750.75 | ||
chrome | 33.0.1750.76 | ||
chrome | 33.0.1750.77 | ||
chrome | 33.0.1750.79 | ||
chrome | 33.0.1750.80 | ||
chrome | 33.0.1750.81 | ||
chrome | 33.0.1750.82 | ||
chrome | 33.0.1750.83 | ||
chrome | 33.0.1750.85 | ||
chrome | 33.0.1750.88 | ||
chrome | 33.0.1750.89 | ||
chrome | 33.0.1750.90 | ||
chrome | 33.0.1750.91 | ||
chrome | 33.0.1750.92 | ||
chrome | 33.0.1750.93 | ||
chrome | 33.0.1750.104 | ||
chrome | 33.0.1750.106 | ||
chrome | 33.0.1750.107 | ||
chrome | 33.0.1750.108 | ||
chrome | 33.0.1750.109 | ||
chrome | 33.0.1750.110 | ||
chrome | 33.0.1750.111 | ||
chrome | 33.0.1750.112 | ||
chrome | 33.0.1750.113 | ||
chrome | 33.0.1750.115 | ||
chrome | 33.0.1750.116 | ||
chrome | 33.0.1750.117 | ||
chrome | 33.0.1750.124 | ||
chrome | 33.0.1750.125 | ||
chrome | 33.0.1750.126 | ||
chrome | 33.0.1750.132 | ||
chrome | 33.0.1750.133 | ||
chrome | 33.0.1750.135 | ||
chrome | 33.0.1750.136 | ||
v8 | * | ||
v8 | 3.24.0 | ||
v8 | 3.24.1 | ||
v8 | 3.24.2 | ||
v8 | 3.24.3 | ||
v8 | 3.24.4 | ||
v8 | 3.24.5 | ||
v8 | 3.24.6 | ||
v8 | 3.24.7 | ||
v8 | 3.24.8 | ||
v8 | 3.24.9 | ||
v8 | 3.24.10 | ||
v8 | 3.24.11 | ||
v8 | 3.24.12 | ||
v8 | 3.24.13 | ||
v8 | 3.24.14 | ||
v8 | 3.24.15 | ||
v8 | 3.24.16 | ||
v8 | 3.24.17 | ||
v8 | 3.24.18 | ||
v8 | 3.24.19 | ||
v8 | 3.24.20 | ||
v8 | 3.24.21 | ||
v8 | 3.24.22 | ||
v8 | 3.24.23 | ||
v8 | 3.24.24 | ||
v8 | 3.24.25 | ||
v8 | 3.24.26 | ||
v8 | 3.24.27 | ||
v8 | 3.24.28 | ||
v8 | 3.24.29 | ||
v8 | 3.24.30 | ||
v8 | 3.24.31 | ||
v8 | 3.24.32 | ||
v8 | 3.24.33 | ||
v8 | 3.24.34 | ||
nodejs | node.js | * | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "44CEB321-9295-4743-A24E-A7521F07E717", "versionEndIncluding": "33.0.1750.144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*", "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*", "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*", "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*", "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*", "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*", "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*", "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*", "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*", "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*", "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*", "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*", "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*", "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*", "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*", "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*", "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*", "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*", "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*", "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*", "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*", "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*", "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*", "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*", "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*", "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*", "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*", "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*", "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*", "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*", "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*", "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*", "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*", "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*", "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*", "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*", "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*", "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*", "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*", "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*", "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*", "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*", "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*", "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*", "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*", "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*", "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*", "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*", "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*", "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*", "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*", "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*", "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*", "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*", "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*", "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*", "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*", "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*", "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*", "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*", "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*", "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*", "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*", "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*", "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*", "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*", "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*", "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*", "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*", "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*", "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*", "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*", "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*", "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*", "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*", "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*", "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*", "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*", "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*", "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*", "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*", "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*", "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*", "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*", "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*", "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*", "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*", "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*", "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*", "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*", "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*", "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*", "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*", "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*", "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*", "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*", "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "5958A347-83C2-459F-800A-F4F99BD51C29", "versionEndIncluding": "3.24.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EC3C85C-B7EB-4778-8427-57B6E74548F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "55FF4C1B-570F-4E10-B247-9E696F5C9A6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "890214C7-65FD-4741-9FA9-DFEEBE815ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD29B493-156E-40EB-A139-22273FC03494", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*", "matchCriteriaId": "D311A38E-9682-41AD-B8DA-B0FEA3FD6B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F730F35-E59A-40DC-B384-5CD8131E5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*", "matchCriteriaId": "79E6B143-17FE-4709-B37F-3F3F8C90F2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*", "matchCriteriaId": "747B3F44-61DD-4E59-AB04-644D0DBA22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*", "matchCriteriaId": "27386950-9F64-483A-98D9-73C2B2E36E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*", "matchCriteriaId": "03D30427-F440-4913-AA5C-D25E5546BF01", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*", "matchCriteriaId": "13EA11A8-2CA0-47F1-8B3A-17E4DD2C5872", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*", "matchCriteriaId": "C2B32618-C516-49A4-A207-6AA265DA9E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*", "matchCriteriaId": "4DF5F9B6-87F6-4EE7-99A2-5109FABCDD49", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*", "matchCriteriaId": "98032A71-91CD-4B04-8A85-46143A446013", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*", "matchCriteriaId": "EAEC7292-992F-4B86-B51F-7FAC51F60A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*", "matchCriteriaId": "D68568D0-2B36-4F03-85ED-518B08D91F8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*", "matchCriteriaId": "312B6E8A-7204-480D-A62F-3A0F5A3EE624", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*", "matchCriteriaId": "31610339-EC04-4721-AC82-C004C34B0C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*", "matchCriteriaId": "4D9A420C-4F51-4695-9D0B-F755A35D3A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*", "matchCriteriaId": "B360F5E7-D59D-459B-A9E8-84F51793D3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA5B5A86-F82A-4B3D-B944-4E64CDB9E877", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*", "matchCriteriaId": "225B4456-9CF6-4519-9C15-1ABE2D52C6F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*", "matchCriteriaId": "2F1E417E-DA11-4333-BDB0-C1C6EE9F2851", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*", "matchCriteriaId": "BD92CD47-D942-44C0-8E71-D307AA05C207", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*", "matchCriteriaId": "7CEBADE4-DD37-447B-8450-10BC57F85875", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*", "matchCriteriaId": "610627E6-C828-482B-809D-CE86788A5EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*", "matchCriteriaId": "39AFEF41-7AC1-46D0-9AB1-E1C7DFCAD492", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*", "matchCriteriaId": "78DD2CDC-8B85-4DC7-A85D-CC85B65B264E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*", "matchCriteriaId": "C8963550-CA67-404A-853B-86A0D6C34FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*", "matchCriteriaId": "803F421D-D17E-4E49-BD6E-00D40EDE3B81", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*", "matchCriteriaId": "76FAAD85-F326-4AC3-8F2D-DB64F610B502", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*", "matchCriteriaId": "898DF7D1-AD9C-414A-A810-F0C2C2CF3F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*", "matchCriteriaId": "8F4A53AD-04F1-4D8E-9B93-270F0A9A9E08", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*", "matchCriteriaId": "702FE7B3-A2EF-4409-8130-5EDC6A6BD3A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*", "matchCriteriaId": "FF36D004-5ED4-47CC-83F4-6FD708EC3B8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "13EB0A95-92AB-432D-A7AE-7670A5117B95", "versionEndExcluding": "0.10.31", "versionStartIncluding": "0.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.24.35.10, utilizado en Google Chrome anterior a 33.0.1750.146, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2013-6668", "lastModified": "2024-11-21T01:59:31.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-05T05:11:22.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0516.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61184" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65930" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=343964" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=344186" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=347909" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19475" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19553" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0516.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=343964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=344186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=347909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://code.google.com/p/v8/source/detail?r=19599" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-09 00:59
Modified
2024-11-21 02:27
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html | Vendor Advisory | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-2521-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2521-1 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
chrome | * | ||
v8 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E4473BA-37DE-4AF1-A828-99AA9D83AAE7", "versionEndIncluding": "40.0.2214.115", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FF6B47E-9C19-4B03-A8EC-7C338440EF52", "versionEndIncluding": "4.1.0.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.1.0.21, utilizado en Google Chrome anterior a 41.0.2272.76, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-2238", "lastModified": "2024-11-21T02:27:03.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-09T00:59:28.810", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2521-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2521-1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:04
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 33.0.1750.0 | ||
chrome | 33.0.1750.1 | ||
chrome | 33.0.1750.2 | ||
chrome | 33.0.1750.3 | ||
chrome | 33.0.1750.4 | ||
chrome | 33.0.1750.5 | ||
chrome | 33.0.1750.6 | ||
chrome | 33.0.1750.7 | ||
chrome | 33.0.1750.8 | ||
chrome | 33.0.1750.9 | ||
chrome | 33.0.1750.10 | ||
chrome | 33.0.1750.11 | ||
chrome | 33.0.1750.12 | ||
chrome | 33.0.1750.13 | ||
chrome | 33.0.1750.14 | ||
chrome | 33.0.1750.15 | ||
chrome | 33.0.1750.16 | ||
chrome | 33.0.1750.18 | ||
chrome | 33.0.1750.19 | ||
chrome | 33.0.1750.20 | ||
chrome | 33.0.1750.21 | ||
chrome | 33.0.1750.22 | ||
chrome | 33.0.1750.23 | ||
chrome | 33.0.1750.24 | ||
chrome | 33.0.1750.25 | ||
chrome | 33.0.1750.26 | ||
chrome | 33.0.1750.27 | ||
chrome | 33.0.1750.28 | ||
chrome | 33.0.1750.29 | ||
chrome | 33.0.1750.30 | ||
chrome | 33.0.1750.31 | ||
chrome | 33.0.1750.34 | ||
chrome | 33.0.1750.35 | ||
chrome | 33.0.1750.36 | ||
chrome | 33.0.1750.37 | ||
chrome | 33.0.1750.38 | ||
chrome | 33.0.1750.39 | ||
chrome | 33.0.1750.40 | ||
chrome | 33.0.1750.41 | ||
chrome | 33.0.1750.42 | ||
chrome | 33.0.1750.43 | ||
chrome | 33.0.1750.44 | ||
chrome | 33.0.1750.45 | ||
chrome | 33.0.1750.46 | ||
chrome | 33.0.1750.47 | ||
chrome | 33.0.1750.48 | ||
chrome | 33.0.1750.49 | ||
chrome | 33.0.1750.50 | ||
chrome | 33.0.1750.51 | ||
chrome | 33.0.1750.52 | ||
chrome | 33.0.1750.53 | ||
chrome | 33.0.1750.54 | ||
chrome | 33.0.1750.55 | ||
chrome | 33.0.1750.56 | ||
chrome | 33.0.1750.57 | ||
chrome | 33.0.1750.58 | ||
chrome | 33.0.1750.59 | ||
chrome | 33.0.1750.60 | ||
chrome | 33.0.1750.61 | ||
chrome | 33.0.1750.62 | ||
chrome | 33.0.1750.63 | ||
chrome | 33.0.1750.64 | ||
chrome | 33.0.1750.65 | ||
chrome | 33.0.1750.66 | ||
chrome | 33.0.1750.67 | ||
chrome | 33.0.1750.68 | ||
chrome | 33.0.1750.69 | ||
chrome | 33.0.1750.70 | ||
chrome | 33.0.1750.71 | ||
chrome | 33.0.1750.73 | ||
chrome | 33.0.1750.74 | ||
chrome | 33.0.1750.75 | ||
chrome | 33.0.1750.76 | ||
chrome | 33.0.1750.77 | ||
chrome | 33.0.1750.79 | ||
chrome | 33.0.1750.80 | ||
chrome | 33.0.1750.81 | ||
chrome | 33.0.1750.82 | ||
chrome | 33.0.1750.83 | ||
chrome | 33.0.1750.85 | ||
chrome | 33.0.1750.88 | ||
chrome | 33.0.1750.89 | ||
chrome | 33.0.1750.90 | ||
chrome | 33.0.1750.91 | ||
chrome | 33.0.1750.92 | ||
chrome | 33.0.1750.93 | ||
chrome | 33.0.1750.104 | ||
chrome | 33.0.1750.106 | ||
chrome | 33.0.1750.107 | ||
chrome | 33.0.1750.108 | ||
chrome | 33.0.1750.109 | ||
chrome | 33.0.1750.110 | ||
chrome | 33.0.1750.111 | ||
chrome | 33.0.1750.112 | ||
chrome | 33.0.1750.113 | ||
chrome | 33.0.1750.115 | ||
chrome | 33.0.1750.116 | ||
chrome | 33.0.1750.117 | ||
chrome | 33.0.1750.124 | ||
chrome | 33.0.1750.125 | ||
chrome | 33.0.1750.126 | ||
chrome | 33.0.1750.132 | ||
chrome | 33.0.1750.133 | ||
chrome | 33.0.1750.135 | ||
chrome | 33.0.1750.136 | ||
chrome | 33.0.1750.144 | ||
v8 | * | ||
v8 | 3.23.0 | ||
v8 | 3.23.1 | ||
v8 | 3.23.2 | ||
v8 | 3.23.3 | ||
v8 | 3.23.4 | ||
v8 | 3.23.5 | ||
v8 | 3.23.6 | ||
v8 | 3.23.7 | ||
v8 | 3.23.8 | ||
v8 | 3.23.9 | ||
v8 | 3.23.10 | ||
v8 | 3.23.11 | ||
v8 | 3.23.12 | ||
v8 | 3.23.13 | ||
v8 | 3.23.14 | ||
v8 | 3.23.15 | ||
v8 | 3.23.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC4DDCA3-FC7A-458B-8C0A-8699ACF9CE82", "versionEndIncluding": "33.0.1750.146", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*", "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*", "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*", "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*", "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*", "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*", "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*", "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*", "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*", "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*", "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*", "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*", "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*", "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*", "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*", "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*", "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*", "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*", "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*", "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*", "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*", "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*", "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*", "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*", "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*", "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*", "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*", "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*", "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*", "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*", "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*", "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*", "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*", "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*", "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*", "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*", "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*", "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*", "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*", "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*", "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*", "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*", "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*", "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*", "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*", "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*", "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*", "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*", "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*", "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*", "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*", "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*", "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*", "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*", "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*", "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*", "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*", "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*", "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*", "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*", "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*", "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*", "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*", "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*", "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*", "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*", "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*", "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*", "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*", "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*", "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*", "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*", "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*", "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*", "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*", "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*", "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*", "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*", "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*", "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*", "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*", "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*", "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*", "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*", "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*", "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*", "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*", "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*", "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*", "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*", "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*", "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*", "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*", "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*", "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*", "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*", "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*", "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*", "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:33.0.1750.144:*:*:*:*:*:*:*", "matchCriteriaId": "55273418-C87C-4030-8068-BC6B649DEEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CE1AC76-4886-49A6-9FA0-A2B886760A81", "versionEndIncluding": "3.23.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "D92C80E8-FD13-4ECE-94E1-71011B3A8295", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "8CA61F17-6FA5-4191-99CA-B88ABBA83CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "222B289E-C7FB-433A-A9C9-B6B9B0650013", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "53499FFD-624D-417B-B585-B335D458404D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "308736C3-2D4C-418A-9F5E-C1986C526647", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "68BFEA9C-BE4C-4F5C-9E75-7C5D27B35F43", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "4D2F93F9-4651-4BC9-BCDD-95F4B617D59C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "3526D70A-943D-4B0D-9F9E-5C06685E0C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "8CB7E28F-C88F-4F2D-97BF-9278C00B1E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "3AA5D6B2-8E57-4210-B1CB-EB16CA3F2224", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "98BE4589-3B1B-4364-A838-A613DF3ECD8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.11:*:*:*:*:*:*:*", "matchCriteriaId": "3A29907D-B6D4-4919-8311-53B6F60CB403", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC923E76-640B-4EDF-AC68-D370E8BE308A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.13:*:*:*:*:*:*:*", "matchCriteriaId": "4058640B-7756-47F2-852A-F2687C968C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "9DB56717-A7CF-45C9-B8D8-75D2C4E5D4CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.15:*:*:*:*:*:*:*", "matchCriteriaId": "1B70BC69-7CBE-4910-9F12-E01BA9902898", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.23.16:*:*:*:*:*:*:*", "matchCriteriaId": "97DCE3DB-A3BB-4622-A2EC-C1551624B380", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.23.17.18, utilizado en Google Chrome anterior a 33.0.1750.149, permiten a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2014-1704", "lastModified": "2024-11-21T02:04:51.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-16T14:06:45.427", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2014/dsa-2883" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1029914" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=328202" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=345715" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=349079" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/v8/source/detail?r=18564" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/v8/source/detail?r=19614" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/v8/source/detail?r=19668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=328202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=345715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=349079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/v8/source/detail?r=18564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/v8/source/detail?r=19614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/v8/source/detail?r=19668" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 31.0.1650.0 | ||
chrome | 31.0.1650.2 | ||
chrome | 31.0.1650.3 | ||
chrome | 31.0.1650.4 | ||
chrome | 31.0.1650.5 | ||
chrome | 31.0.1650.6 | ||
chrome | 31.0.1650.7 | ||
chrome | 31.0.1650.8 | ||
chrome | 31.0.1650.9 | ||
chrome | 31.0.1650.10 | ||
chrome | 31.0.1650.11 | ||
chrome | 31.0.1650.12 | ||
chrome | 31.0.1650.13 | ||
chrome | 31.0.1650.14 | ||
chrome | 31.0.1650.15 | ||
chrome | 31.0.1650.16 | ||
chrome | 31.0.1650.17 | ||
chrome | 31.0.1650.18 | ||
chrome | 31.0.1650.19 | ||
chrome | 31.0.1650.20 | ||
chrome | 31.0.1650.22 | ||
chrome | 31.0.1650.23 | ||
chrome | 31.0.1650.25 | ||
chrome | 31.0.1650.26 | ||
chrome | 31.0.1650.27 | ||
chrome | 31.0.1650.28 | ||
chrome | 31.0.1650.29 | ||
chrome | 31.0.1650.30 | ||
chrome | 31.0.1650.31 | ||
chrome | 31.0.1650.32 | ||
chrome | 31.0.1650.33 | ||
chrome | 31.0.1650.34 | ||
chrome | 31.0.1650.35 | ||
chrome | 31.0.1650.36 | ||
chrome | 31.0.1650.37 | ||
chrome | 31.0.1650.38 | ||
chrome | 31.0.1650.39 | ||
chrome | 31.0.1650.41 | ||
chrome | 31.0.1650.42 | ||
chrome | 31.0.1650.43 | ||
chrome | 31.0.1650.44 | ||
chrome | 31.0.1650.45 | ||
chrome | 31.0.1650.46 | ||
chrome | 31.0.1650.47 | ||
chrome | 31.0.1650.48 | ||
chrome | 31.0.1650.49 | ||
chrome | 31.0.1650.50 | ||
chrome | 31.0.1650.51 | ||
chrome | 31.0.1650.52 | ||
chrome | 31.0.1650.53 | ||
chrome | 31.0.1650.54 | ||
chrome | 31.0.1650.55 | ||
chrome | 31.0.1650.57 | ||
chrome | 31.0.1650.58 | ||
chrome | 31.0.1650.59 | ||
chrome | 31.0.1650.60 | ||
chrome | 31.0.1650.61 | ||
v8 | * | ||
v8 | 3.22.0 | ||
v8 | 3.22.1 | ||
v8 | 3.22.2 | ||
v8 | 3.22.3 | ||
v8 | 3.22.4 | ||
v8 | 3.22.5 | ||
v8 | 3.22.6 | ||
v8 | 3.22.7 | ||
v8 | 3.22.8 | ||
v8 | 3.22.9 | ||
v8 | 3.22.10 | ||
v8 | 3.22.11 | ||
v8 | 3.22.12 | ||
v8 | 3.22.13 | ||
v8 | 3.22.14 | ||
v8 | 3.22.15 | ||
v8 | 3.22.16 | ||
v8 | 3.22.17 | ||
v8 | 3.22.18 | ||
v8 | 3.22.19 | ||
v8 | 3.22.20 | ||
v8 | 3.22.21 | ||
v8 | 3.22.22 | ||
v8 | 3.22.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742", "versionEndIncluding": "31.0.1650.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*", "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*", "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*", "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*", "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*", "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*", "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*", "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*", "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*", "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*", "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*", "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*", "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*", "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*", "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*", "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*", "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*", "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*", "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*", "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*", "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*", "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*", "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*", "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*", "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*", "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*", "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*", "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*", "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*", "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*", "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*", "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*", "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*", "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*", "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*", "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*", "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*", "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*", "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*", "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*", "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*", "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*", "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*", "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*", "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*", "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*", "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*", "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*", "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*", "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*", "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*", "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*", "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*", "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2", "versionEndIncluding": "3.22.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*", "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*", "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*", "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*", "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*", "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*", "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*", "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*", "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*", "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*", "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*", "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*", "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*", "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*", "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*", "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*", "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index." }, { "lang": "es", "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) o posiblemente tienen otro impacto no especificado por medio de c\u00f3digo JavaScript que establece el valor de un elemento de matriz con un \u00edndice dise\u00f1ado." } ], "id": "CVE-2013-6639", "lastModified": "2024-11-21T01:59:25.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-07T00:55:04.007", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56216" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56217" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "cve@mitre.org", "url": "https://code.google.com/p/chromium/issues/detail?id=319835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=319835" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-22 13:29
Modified
2024-11-21 01:52
Severity ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 27.0.1453.0 | ||
chrome | 27.0.1453.1 | ||
chrome | 27.0.1453.2 | ||
chrome | 27.0.1453.3 | ||
chrome | 27.0.1453.4 | ||
chrome | 27.0.1453.5 | ||
chrome | 27.0.1453.6 | ||
chrome | 27.0.1453.7 | ||
chrome | 27.0.1453.8 | ||
chrome | 27.0.1453.9 | ||
chrome | 27.0.1453.10 | ||
chrome | 27.0.1453.11 | ||
chrome | 27.0.1453.12 | ||
chrome | 27.0.1453.13 | ||
chrome | 27.0.1453.15 | ||
chrome | 27.0.1453.34 | ||
chrome | 27.0.1453.35 | ||
chrome | 27.0.1453.36 | ||
chrome | 27.0.1453.37 | ||
chrome | 27.0.1453.38 | ||
chrome | 27.0.1453.39 | ||
chrome | 27.0.1453.40 | ||
chrome | 27.0.1453.41 | ||
chrome | 27.0.1453.42 | ||
chrome | 27.0.1453.43 | ||
chrome | 27.0.1453.44 | ||
chrome | 27.0.1453.45 | ||
chrome | 27.0.1453.46 | ||
chrome | 27.0.1453.47 | ||
chrome | 27.0.1453.49 | ||
chrome | 27.0.1453.50 | ||
chrome | 27.0.1453.51 | ||
chrome | 27.0.1453.52 | ||
chrome | 27.0.1453.54 | ||
chrome | 27.0.1453.55 | ||
chrome | 27.0.1453.56 | ||
chrome | 27.0.1453.57 | ||
chrome | 27.0.1453.58 | ||
chrome | 27.0.1453.59 | ||
chrome | 27.0.1453.60 | ||
chrome | 27.0.1453.61 | ||
chrome | 27.0.1453.62 | ||
chrome | 27.0.1453.63 | ||
chrome | 27.0.1453.64 | ||
chrome | 27.0.1453.65 | ||
chrome | 27.0.1453.66 | ||
chrome | 27.0.1453.67 | ||
chrome | 27.0.1453.68 | ||
chrome | 27.0.1453.69 | ||
chrome | 27.0.1453.70 | ||
chrome | 27.0.1453.71 | ||
chrome | 27.0.1453.72 | ||
chrome | 27.0.1453.73 | ||
chrome | 27.0.1453.74 | ||
chrome | 27.0.1453.75 | ||
chrome | 27.0.1453.76 | ||
chrome | 27.0.1453.77 | ||
chrome | 27.0.1453.78 | ||
chrome | 27.0.1453.79 | ||
chrome | 27.0.1453.80 | ||
chrome | 27.0.1453.81 | ||
chrome | 27.0.1453.82 | ||
chrome | 27.0.1453.83 | ||
chrome | 27.0.1453.84 | ||
chrome | 27.0.1453.85 | ||
chrome | 27.0.1453.86 | ||
chrome | 27.0.1453.87 | ||
chrome | 27.0.1453.88 | ||
chrome | 27.0.1453.89 | ||
chrome | 27.0.1453.90 | ||
v8 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CAB43EE-4A88-4B1F-8167-6917FD095F81", "versionEndIncluding": "27.0.1453.91", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*", "matchCriteriaId": "B61BB7C7-519D-4084-9F48-9D992A829246", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*", "matchCriteriaId": "95D7F7CA-6DE0-4F03-A7AC-C99C91A57913", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*", "matchCriteriaId": "77A874B4-CA16-4FEC-B67C-6707D58DF338", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*", "matchCriteriaId": "18BFC6C5-455A-4F64-9BE8-8C65E7196650", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*", "matchCriteriaId": "F569848F-1558-447F-8852-F240FEEFAC9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AD52267-6CC1-403E-AEF8-D2B257E8013D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*", "matchCriteriaId": "DF4DB744-7805-4CEC-8720-207031051F12", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*", "matchCriteriaId": "2D5B5169-6135-4B1B-99E4-31813005B601", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*", "matchCriteriaId": "E33356AF-7F3F-4CC9-AC6A-09669FF1E842", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*", "matchCriteriaId": "20A98AF9-A23C-4B67-A93C-7E6F39917DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*", "matchCriteriaId": "1F26B1CB-9B8F-4FD3-9BAC-32141EBBD766", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*", "matchCriteriaId": "8005EA70-8B99-4653-9F58-D7EA3A538A47", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*", "matchCriteriaId": "AF7E711E-1240-4875-B824-FBA5FAB4BBAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*", "matchCriteriaId": "C9DFC6EF-C4F6-4861-8712-27C335DE9E11", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*", "matchCriteriaId": "11667B12-9FAE-4043-B23D-983F178BFC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*", "matchCriteriaId": "57180BB1-D41C-42BE-B35E-532D451CC0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*", "matchCriteriaId": "63BEDF20-33CB-42AF-9335-9BF41B53DB9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*", "matchCriteriaId": "80356017-C7C6-4F72-9A92-2F13C9ADE762", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*", "matchCriteriaId": "513A84A5-8EA5-4095-84C1-5B55E07CE332", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*", "matchCriteriaId": "268DE157-0335-404D-9568-F54D5AB1F4DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*", "matchCriteriaId": "8CC8931C-122D-4E0C-8855-456070822EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*", "matchCriteriaId": "A138D90F-0954-4627-A6CF-4671AC474FF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*", "matchCriteriaId": "2D5FE20F-29B9-4E48-88A8-E00AD790E93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*", "matchCriteriaId": "3E19C352-0C20-4AC1-BF53-1B0A416F0FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*", "matchCriteriaId": "6271E601-9E4D-4765-B71D-7FA2B9FE0013", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*", "matchCriteriaId": "9702130A-CB3F-433E-892B-7B4338A048B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*", "matchCriteriaId": "129CCA51-B755-4A61-8B63-EC69AA2970F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*", "matchCriteriaId": "D572B358-361A-49E2-B9E9-CC97F6424418", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*", "matchCriteriaId": "841CA94D-859E-425A-A735-62A35B20E23F", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*", "matchCriteriaId": "A9F1B5E4-BA8B-440B-B8D2-2E2093F4B32E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*", "matchCriteriaId": "3BE6989D-BE91-4C92-9734-61A7F234E9F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*", "matchCriteriaId": "EC4481D4-4143-4BC0-983C-974695711F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*", "matchCriteriaId": "D7A5927A-3182-4BB5-8AC2-72EC2F43027C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*", "matchCriteriaId": "2780C1B8-F4B6-4C11-974C-AB0205896782", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*", "matchCriteriaId": "08808A78-646E-4D6D-BD57-5EC533D904FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*", "matchCriteriaId": "B4F526E2-8625-4337-9855-0FB3FB135BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*", "matchCriteriaId": "B9AF361A-32B7-40A6-9863-793ED2C29C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*", "matchCriteriaId": "96E9901E-F811-4736-B7C7-847584B162C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*", "matchCriteriaId": "3D9762D5-D548-4910-B8F1-3A0E3664C6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*", "matchCriteriaId": "540B23F2-8434-4E40-9CBE-E8A60D7DB05D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*", "matchCriteriaId": "B1FD2F21-FB01-4D78-8C05-0BBD2D257C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*", "matchCriteriaId": "0A8E2340-ED37-4942-B0D6-72E25AF8886C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*", "matchCriteriaId": "892CABA3-5B2C-4168-9F1D-03D58D212A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*", "matchCriteriaId": "95B8C085-3EDE-4363-973C-EC649E6F07EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*", "matchCriteriaId": "6775A3FB-7B3C-4713-B1F7-82D49C8867E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*", "matchCriteriaId": "67A6E53E-EEE8-4D16-BEE0-1549E3C4FBE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*", "matchCriteriaId": "F8C48274-9025-4909-AA5F-2A6C90902646", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*", "matchCriteriaId": "85C9EBB3-3329-43C6-998F-BAB480181BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*", "matchCriteriaId": "18A9D90E-1827-4F82-B2C6-214E0733B128", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD6FE8-504F-4B2B-B401-91F31862063E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*", "matchCriteriaId": "AD33D555-75B1-43BC-B32E-B5D794419882", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8257E-D36C-4799-BD3D-CA8AE2E7701E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*", "matchCriteriaId": "19AB2B3D-EFE4-48BA-8D70-DAC500321472", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*", "matchCriteriaId": "7E40617D-2EB9-4773-A81B-5BA4F1BA6786", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*", "matchCriteriaId": "B44A775E-C82A-4B5C-BA3B-20022408CF1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*", "matchCriteriaId": "B3E21A34-4AFB-4A44-BC09-68B6672DFD93", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*", "matchCriteriaId": "F0450801-F2EB-48B5-9DE4-6A0BCF7E3F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*", "matchCriteriaId": "A50BF3E0-4AFB-43CD-A7BF-13827000D0A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*", "matchCriteriaId": "1A5BD9A8-A717-4398-847F-4C7D71AD5588", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*", "matchCriteriaId": "C24422D7-523C-4A21-9649-06BB0A1908B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*", "matchCriteriaId": "040EF42D-185F-446C-944B-712AE2A62036", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*", "matchCriteriaId": "4C139C6E-3FA7-4295-9DE3-938EDEB09D20", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*", "matchCriteriaId": "A518C048-1CB5-4BB9-B2D7-85A4399E8AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*", "matchCriteriaId": "92874CC7-49E9-4A7F-9021-1C7ECE35B2AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*", "matchCriteriaId": "345DA945-0490-4A5E-8E20-7FC5886AB170", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*", "matchCriteriaId": "0BA7F6E3-F872-4EF4-B2E5-C1677867F166", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*", "matchCriteriaId": "3383A496-84BF-427F-88A0-1620A36E9177", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*", "matchCriteriaId": "482C95EF-FA97-4709-9FB4-B7AB3437C69C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*", "matchCriteriaId": "30D5B77B-5860-4855-B416-E84E43E267EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*", "matchCriteriaId": "E157716D-4FC2-4F3A-B5ED-96C098408D1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*", "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors." }, { "lang": "es", "value": "Google V8, que se utiliza en Google Chrome anterior a v27.0.1453.93, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fuera de los l\u00edmites de lectura) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-2838", "lastModified": "2024-11-21T01:52:28.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-22T13:29:55.987", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2013/dsa-2695" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=235311" }, { "source": "chrome-cve-admin@google.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=235311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2024-11-21 02:46
Severity ?
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
v8 | * | ||
chrome | * | ||
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 8.0 | |
opensuse | leap | 42.1 | |
opensuse | opensuse | 13.2 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
suse | linux_enterprise | 12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1", "versionEndIncluding": "5.0.71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23", "versionEndIncluding": "50.0.2661.102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." }, { "lang": "es", "value": "objects.cc en Google V8 en versiones anteriores a 5.0.71.32, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, no restringe adecuadamente el empeoramiento descuidado, lo que permite a atacantes remotos provocar un denegaci\u00f3n de servicio (desbordamiento de buffer basado en memoria din\u00e1mica) o posiblmente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado." } ], "id": "CVE-2016-1678", "lastModified": "2024-11-21T02:46:52.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-05T23:59:06.880", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1875053002" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/595259" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201607-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1875053002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/595259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201607-07" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-14 11:59
Modified
2024-11-21 02:38
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB5A295-363E-4C75-8EB0-8672F50AF303", "versionEndIncluding": "4.7.80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F830030-A662-45C2-950D-EC2598644202", "versionEndIncluding": "47.0.2526.73", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.80, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos, un problema diferente a CVE-2015-8478." } ], "id": "CVE-2015-8548", "lastModified": "2024-11-21T02:38:42.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-12-14T11:59:04.967", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2860-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2860-1" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2013-6639
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319835" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-04T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319835" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6639", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/v8/source/detail?r=17801", "refsource": "CONFIRM", "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=319835", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=319835" }, { "name": "openSUSE-SU-2013:1933", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029442" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6639", "datePublished": "2013-12-07T00:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1242
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 04:33
Severity ?
EPSS score ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-0816.html | vendor-advisory, x_refsource_REDHAT | |
http://ubuntu.com/usn/usn-2570-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2015/dsa-3238 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/201506-04 | vendor-advisory, x_refsource_GENTOO | |
https://codereview.chromium.org/1019033004 | x_refsource_CONFIRM | |
https://codereview.chromium.org/1000893003 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1032209 | vdb-entry, x_refsource_SECTRACK | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | vendor-advisory, x_refsource_SUSE | |
https://code.google.com/p/chromium/issues/detail?id=460917 | x_refsource_CONFIRM | |
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:33:20.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:0816", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" }, { "name": "USN-2570-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "openSUSE-SU-2015:1887", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html" }, { "name": "GLSA-201506-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201506-04" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1019033004" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1000893003" }, { "name": "1032209", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032209" }, { "name": "openSUSE-SU-2015:0748", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=460917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "RHSA-2015:0816", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" }, { "name": "USN-2570-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "openSUSE-SU-2015:1887", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html" }, { "name": "GLSA-201506-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201506-04" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1019033004" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1000893003" }, { "name": "1032209", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032209" }, { "name": "openSUSE-SU-2015:0748", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=460917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-1242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:0816", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" }, { "name": "USN-2570-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "openSUSE-SU-2015:1887", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html" }, { "name": "GLSA-201506-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201506-04" }, { "name": "https://codereview.chromium.org/1019033004", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1019033004" }, { "name": "https://codereview.chromium.org/1000893003", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1000893003" }, { "name": "1032209", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032209" }, { "name": "openSUSE-SU-2015:0748", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=460917", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=460917" }, { "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-1242", "datePublished": "2015-04-19T10:00:00", "dateReserved": "2015-01-21T00:00:00", "dateUpdated": "2024-08-06T04:33:20.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3886
Vulnerability from cvelistv5
Published
2011-10-25 19:00
Modified
2024-08-06 23:53
Severity ?
EPSS score ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201 | vdb-entry, signature, x_refsource_OVAL | |
http://code.google.com/p/chromium/issues/detail?id=98773 | x_refsource_CONFIRM | |
http://code.google.com/p/chromium/issues/detail?id=99167 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70964 | vdb-entry, x_refsource_XF | |
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:31.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:13201", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=98773" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=99167" }, { "name": "google-chrome-v8-code-exec(70964)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "oval:org.mitre.oval:def:13201", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=98773" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=99167" }, { "name": "google-chrome-v8-code-exec(70964)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2011-3886", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:13201", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=98773", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=98773" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=99167", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=99167" }, { "name": "google-chrome-v8-code-exec(70964)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2011-3886", "datePublished": "2011-10-25T19:00:00", "dateReserved": "2011-10-01T00:00:00", "dateUpdated": "2024-08-06T23:53:31.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5128
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
EPSS score ?
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:53:47.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:1868", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "name": "92053", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2101983002" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2082633002" }, { "name": "USN-3041-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2085223002" }, { "name": "openSUSE-SU-2016:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2084183004" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2103033002" }, { "name": "GLSA-201610-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/619166" }, { "name": "1036428", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036428" }, { "name": "DSA-3637", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "openSUSE-SU-2016:1868", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "name": "92053", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2101983002" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2082633002" }, { "name": "USN-3041-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2085223002" }, { "name": "openSUSE-SU-2016:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2084183004" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2103033002" }, { "name": "GLSA-201610-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/619166" }, { "name": "1036428", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036428" }, { "name": "DSA-3637", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-5128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:1868", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "name": "92053", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92053" }, { "name": "https://codereview.chromium.org/2101983002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2101983002" }, { "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "name": "https://codereview.chromium.org/2082633002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2082633002" }, { "name": "USN-3041-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "name": "https://codereview.chromium.org/2085223002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2085223002" }, { "name": "openSUSE-SU-2016:1918", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "name": "https://codereview.chromium.org/2084183004", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2084183004" }, { "name": "https://codereview.chromium.org/2103033002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2103033002" }, { "name": "GLSA-201610-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "name": "https://crbug.com/619166", "refsource": "CONFIRM", "url": "https://crbug.com/619166" }, { "name": "1036428", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036428" }, { "name": "DSA-3637", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3637" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-5128", "datePublished": "2016-07-23T19:00:00", "dateReserved": "2016-05-31T00:00:00", "dateUpdated": "2024-08-06T00:53:47.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1346
Vulnerability from cvelistv5
Published
2015-01-22 22:00
Modified
2024-08-06 04:40
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2015/01/stable-update.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62575 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100361 | vdb-entry, x_refsource_XF | |
http://www.ubuntu.com/usn/USN-2476-1 | vendor-advisory, x_refsource_UBUNTU | |
http://security.gentoo.org/glsa/glsa-201502-13.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securitytracker.com/id/1031623 | vdb-entry, x_refsource_SECTRACK | |
http://rhn.redhat.com/errata/RHSA-2015-0093.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/62383 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { "name": "62575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62575" }, { "name": "google-v8-cve20151346-code-exec(100361)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361" }, { "name": "USN-2476-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { "name": "GLSA-201502-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "1031623", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031623" }, { "name": "RHSA-2015:0093", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { "name": "62383", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62383" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { "name": "62575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62575" }, { "name": "google-v8-cve20151346-code-exec(100361)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361" }, { "name": "USN-2476-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { "name": "GLSA-201502-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "1031623", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031623" }, { "name": "RHSA-2015:0093", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { "name": "62383", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62383" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { "name": "62575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62575" }, { "name": "google-v8-cve20151346-code-exec(100361)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361" }, { "name": "USN-2476-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { "name": "GLSA-201502-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "1031623", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031623" }, { "name": "RHSA-2015:0093", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { "name": "62383", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62383" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1346", "datePublished": "2015-01-22T22:00:00", "dateReserved": "2015-01-22T00:00:00", "dateUpdated": "2024-08-06T04:40:18.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7834
Vulnerability from cvelistv5
Published
2015-10-15 10:00
Modified
2024-08-06 07:59
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2770-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.ubuntu.com/usn/USN-2770-2 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:59:00.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html" }, { "name": "USN-2770-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2770-1" }, { "name": "USN-2770-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2770-2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html" }, { "name": "USN-2770-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2770-1" }, { "name": "USN-2770-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2770-2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-7834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html" }, { "name": "USN-2770-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2770-1" }, { "name": "USN-2770-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2770-2" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-7834", "datePublished": "2015-10-15T10:00:00", "dateReserved": "2015-10-14T00:00:00", "dateUpdated": "2024-08-06T07:59:00.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3333
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 05:47
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://ubuntu.com/usn/usn-2570-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2015/dsa-3238 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/74221 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | vendor-advisory, x_refsource_SUSE | |
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:47:57.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2570-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "74221", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74221" }, { "name": "openSUSE-SU-2015:0748", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2570-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "74221", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74221" }, { "name": "openSUSE-SU-2015:0748", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2570-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2570-1" }, { "name": "DSA-3238", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3238" }, { "name": "74221", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74221" }, { "name": "openSUSE-SU-2015:0748", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html" }, { "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3333", "datePublished": "2015-04-19T10:00:00", "dateReserved": "2015-04-19T00:00:00", "dateUpdated": "2024-08-06T05:47:57.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8548
Vulnerability from cvelistv5
Published
2015-12-14 11:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2015-2618.html | vendor-advisory, x_refsource_REDHAT | |
http://www.ubuntu.com/usn/USN-2860-1 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "name": "RHSA-2015:2618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "name": "USN-2860-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2860-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "name": "RHSA-2015:2618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "name": "USN-2860-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2860-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-8548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "name": "RHSA-2015:2618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "name": "USN-2860-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2860-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-8548", "datePublished": "2015-12-14T11:00:00", "dateReserved": "2015-12-13T00:00:00", "dateUpdated": "2024-08-06T08:20:43.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0836
Vulnerability from cvelistv5
Published
2013-01-15 21:00
Modified
2024-08-06 14:41
Severity ?
EPSS score ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html | vendor-advisory, x_refsource_SUSE | |
https://code.google.com/p/chromium/issues/detail?id=150545 | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459 | vdb-entry, signature, x_refsource_OVAL | |
http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:41:47.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0236", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=150545" }, { "name": "oval:org.mitre.oval:def:16459", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "openSUSE-SU-2013:0236", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=150545" }, { "name": "oval:org.mitre.oval:def:16459", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2013-0836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0236", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=150545", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=150545" }, { "name": "oval:org.mitre.oval:def:16459", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459" }, { "name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2013-0836", "datePublished": "2013-01-15T21:00:00", "dateReserved": "2013-01-07T00:00:00", "dateUpdated": "2024-08-06T14:41:47.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5380
Vulnerability from cvelistv5
Published
2015-07-09 10:00
Modified
2024-08-06 06:50
Severity ?
EPSS score ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
References
▼ | URL | Tags |
---|---|---|
https://codereview.chromium.org/1226493003 | x_refsource_CONFIRM | |
https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852 | x_refsource_CONFIRM | |
https://github.com/joyent/node/issues/25583 | x_refsource_CONFIRM | |
http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/75556 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:50:02.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1226493003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/joyent/node/issues/25583" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/" }, { "name": "75556", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75556" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1226493003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/joyent/node/issues/25583" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/" }, { "name": "75556", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75556" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5380", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://codereview.chromium.org/1226493003", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1226493003" }, { "name": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852", "refsource": "CONFIRM", "url": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852" }, { "name": "https://github.com/joyent/node/issues/25583", "refsource": "CONFIRM", "url": "https://github.com/joyent/node/issues/25583" }, { "name": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/", "refsource": "CONFIRM", "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/" }, { "name": "75556", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75556" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5380", "datePublished": "2015-07-09T10:00:00", "dateReserved": "2015-07-06T00:00:00", "dateUpdated": "2024-08-06T06:50:02.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5129
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
EPSS score ?
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:53:47.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:1868", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "name": "92053", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "name": "USN-3041-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "name": "openSUSE-SU-2016:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2078403002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/620553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2102243002" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/2111133002" }, { "name": "GLSA-201610-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "name": "1036428", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036428" }, { "name": "1038201", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038201" }, { "name": "DSA-3637", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-31T09:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "openSUSE-SU-2016:1868", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "name": "92053", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "name": "USN-3041-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "name": "openSUSE-SU-2016:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2078403002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/620553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2102243002" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/2111133002" }, { "name": "GLSA-201610-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "name": "1036428", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036428" }, { "name": "1038201", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038201" }, { "name": "DSA-3637", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-5129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:1868", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "name": "openSUSE-SU-2016:1869", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "name": "https://source.android.com/security/bulletin/2017-04-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "name": "92053", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92053" }, { "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "name": "USN-3041-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "name": "openSUSE-SU-2016:1918", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "name": "https://codereview.chromium.org/2078403002/", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2078403002/" }, { "name": "https://crbug.com/620553", "refsource": "CONFIRM", "url": "https://crbug.com/620553" }, { "name": "https://codereview.chromium.org/2102243002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2102243002" }, { "name": "https://codereview.chromium.org/2111133002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/2111133002" }, { "name": "GLSA-201610-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-09" }, { "name": "openSUSE-SU-2016:1865", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "name": "RHSA-2016:1485", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "name": "1036428", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036428" }, { "name": "1038201", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038201" }, { "name": "DSA-3637", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3637" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-5129", "datePublished": "2016-07-23T19:00:00", "dateReserved": "2016-05-31T00:00:00", "dateUpdated": "2024-08-06T00:53:47.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1678
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/90876 | vdb-entry, x_refsource_BID | |
https://crbug.com/595259 | x_refsource_CONFIRM | |
https://codereview.chromium.org/1875053002 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1035981 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2016/dsa-3590 | vendor-advisory, x_refsource_DEBIAN | |
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2992-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2016:1190 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201607-07 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/595259" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1875053002" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/595259" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1875053002" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "90876", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90876" }, { "name": "https://crbug.com/595259", "refsource": "CONFIRM", "url": "https://crbug.com/595259" }, { "name": "https://codereview.chromium.org/1875053002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1875053002" }, { "name": "openSUSE-SU-2016:1496", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-1678", "datePublished": "2016-06-05T23:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:12.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6638
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/v8/source/detail?r=17800" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029442" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319722" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-04T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/v8/source/detail?r=17800" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029442" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319722" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6638", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "http://code.google.com/p/v8/source/detail?r=17800", "refsource": "CONFIRM", "url": "http://code.google.com/p/v8/source/detail?r=17800" }, { "name": "openSUSE-SU-2014:0092", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)", "refsource": "MLIST", "url": "http://www.mail-archive.com/v8-dev@googlegroups.com/msg79646.html" }, { "name": "openSUSE-SU-2013:1960", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029442" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=319722", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=319722" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6638", "datePublished": "2013-12-07T00:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6580
Vulnerability from cvelistv5
Published
2015-09-03 22:00
Modified
2024-08-06 07:22
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1033472 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:22.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html" }, { "name": "1033472", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033472" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html" }, { "name": "1033472", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033472" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-6580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html" }, { "name": "1033472", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033472" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-6580", "datePublished": "2015-09-03T22:00:00", "dateReserved": "2015-08-21T00:00:00", "dateUpdated": "2024-08-06T07:22:22.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6640
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029442" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319860" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-04T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029442" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=319860" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6640", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/v8/source/detail?r=17801", "refsource": "CONFIRM", "url": "http://code.google.com/p/v8/source/detail?r=17801" }, { "name": "56217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56217" }, { "name": "openSUSE-SU-2013:1962", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" }, { "name": "openSUSE-SU-2014:0092", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" }, { "name": "openSUSE-SU-2013:1960", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" }, { "name": "openSUSE-SU-2014:0065", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html" }, { "name": "openSUSE-SU-2013:1933", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" }, { "name": "DSA-2811", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2811" }, { "name": "openSUSE-SU-2013:1927", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" }, { "name": "56216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56216" }, { "name": "1029442", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029442" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=319860", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=319860" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6640", "datePublished": "2013-12-07T00:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1688
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/90876 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1035981 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2016/dsa-3590 | vendor-advisory, x_refsource_DEBIAN | |
https://crbug.com/604897 | x_refsource_CONFIRM | |
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2992-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2016:1190 | vendor-advisory, x_refsource_REDHAT | |
https://codereview.chromium.org/1927003003 | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201607-07 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90876" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/604897" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1927003003" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90876" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/604897" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1927003003" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "90876", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90876" }, { "name": "openSUSE-SU-2016:1496", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "https://crbug.com/604897", "refsource": "CONFIRM", "url": "https://crbug.com/604897" }, { "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "https://codereview.chromium.org/1927003003", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1927003003" }, { "name": "GLSA-201607-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-1688", "datePublished": "2016-06-05T23:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:12.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3910
Vulnerability from cvelistv5
Published
2015-05-20 10:00
Modified
2024-08-06 05:56
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html | vendor-advisory, x_refsource_SUSE | |
http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/74730 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:56:16.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2015:0969", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html" }, { "name": "74730", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74730" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "openSUSE-SU-2015:0969", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html" }, { "name": "74730", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74730" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-3910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2015:0969", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html" }, { "name": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html" }, { "name": "74730", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74730" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-3910", "datePublished": "2015-05-20T10:00:00", "dateReserved": "2015-05-12T00:00:00", "dateUpdated": "2024-08-06T05:56:16.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-3679
Vulnerability from cvelistv5
Published
2016-03-29 10:00
Modified
2024-08-06 00:03
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-0525.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html | vendor-advisory, x_refsource_SUSE | |
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1035423 | vdb-entry, x_refsource_SECTRACK | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html | vendor-advisory, x_refsource_SUSE | |
http://www.ubuntu.com/usn/USN-2955-1 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:03:34.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0525", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html" }, { "name": "openSUSE-SU-2016:0929", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html" }, { "name": "1035423", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035423" }, { "name": "openSUSE-SU-2016:0930", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html" }, { "name": "USN-2955-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2955-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2016:0525", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html" }, { "name": "openSUSE-SU-2016:0929", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html" }, { "name": "1035423", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035423" }, { "name": "openSUSE-SU-2016:0930", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html" }, { "name": "USN-2955-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2955-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-3679", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:0525", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html" }, { "name": "openSUSE-SU-2016:0929", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html" }, { "name": "openSUSE-SU-2016:1059", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html" }, { "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html" }, { "name": "1035423", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035423" }, { "name": "openSUSE-SU-2016:0930", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html" }, { "name": "USN-2955-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2955-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-3679", "datePublished": "2016-03-29T10:00:00", "dateReserved": "2016-03-28T00:00:00", "dateUpdated": "2024-08-06T00:03:34.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6668
Vulnerability from cvelistv5
Published
2014-03-05 02:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=344186" }, { "name": "65930", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65930" }, { "name": "DSA-2883", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0516.html" }, { "name": "61184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61184" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=19475" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=343964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=347909" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=19553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=19599" }, { "name": "MDVSA-2015:142", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=344186" }, { "name": "65930", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65930" }, { "name": "DSA-2883", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0516.html" }, { "name": "61184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61184" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=19475" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=343964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=347909" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=19553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=19599" }, { "name": "MDVSA-2015:142", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://code.google.com/p/chromium/issues/detail?id=344186", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=344186" }, { "name": "65930", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65930" }, { "name": "DSA-2883", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2883" }, { "name": "http://advisories.mageia.org/MGASA-2014-0516.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0516.html" }, { "name": "61184", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61184" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389" }, { "name": "https://code.google.com/p/v8/source/detail?r=19475", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=19475" }, { "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=343964", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=343964" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=347909", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=347909" }, { "name": "https://code.google.com/p/v8/source/detail?r=19553", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=19553" }, { "name": "https://code.google.com/p/v8/source/detail?r=19599", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=19599" }, { "name": "MDVSA-2015:142", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6668", "datePublished": "2014-03-05T02:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3152
Vulnerability from cvelistv5
Published
2014-05-21 10:00
Modified
2024-08-06 10:35
Severity ?
EPSS score ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:35:56.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-6845", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=20363" }, { "name": "FEDORA-2015-6890", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html" }, { "name": "FEDORA-2015-6908", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html" }, { "name": "DSA-2939", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2939" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html" }, { "name": "60372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60372" }, { "name": "openSUSE-SU-2014:0783", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=358057" }, { "name": "59155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59155" }, { "name": "58920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58920" }, { "name": "1030270", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030270" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "FEDORA-2015-6845", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=20363" }, { "name": "FEDORA-2015-6890", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html" }, { "name": "FEDORA-2015-6908", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html" }, { "name": "DSA-2939", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2939" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html" }, { "name": "60372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60372" }, { "name": "openSUSE-SU-2014:0783", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=358057" }, { "name": "59155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59155" }, { "name": "58920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58920" }, { "name": "1030270", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030270" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2014-3152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-6845", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html" }, { "name": "https://code.google.com/p/v8/source/detail?r=20363", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=20363" }, { "name": "FEDORA-2015-6890", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html" }, { "name": "FEDORA-2015-6908", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html" }, { "name": "DSA-2939", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2939" }, { "name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html" }, { "name": "60372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60372" }, { "name": "openSUSE-SU-2014:0783", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=358057", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=358057" }, { "name": "59155", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59155" }, { "name": "58920", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58920" }, { "name": "1030270", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030270" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2014-3152", "datePublished": "2014-05-21T10:00:00", "dateReserved": "2014-05-03T00:00:00", "dateUpdated": "2024-08-06T10:35:56.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1677
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/602970 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/90876 | vdb-entry, x_refsource_BID | |
https://codereview.chromium.org/1936083002 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1035981 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2016/dsa-3590 | vendor-advisory, x_refsource_DEBIAN | |
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2992-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2016:1190 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201607-07 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:13.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/602970" }, { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1936083002" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/602970" }, { "name": "90876", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1936083002" }, { "name": "openSUSE-SU-2016:1496", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/602970", "refsource": "CONFIRM", "url": "https://crbug.com/602970" }, { "name": "90876", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90876" }, { "name": "https://codereview.chromium.org/1936083002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1936083002" }, { "name": "openSUSE-SU-2016:1496", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html" }, { "name": "1035981", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035981" }, { "name": "DSA-3590", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html" }, { "name": "USN-2992-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2992-1" }, { "name": "openSUSE-SU-2016:1430", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html" }, { "name": "RHSA-2016:1190", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1190" }, { "name": "GLSA-201607-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-07" }, { "name": "openSUSE-SU-2016:1433", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-1677", "datePublished": "2016-06-05T23:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:13.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7967
Vulnerability from cvelistv5
Published
2014-10-08 10:00
Modified
2024-08-06 13:03
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-08T08:57:00", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2014-7967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2014-7967", "datePublished": "2014-10-08T10:00:00", "dateReserved": "2014-10-08T00:00:00", "dateUpdated": "2024-08-06T13:03:27.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2555
Vulnerability from cvelistv5
Published
2009-07-21 16:00
Modified
2024-08-07 05:52
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html | x_refsource_CONFIRM | |
http://code.google.com/p/chromium/issues/detail?id=14719 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/35722 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51801 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/35844 | third-party-advisory, x_refsource_SECUNIA | |
http://codereview.chromium.org/141042 | x_refsource_CONFIRM | |
http://codereview.chromium.org/141042/diff/6/1004 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/1924 | vdb-entry, x_refsource_VUPEN | |
http://www.osvdb.org/55939 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:15.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=14719" }, { "name": "35722", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35722" }, { "name": "googlechrome-javascript-bo(51801)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801" }, { "name": "35844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35844" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://codereview.chromium.org/141042" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://codereview.chromium.org/141042/diff/6/1004" }, { "name": "ADV-2009-1924", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1924" }, { "name": "55939", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55939" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=14719" }, { "name": "35722", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35722" }, { "name": "googlechrome-javascript-bo(51801)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801" }, { "name": "35844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35844" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://codereview.chromium.org/141042" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://codereview.chromium.org/141042/diff/6/1004" }, { "name": "ADV-2009-1924", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1924" }, { "name": "55939", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55939" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=14719", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=14719" }, { "name": "35722", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35722" }, { "name": "googlechrome-javascript-bo(51801)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801" }, { "name": "35844", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35844" }, { "name": "http://codereview.chromium.org/141042", "refsource": "CONFIRM", "url": "http://codereview.chromium.org/141042" }, { "name": "http://codereview.chromium.org/141042/diff/6/1004", "refsource": "CONFIRM", "url": "http://codereview.chromium.org/141042/diff/6/1004" }, { "name": "ADV-2009-1924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1924" }, { "name": "55939", "refsource": "OSVDB", "url": "http://www.osvdb.org/55939" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2555", "datePublished": "2009-07-21T16:00:00", "dateReserved": "2009-07-21T00:00:00", "dateUpdated": "2024-08-07T05:52:15.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2632
Vulnerability from cvelistv5
Published
2013-03-21 21:00
Modified
2024-09-17 00:11
Severity ?
EPSS score ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
References
▼ | URL | Tags |
---|---|---|
http://code.google.com/p/v8/source/browse/trunk/ChangeLog | x_refsource_CONFIRM | |
https://code.google.com/p/chromium/issues/detail?id=194749 | x_refsource_CONFIRM | |
http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:44:32.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=194749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=194749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog", "refsource": "CONFIRM", "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=194749", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=194749" }, { "name": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2632", "datePublished": "2013-03-21T21:00:00Z", "dateReserved": "2013-03-21T00:00:00Z", "dateUpdated": "2024-09-17T00:11:00.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-5037
Vulnerability from cvelistv5
Published
2011-12-30 01:00
Modified
2024-08-07 00:23
Severity ?
EPSS score ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
References
▼ | URL | Tags |
---|---|---|
http://www.nruns.com/_downloads/advisory28122011.pdf | x_refsource_MISC | |
http://www.kb.cert.org/vuls/id/903934 | third-party-advisory, x_refsource_CERT-VN | |
http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.ocert.org/advisories/ocert-2011-003.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-11-06T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.nruns.com/_downloads/advisory28122011.pdf", "refsource": "MISC", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "VU#903934", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "name": "http://www.ocert.org/advisories/ocert-2011-003.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5037", "datePublished": "2011-12-30T01:00:00", "dateReserved": "2011-12-29T00:00:00", "dateUpdated": "2024-08-07T00:23:39.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5120
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/56413 | vdb-entry, x_refsource_BID | |
https://code.google.com/p/chromium/issues/detail?id=150729 | x_refsource_CONFIRM | |
http://osvdb.org/87085 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79867 | vdb-entry, x_refsource_XF | |
http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:01.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56413", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56413" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=150729" }, { "name": "87085", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/87085" }, { "name": "chrome-cve20125120-code-exec(79867)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "56413", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56413" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=150729" }, { "name": "87085", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/87085" }, { "name": "chrome-cve20125120-code-exec(79867)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2012-5120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56413", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56413" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=150729", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=150729" }, { "name": "87085", "refsource": "OSVDB", "url": "http://osvdb.org/87085" }, { "name": "chrome-cve20125120-code-exec(79867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867" }, { "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2012-5120", "datePublished": "2012-11-07T11:00:00", "dateReserved": "2012-09-24T00:00:00", "dateUpdated": "2024-08-06T20:58:01.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1704
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2014/dsa-2883 | vendor-advisory, x_refsource_DEBIAN | |
http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-201408-16.xml | vendor-advisory, x_refsource_GENTOO | |
https://code.google.com/p/v8/source/detail?r=18564 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1029914 | vdb-entry, x_refsource_SECTRACK | |
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html | vendor-advisory, x_refsource_SUSE | |
https://code.google.com/p/chromium/issues/detail?id=345715 | x_refsource_CONFIRM | |
https://code.google.com/p/v8/source/detail?r=19668 | x_refsource_CONFIRM | |
https://code.google.com/p/v8/source/detail?r=19614 | x_refsource_CONFIRM | |
https://code.google.com/p/chromium/issues/detail?id=349079 | x_refsource_CONFIRM | |
https://code.google.com/p/chromium/issues/detail?id=328202 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:10.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2883", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html" }, { "name": "GLSA-201408-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=18564" }, { "name": "1029914", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029914" }, { "name": "openSUSE-SU-2014:0501", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=345715" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=19668" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/v8/source/detail?r=19614" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=349079" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=328202" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "DSA-2883", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2883" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html" }, { "name": "GLSA-201408-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=18564" }, { "name": "1029914", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029914" }, { "name": "openSUSE-SU-2014:0501", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=345715" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=19668" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/v8/source/detail?r=19614" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=349079" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=328202" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2014-1704", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-2883", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2883" }, { "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html" }, { "name": "GLSA-201408-16", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" }, { "name": "https://code.google.com/p/v8/source/detail?r=18564", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=18564" }, { "name": "1029914", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029914" }, { "name": "openSUSE-SU-2014:0501", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=345715", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=345715" }, { "name": "https://code.google.com/p/v8/source/detail?r=19668", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=19668" }, { "name": "https://code.google.com/p/v8/source/detail?r=19614", "refsource": "CONFIRM", "url": "https://code.google.com/p/v8/source/detail?r=19614" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=349079", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=349079" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=328202", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=328202" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2014-1704", "datePublished": "2014-03-16T10:00:00", "dateReserved": "2014-01-29T00:00:00", "dateUpdated": "2024-08-06T09:50:10.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1669
Vulnerability from cvelistv5
Published
2016-05-14 21:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "90584", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90584" }, { "name": "RHSA-2017:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "name": "1035872", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035872" }, { "name": "RHSA-2016:1080", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "name": "openSUSE-SU-2016:1304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "name": "RHSA-2017:0881", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1945313002" }, { "name": "RHSA-2018:0336", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "name": "RHSA-2017:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "name": "openSUSE-SU-2016:1655", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "USN-2960-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "name": "FEDORA-2016-6fd3131c03", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/" }, { "name": "FEDORA-2016-e720bc8451", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://crbug.com/606115" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2017:0879", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "name": "openSUSE-SU-2016:1834", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "name": "RHSA-2017:0002", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "name": "openSUSE-SU-2016:1319", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "name": "GLSA-201605-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201605-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-22T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "90584", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90584" }, { "name": "RHSA-2017:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "name": "1035872", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035872" }, { "name": "RHSA-2016:1080", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "name": "openSUSE-SU-2016:1304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "name": "RHSA-2017:0881", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1945313002" }, { "name": "RHSA-2018:0336", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "name": "RHSA-2017:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "name": "openSUSE-SU-2016:1655", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "name": "DSA-3590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "USN-2960-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "name": "FEDORA-2016-6fd3131c03", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/" }, { "name": "FEDORA-2016-e720bc8451", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://crbug.com/606115" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2017:0879", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "name": "openSUSE-SU-2016:1834", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "name": "RHSA-2017:0002", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "name": "openSUSE-SU-2016:1319", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "name": "GLSA-201605-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201605-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "90584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90584" }, { "name": "RHSA-2017:0880", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "name": "1035872", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035872" }, { "name": "RHSA-2016:1080", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "name": "openSUSE-SU-2016:1304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "name": "RHSA-2017:0881", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "name": "https://codereview.chromium.org/1945313002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1945313002" }, { "name": "RHSA-2018:0336", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "name": "RHSA-2017:0882", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "name": "openSUSE-SU-2016:1655", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "name": "DSA-3590", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "name": "USN-2960-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "name": "FEDORA-2016-6fd3131c03", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/" }, { "name": "FEDORA-2016-e720bc8451", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/" }, { "name": "https://crbug.com/606115", "refsource": "CONFIRM", "url": "https://crbug.com/606115" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2017:0879", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "name": "openSUSE-SU-2016:1834", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "name": "RHSA-2017:0002", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "name": "openSUSE-SU-2016:1319", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "name": "GLSA-201605-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201605-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-1669", "datePublished": "2016-05-14T21:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:12.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2843
Vulnerability from cvelistv5
Published
2016-03-06 02:00
Modified
2024-08-05 23:32
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1035185 | vdb-entry, x_refsource_SECTRACK | |
http://www.ubuntu.com/usn/USN-2920-1 | vendor-advisory, x_refsource_UBUNTU | |
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:32:21.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035185", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035185" }, { "name": "USN-2920-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "1035185", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035185" }, { "name": "USN-2920-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-2843", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035185", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035185" }, { "name": "USN-2920-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-2843", "datePublished": "2016-03-06T02:00:00", "dateReserved": "2016-03-05T00:00:00", "dateUpdated": "2024-08-05T23:32:21.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2838
Vulnerability from cvelistv5
Published
2013-05-22 10:00
Modified
2024-08-06 15:52
Severity ?
EPSS score ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://code.google.com/p/chromium/issues/detail?id=235311 | x_refsource_CONFIRM | |
http://www.debian.org/security/2013/dsa-2695 | vendor-advisory, x_refsource_DEBIAN | |
http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:52:20.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=235311" }, { "name": "DSA-2695", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html" }, { "name": "oval:org.mitre.oval:def:16625", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=235311" }, { "name": "DSA-2695", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html" }, { "name": "oval:org.mitre.oval:def:16625", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2013-2838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://code.google.com/p/chromium/issues/detail?id=235311", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=235311" }, { "name": "DSA-2695", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2695" }, { "name": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html" }, { "name": "oval:org.mitre.oval:def:16625", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2013-2838", "datePublished": "2013-05-22T10:00:00", "dateReserved": "2013-04-11T00:00:00", "dateUpdated": "2024-08-06T15:52:20.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8478
Vulnerability from cvelistv5
Published
2015-12-06 01:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2825-1 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:41.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" }, { "name": "USN-2825-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2825-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T20:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" }, { "name": "USN-2825-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2825-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-8478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html" }, { "name": "USN-2825-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2825-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-8478", "datePublished": "2015-12-06T01:00:00", "dateReserved": "2015-12-05T00:00:00", "dateUpdated": "2024-08-06T08:20:41.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2238
Vulnerability from cvelistv5
Published
2015-03-09 00:00
Modified
2024-08-06 05:10
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-2521-1 | vendor-advisory, x_refsource_UBUNTU | |
http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2521-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2521-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-13T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-2521-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2521-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2521-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2521-1" }, { "name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2238", "datePublished": "2015-03-09T00:00:00", "dateReserved": "2015-03-08T00:00:00", "dateUpdated": "2024-08-06T05:10:15.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5128
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/56413 | vdb-entry, x_refsource_BID | |
https://code.google.com/p/chromium/issues/detail?id=157124 | x_refsource_CONFIRM | |
http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html | x_refsource_CONFIRM | |
http://osvdb.org/87081 | vdb-entry, x_refsource_OSVDB | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:02.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56413", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56413" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=157124" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "name": "87081", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/87081" }, { "name": "oval:org.mitre.oval:def:15221", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "56413", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56413" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=157124" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "name": "87081", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/87081" }, { "name": "oval:org.mitre.oval:def:15221", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2012-5128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56413", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56413" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=157124", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=157124" }, { "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html" }, { "name": "87081", "refsource": "OSVDB", "url": "http://osvdb.org/87081" }, { "name": "oval:org.mitre.oval:def:15221", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2012-5128", "datePublished": "2012-11-07T11:00:00", "dateReserved": "2012-09-24T00:00:00", "dateUpdated": "2024-08-06T20:58:02.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }