cve-2013-6639
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17801"
          },
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17801"
        },
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6639",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17801",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17801"
            },
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319835",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6639",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-6639\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-12-07T00:55:04.007\",\"lastModified\":\"2014-03-06T04:49:37.297\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) o posiblemente tienen otro impacto no especificado por medio de c\u00f3digo JavaScript que establece el valor de un elemento de matriz con un \u00edndice dise\u00f1ado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"31.0.1650.62\",\"matchCriteriaId\":\"5B166B1D-2593-4AC1-B6B7-136821A6C742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB7361C-D835-4EA4-A02A-517A88235E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8FBD4F-A625-4481-ACC3-11D1EC38E61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54CE56C0-FEBB-4B88-B492-7F4834F1E7D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1591A0BA-598A-4B52-990B-D897D0717659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2399FF12-3C99-4822-9C7F-ACE21A75B07D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F6EDE-7B69-4522-880B-5D384BA165B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F05FCCF-7EF3-4AE8-9699-C59716B64FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABC4ED3-D2F4-49E4-917C-14CBD4B48217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DACE52-4FEE-46DB-8A3E-453927346324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB25316-F742-489F-982A-F2E93CC2A991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC97D41-FC3F-4257-ADCF-A18CE16BD123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D94E9E7-694E-4D4D-87E3-C599BF0D34E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95693DB4-F3A3-4E9B-81BC-9659DC28266F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543A3EED-3B52-4F32-91CB-CE519502DAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA826854-B16A-4F3B-9B45-B20967C398CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5EBF2E-E025-4F7F-8B59-E898526509CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57710E9D-5ACE-43B8-87E9-B62FE8602316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2094C58D-F541-4622-8A85-0F29E8FA2C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170A2964-5947-4DDB-8AE2-C919BEF38DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"095EF1A2-A17B-4D1D-A314-770757DBC77F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15659D3B-13DB-447D-B680-3CBA8A153B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"206DDB27-676F-4373-A0CC-762C9F593E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE66FCD-C9F5-4341-983A-BED55E80C3CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E32F32F-BEFA-41E2-B77E-576662A36A45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CC0102-E20D-479C-AF93-1DBCD0052B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA262B88-A7F0-4F27-A002-7CFFF097D95E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D23D07-42C3-49E6-B381-E4F8F7392ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66941327-5BC4-4F22-920E-5A1E9A2A2234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01B6CFF-9602-4D81-BCB0-49F584B55AE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC5025C-3FEC-4C14-B785-5B3B8E093BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB6E22F-B320-449C-97A2-EB8BFB54B73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13D619A-70FA-4C77-8603-6EEA8F6193D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32059BF8-EF17-41C1-A0FC-39B41E775F3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6636E503-0532-4E10-881E-C3E929CE5B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2259D6-6B9F-4625-9E69-CD157748ABBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C9F265B-5685-445B-9EEB-546849AD9272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F7A611-76FC-4AE4-8D5A-F7E75270FDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2FC44E-D049-42B0-AD76-172C1ED06D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCCB144-4569-4B53-9DE5-A5530135D6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699343EA-5C96-4ADB-AADE-3490197DFD8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CABE41D1-D7F1-417C-80D3-80C404BD9546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71B69CB-3D77-4931-9E3B-9225B7B63EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ED428E-3403-4363-A7B1-A68E65CF7A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05E5233-03DE-425F-8328-106E52FDEF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B4CB82-9609-4C90-8FC6-8BCC147B456F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B695203-6850-49BC-BAA8-A91E4350A713\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1088A37-81E0-4BAA-917A-047DA78B4144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB910D57-F102-4F8D-9A94-5A4DD30EF177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.22.24\",\"matchCriteriaId\":\"F8810453-9BFB-4FFC-89DB-844F7049EEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E875447E-662E-46BA-BA2D-79EA05A23DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC95D6E-45D2-4527-9E63-82F4CF838133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC289673-A492-4DB4-9BB7-59B622D23445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF98EA1-3631-46CE-B376-77C202FDDC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"716E3104-48AF-47FC-ADDD-99F9F6E95583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61E7EEE-4692-475A-A654-FE71F91A65A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FCBDC9-F3DA-4336-9A5A-149E89358C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E610217-F42C-43D2-A407-A47EE7B582A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054B64BA-2248-40E2-AAFE-46E51FF6526B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D43992C-A465-43D0-BF25-7D20A7251513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A2A3D5-D6C0-47FD-BD4F-E5658549224C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F638D4A-DB8A-4923-B230-28CED7C73710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4F169A-7A16-40C0-B5AE-06332E3AFF80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052BC6A2-B637-419D-83BF-F196F5A2072F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D1B607-9E27-4819-AD27-74F3A94FA08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012ED965-2639-4B47-B161-38241573FB3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8887E81-31C5-462B-8809-C6B19D15B728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE2658F-C3DE-465A-9187-DD95F29CBE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81470A7C-319E-44AB-8231-DDABAF2B37E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D14D52-7AAA-4A69-A2BE-88021ABA02CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"513676FD-CF07-4039-A74E-077F06A768C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9279B05-F5E2-4D52-96F0-327D7327270B\"}]}]}],\"references\":[{\"url\":\"http://code.google.com/p/v8/source/detail?r=17801\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/56216\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/56217\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2811\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1029442\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=319835\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.