Vulnerabilites related to google - v8
Vulnerability from fkie_nvd
Published
2013-03-21 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Impacted products
Vendor Product Version
google chrome *
google v8 *
google v8 3.17.0
google v8 3.17.1
google v8 3.17.2
google v8 3.17.3
google v8 3.17.4
google v8 3.17.5
google v8 3.17.6
google v8 3.17.7
google v8 3.17.8
google v8 3.17.9
google v8 3.17.10
google v8 3.17.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "913E5E2D-2C74-4AE5-8808-4FCEF0FB0AC2",
              "versionEndIncluding": "27.0.1444.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F6776E-25BA-44C4-B9A9-A0B961D838B5",
              "versionEndIncluding": "3.17.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B1935-3469-4540-84F5-4DEA53671FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F251A3F-BEF8-4410-9DFB-5ED8BBC7E61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0659DCB-0831-4862-8905-B3C33DBFD990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DA481F-4E0E-48FE-9552-D7EB466CC024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C066C47-8882-4F54-8071-321960DF1CAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C23E1D-472F-469B-82D2-3D68A3FBE015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A37442-7DC7-40A2-9B45-3B6C4B275E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA01DAB5-0806-4E90-809C-F0AF4E470801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D48CC42-FC82-4183-A5BB-35208CDD78A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C831507-B5ED-4CC9-BC91-4046F0DBDACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "128A2521-5428-4199-B745-094083E05E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.17.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE1BA769-E534-4C7C-BAB6-29A348521D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
    },
    {
      "lang": "es",
      "value": "Google V8 anterior a v3.17.13, usado en Google Chrome anterior a v27.0.1444.3, permite a atacantes remotos causar una denegaci\u00f3n de servicios (ca\u00edda de la aplicaci\u00f3n) o posiblemente tener otros impactos a trav\u00e9s de c\u00f3digo JavaScript manipulado, como se mostr\u00f3 con el juego Bejewele."
    }
  ],
  "id": "CVE-2013-2632",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-03-21T21:55:00.960",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Exploit"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-06 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99CABF0F-D201-46AE-83DC-09257264BF7D",
              "versionEndIncluding": "48.0.2564.116",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684",
              "versionEndIncluding": "4.9.385",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.26, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.75, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2016-2843",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-06T02:59:13.850",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035185"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2920-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2920-1"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
References
[email protected]http://code.google.com/p/v8/source/detail?r=17801Patch
[email protected]http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
[email protected]http://secunia.com/advisories/56216
[email protected]http://secunia.com/advisories/56217
[email protected]http://www.debian.org/security/2013/dsa-2811
[email protected]http://www.securitytracker.com/id/1029442
[email protected]https://code.google.com/p/chromium/issues/detail?id=319860
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17801Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319860
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) por medio de c\u00f3digo JavaScript que establece una variable en el valor de un elemento de matriz con un \u00edndice dise\u00f1ado."
    }
  ],
  "id": "CVE-2013-6640",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:04.037",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-15 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
google chrome *
google chrome 24.0.1272.0
google chrome 24.0.1272.1
google chrome 24.0.1273.0
google chrome 24.0.1274.0
google chrome 24.0.1275.0
google chrome 24.0.1276.0
google chrome 24.0.1276.1
google chrome 24.0.1277.0
google chrome 24.0.1278.0
google chrome 24.0.1279.0
google chrome 24.0.1280.0
google chrome 24.0.1281.0
google chrome 24.0.1281.1
google chrome 24.0.1281.2
google chrome 24.0.1281.3
google chrome 24.0.1282.0
google chrome 24.0.1283.0
google chrome 24.0.1284.0
google chrome 24.0.1284.1
google chrome 24.0.1284.2
google chrome 24.0.1285.0
google chrome 24.0.1285.1
google chrome 24.0.1285.2
google chrome 24.0.1286.0
google chrome 24.0.1286.1
google chrome 24.0.1287.0
google chrome 24.0.1287.1
google chrome 24.0.1288.0
google chrome 24.0.1288.1
google chrome 24.0.1289.0
google chrome 24.0.1289.1
google chrome 24.0.1290.0
google chrome 24.0.1290.1
google chrome 24.0.1290.2
google chrome 24.0.1291.0
google chrome 24.0.1291.1
google chrome 24.0.1292.0
google chrome 24.0.1292.1
google chrome 24.0.1293.0
google chrome 24.0.1294.0
google chrome 24.0.1295.0
google chrome 24.0.1296.0
google chrome 24.0.1296.1
google chrome 24.0.1297.0
google chrome 24.0.1298.0
google chrome 24.0.1298.1
google chrome 24.0.1299.0
google chrome 24.0.1300.0
google chrome 24.0.1301.0
google chrome 24.0.1301.1
google chrome 24.0.1301.2
google chrome 24.0.1302.0
google chrome 24.0.1303.0
google chrome 24.0.1304.0
google chrome 24.0.1304.1
google chrome 24.0.1305.0
google chrome 24.0.1305.1
google chrome 24.0.1305.2
google chrome 24.0.1305.3
google chrome 24.0.1305.4
google chrome 24.0.1306.0
google chrome 24.0.1306.1
google chrome 24.0.1307.0
google chrome 24.0.1307.1
google chrome 24.0.1308.0
google chrome 24.0.1309.0
google chrome 24.0.1310.0
google chrome 24.0.1311.0
google chrome 24.0.1311.1
google chrome 24.0.1312.0
google chrome 24.0.1312.1
google chrome 24.0.1312.2
google chrome 24.0.1312.3
google chrome 24.0.1312.4
google chrome 24.0.1312.5
google chrome 24.0.1312.6
google chrome 24.0.1312.7
google chrome 24.0.1312.8
google chrome 24.0.1312.9
google chrome 24.0.1312.10
google chrome 24.0.1312.11
google chrome 24.0.1312.12
google chrome 24.0.1312.13
google chrome 24.0.1312.14
google chrome 24.0.1312.15
google chrome 24.0.1312.16
google chrome 24.0.1312.17
google chrome 24.0.1312.18
google chrome 24.0.1312.19
google chrome 24.0.1312.20
google chrome 24.0.1312.21
google chrome 24.0.1312.22
google chrome 24.0.1312.23
google chrome 24.0.1312.24
google chrome 24.0.1312.25
google chrome 24.0.1312.26
google chrome 24.0.1312.27
google chrome 24.0.1312.28
google chrome 24.0.1312.29
google chrome 24.0.1312.30
google chrome 24.0.1312.31
google chrome 24.0.1312.32
google chrome 24.0.1312.33
google chrome 24.0.1312.34
google chrome 24.0.1312.35
google chrome 24.0.1312.36
google chrome 24.0.1312.37
google chrome 24.0.1312.38
google chrome 24.0.1312.39
google chrome 24.0.1312.40
google chrome 24.0.1312.41
google chrome 24.0.1312.42
google chrome 24.0.1312.43
google chrome 24.0.1312.44
google chrome 24.0.1312.45
google chrome 24.0.1312.46
google chrome 24.0.1312.47
google chrome 24.0.1312.48
google chrome 24.0.1312.49
google chrome 24.0.1312.50
google v8 *
google v8 1.0
google v8 2.4.0
google v8 2.4.1
google v8 2.4.2
google v8 2.4.3
google v8 2.4.4
google v8 2.4.5
google v8 2.4.6
google v8 2.4.7
google v8 2.4.8
google v8 2.4.9
google v8 2.5.0
google v8 2.5.1
google v8 2.5.2
google v8 2.5.3
google v8 2.5.4
google v8 2.5.5
google v8 2.5.6
google v8 2.5.7
google v8 2.5.8
google v8 2.5.9
google v8 3.0.0
google v8 3.0.1
google v8 3.0.2
google v8 3.0.3
google v8 3.0.4
google v8 3.0.5
google v8 3.0.6
google v8 3.0.7
google v8 3.0.8
google v8 3.0.9
google v8 3.0.10
google v8 3.0.11
google v8 3.0.12
google v8 3.1.0
google v8 3.1.1
google v8 3.1.2
google v8 3.1.3
google v8 3.1.4
google v8 3.1.5
google v8 3.1.6
google v8 3.1.7
google v8 3.1.8
google v8 3.10.0
google v8 3.10.1
google v8 3.10.2
google v8 3.10.3
google v8 3.10.4
google v8 3.10.5
google v8 3.10.6
google v8 3.10.7
google v8 3.10.8
google v8 3.11.0
google v8 3.11.1
google v8 3.11.2
google v8 3.11.3
google v8 3.11.4
google v8 3.11.5
google v8 3.11.6
google v8 3.11.7
google v8 3.11.8
google v8 3.11.9
google v8 3.11.10
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
google v8 3.13.7
google v8 3.13.7.5
google v8 3.14.0
google v8 3.14.1
google v8 3.14.2
google v8 3.14.3
google v8 3.14.4
opensuse opensuse 12.1
opensuse opensuse 12.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BACC18D7-0CBD-403E-ADF6-346FF310201C",
              "versionEndIncluding": "24.0.1312.51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5B6148-A65D-4B54-97D2-80C955DFB7BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0733FF37-E04B-47BC-B494-589907245D84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5933EFF8-0F3E-4BFB-863D-8E91E7ABAB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71206885-9BAD-4AAD-853D-08734B925D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE5F777-C936-478F-A270-46174F4D59D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "519386D0-AEBF-40B1-87C6-475FBCF0E9A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EF13A2-4F0D-45AE-B0B1-90A07A00DE07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E9A849-9E6D-4C69-B58B-82F4A7291518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "555CFBE3-5706-4638-83DE-9FDB42775796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4000589-5978-4145-8BEA-541A25E11A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6193DA2-0A92-46F4-AB30-AB8324F086CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF624555-3DAD-4785-9CA7-11123ECCC4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E998F6-6DCD-480E-BEE6-C6E2D610991E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA439D7-9BDC-4CEB-B216-56DE42E43FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF9E13AA-587C-4D97-B96D-94E4F3B8B47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D10760-2B34-4571-A797-A9A37D3DC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F58480-76E1-4AE9-88C9-B36AF1B7BCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F45B9B0-4849-4B98-A3D2-21264A581E62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B715500-15C6-4976-83B3-4556AEDE48F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4ECD4FD-37A0-4EDB-9D0C-5EC08CC5735E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "391AE318-EFCF-4126-93E4-D3C3FABDF550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4DB5E-E7C5-4451-88F6-865BFA55F222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4F0CE9-6147-4BA0-9D95-630CB31D1D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "968B45A4-88EF-4AEF-AAFC-AF098568765E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70F824E6-FD16-45A4-9A7B-D411B4EB028A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0964F31E-6337-43CC-B770-A824B2622AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE987D92-9DD5-4487-8AD2-C90123F9FBD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5E7FAB-764B-4320-AB85-BCEB86584B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5AB013-3BCE-469C-A5A3-F912894ACFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0C8072-3CE9-4AF8-8F11-592BABEE5A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFD890B-C22E-417E-B809-9DF9BCF94914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF9E4CE-9F35-4C51-9BD4-59C07605CEFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BCB3DF-A626-43E3-B7E1-561B0BC74144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FFD00C3-EEAC-4E5F-A819-D5FFEFD94782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "842D5CCF-1F5E-49F4-8E56-2D01C85E0293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB9B44-FF61-4C42-BC5D-724841E92231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "838E694E-4BDD-4282-B56F-621438D395C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E41E28F-4D3B-4687-948B-64599B01077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A0CF99-430D-459D-AE27-0DF95BC17699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B0AD98-B4B7-41DA-B718-99CA9051165A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A4CF329-7CC6-4926-98FB-C0A0FEED683B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89E7CB5-D647-49E8-81F2-4B86C9571861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "249EDC4D-481D-467E-8518-107C08A4EBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9141CAF4-096E-448C-A056-62D8C7EC608F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33DA6C9-2389-4AC1-9ADE-1EED5F476E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D03843DD-1147-46FF-85E5-7E040D4815F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2E4D98A-1FDE-4852-BCFE-31E9E4A3C09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4786F4BC-CD98-487F-A31D-8B55592D7C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3801F9E4-329F-4700-AB0B-9208923C375D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9CD1B9D-E446-47DC-889B-29DDB2D4F28D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B0BB4F-80B4-4DC0-B763-3C5E92066CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6920B80-BC9E-4217-AA37-4136EB86F32F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "626F8FB4-7165-42C1-90AC-64ECAE0F0A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0A8316-668D-4DF7-BB56-E6D76239C833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA612AE3-D28F-49CE-8573-636BC54D3969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E67CAC-FED4-433D-B350-DC77D83F4E62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB334A25-0DCE-49ED-AADF-CA44645E99DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF27EE64-4654-4AB7-8ABB-B57AE6B9FFC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D368FE5A-139E-4930-8361-A0EFFCD1E74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBB2D4E-B856-42B2-85A1-5A0DB491A605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D27E4F9-A42D-4364-8864-506F772A7431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46BEE7CE-FAA8-4C2B-BCD7-09C336F7FC19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9A123B9-C4DB-406F-B934-2A896C7AAB43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE8F018-3CBA-43AA-991E-0E8A42965846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1051D8-1827-4255-9317-840DC7570978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6544BEB1-AD9C-46E7-8E41-9D8D7C1E13A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "241D1EB2-4003-446F-9988-F6AC3FD64705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "634F8D3D-930E-46D1-80E9-6015EA9FECD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4A9FFA-1576-4175-9BD6-CF975EC72847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C2901C-19CA-402A-A937-31D6B5B049CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5255EB-9182-4A76-9E5B-39EFE8D86024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0230123-D8AD-41B3-918E-FB14A3D60E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD797B6-634C-4969-9014-E9540077ED17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2179C71A-9E71-4CF5-B71E-D51C9E14FE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D589505-B631-46A3-8E10-F9FE60BEEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEF94139-56C8-491D-B7D8-FC560631B654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "241AC9EF-E3D8-4B87-93CD-31F5E3AAFE1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82ED399B-C35D-4424-9B9D-215181027616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7738DF62-67D8-480A-AEAE-22A8EA2D4012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "714B6660-0D0A-4651-88D7-2D562C330054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00BDDF2-E8E6-46A2-AF3F-04A7805A9BD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C39AF29-9BB8-42F0-A5CE-00A19CD82317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4436A9ED-A5C9-4F52-90AC-294A9DB7C58A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BAD98B-D29B-446E-BEBE-5D1B91CB318E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37FF867-B515-4207-9FD2-E209B66E4D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "635B73E6-6430-4345-BD9D-427441CAA540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B35C80-44D7-4D29-9CB7-F60CC0E08359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD4FC844-D8D5-49AA-A037-0DEEA1C2D0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDB01647-2D5F-4EC8-AD8D-053C713C3301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "470CC69D-BDD6-43C8-BC4D-EB57C59F372E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "492DA7A2-7B03-4151-990D-9E3352EFDADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDCC9AC-4EFE-4647-A2B3-0545FE861747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E435677-3D60-408F-965B-C3B6F46C465C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CFAD31-FC08-4B1A-81F7-356B4B9D1ED6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "A145852B-3183-4F76-A814-C667AB5B4EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A6DD0-A396-4DCB-A52C-E8F3F437AD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2B7A7F-868F-4BBE-B660-9D07E3C0A520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F925CFC2-9537-47CB-99B1-7EB9F2AE6714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A00047-81A5-43AA-B088-F39B98582543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57EEC91-3D36-4EDF-A77A-1ED1EE980A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A20B3E7E-BEA0-4ED1-A869-A31763DADE40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "505E2084-13BC-4C30-BD66-AC0474893767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2391E91-C96C-427B-95DF-448E5508FCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1CB147-0260-41AF-AB00-C7A13310BF54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "2631DFBE-E561-4040-B694-ACDD4CBA9EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4C0DF0-B6C0-42D2-86B4-085EB67F48DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05827D-6FDB-458E-9731-F6EE2AA1F5DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "44161E2D-6F55-48D6-AB39-8CA7CBE1244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "71BCFF0B-C3ED-48DC-A5B1-264DFD5CFA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3CADED-24BC-4C64-9D56-218B663D4B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD93B2D8-9576-499F-A605-FA9482F9A374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "D03E0A1E-1AAC-43BF-940C-229D5E1E5602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2E0C70-49DD-4AA5-8F3C-028D1B4C2EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "1112199E-1E45-4A44-B0D2-AB98D8BB8F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB6D0D9-A0DE-414E-95BF-F6695176D2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "9083D717-088D-46C8-A950-AD7760219234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "222F30BC-8C6C-42B8-BAFF-FFF0365A018A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AA0CBA-CFE3-412A-8F1C-AC65108E3A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2919EA8B-CD6C-4F8B-91BC-0E9BB8EB2493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9328EDE-6345-4F65-AC56-4A0035083E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "238293ED-469D-457C-A048-60B9B880B9DF",
              "versionEndIncluding": "3.14.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "315A6CEA-0BAB-4F6D-9398-90D05FDA8D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7447D1C7-E33C-4E4F-B101-641FCEF01C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "407FA5B6-5156-472C-BF9F-7BD9EB4B0AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8DC11-511B-4222-A4E2-5DE1CEA665EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C658C0B1-3917-4E87-84C4-97D02EC35C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59E0854A-F022-4CD8-8E5E-309A323687AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B74EEFE5-A523-41BF-A5D0-586466C0A706",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.14.5.3, tal como se utiliza en Google Chrome antes v24.0.1312.52, no implementa correctamente la recolecci\u00f3n de basura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda de la aplicaci\u00f3n) o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado."
    }
  ],
  "id": "CVE-2013-0836",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-01-15T21:55:02.260",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
    },
    {
      "source": "[email protected]",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-29 10:59
Modified
2025-04-12 10:46
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
[email protected]http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.htmlVendor Advisory
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.htmlThird Party Advisory
[email protected]http://rhn.redhat.com/errata/RHSA-2016-0525.html
[email protected]http://www.securitytracker.com/id/1035423
[email protected]http://www.ubuntu.com/usn/USN-2955-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0525.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035423
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2955-1Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B379F1-426A-4D57-B27B-3746971A2684",
              "versionEndIncluding": "4.9.385",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E359098-BF8A-4A56-A152-DA06F18096B2",
              "versionEndIncluding": "49.0.2623.95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.9.385.33, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.108, permiten a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2016-3679",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-29T10:59:05.147",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035423"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2955-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2955-1"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-21 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
References
[email protected]http://code.google.com/p/chromium/issues/detail?id=14719Vendor Advisory
[email protected]http://codereview.chromium.org/141042
[email protected]http://codereview.chromium.org/141042/diff/6/1004
[email protected]http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.htmlVendor Advisory
[email protected]http://secunia.com/advisories/35844Vendor Advisory
[email protected]http://www.osvdb.org/55939
[email protected]http://www.securityfocus.com/bid/35722
[email protected]http://www.vupen.com/english/advisories/2009/1924Vendor Advisory
[email protected]https://exchange.xforce.ibmcloud.com/vulnerabilities/51801
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/chromium/issues/detail?id=14719Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://codereview.chromium.org/141042
af854a3a-2127-422b-91ae-364da2661108http://codereview.chromium.org/141042/diff/6/1004
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35844Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55939
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35722
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1924Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/51801
Impacted products
Vendor Product Version
google v8 *
google chrome *
google chrome 0.2.149.29
google chrome 0.2.149.30
google chrome 0.2.152.1
google chrome 0.2.153.1
google chrome 0.3.154.0
google chrome 0.3.154.3
google chrome 0.4.154.18
google chrome 0.4.154.22
google chrome 0.4.154.31
google chrome 0.4.154.33
google chrome 1.0.154.36
google chrome 1.0.154.39
google chrome 1.0.154.42
google chrome 1.0.154.43
google chrome 1.0.154.46
google chrome 1.0.154.48
google chrome 1.0.154.52
google chrome 1.0.154.53
google chrome 1.0.154.59
google chrome 2.0.156.1
google chrome 2.0.157.0
google chrome 2.0.157.2
google chrome 2.0.158.0
google chrome 2.0.159.0
google chrome 2.0.172
google chrome 2.0.172.30
google chrome 2.0.172.31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FB9ABA-F9DB-4F52-A62E-7400F97537A7",
              "versionEndIncluding": "1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BD1820-86D9-4ED4-A502-7F6FE82B80E4",
              "versionEndIncluding": "2.0.172.33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6659833E-E309-4797-84D4-A782237714A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4C0D93-0308-48D4-A953-9398B88E2868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5094C4-1338-4189-B5FD-C9AFFF091D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A8C3D2-82E6-453E-90B7-BA5C5D2CDF54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F95770-F36F-43C0-986F-5C819648271E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCE1FD3-8D27-4304-97F9-6F9689F2498D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6CA696-49AA-4445-B978-96C1D8CE58DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9CFA3BF-6C07-448B-8C83-AD4C524A6577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8497F93-D88A-4FFA-B988-7210608530A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5CDF938-2998-403F-B343-29B620E05D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A9B50D-5B0F-41C9-8FAF-B78CD21A0554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5223F1-85CD-4DF9-9665-BDF7B554A784",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en src/jsregexp.cc en Google V8 anterior a v1.1.10.14, como el utilizado en Google Chrome anterior a v2.0.172.37, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n en el Chrome sandbox a trav\u00e9s de una expresi\u00f3n regular JavaScript manipulada."
    }
  ],
  "id": "CVE-2009-2555",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-07-21T16:30:00.877",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
    },
    {
      "source": "[email protected]",
      "url": "http://codereview.chromium.org/141042"
    },
    {
      "source": "[email protected]",
      "url": "http://codereview.chromium.org/141042/diff/6/1004"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35844"
    },
    {
      "source": "[email protected]",
      "url": "http://www.osvdb.org/55939"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/35722"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1924"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codereview.chromium.org/141042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codereview.chromium.org/141042/diff/6/1004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/55939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/35722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google chrome 23.0.1271.0
google chrome 23.0.1271.1
google chrome 23.0.1271.2
google chrome 23.0.1271.3
google chrome 23.0.1271.4
google chrome 23.0.1271.5
google chrome 23.0.1271.6
google chrome 23.0.1271.7
google chrome 23.0.1271.8
google chrome 23.0.1271.9
google chrome 23.0.1271.10
google chrome 23.0.1271.11
google chrome 23.0.1271.12
google chrome 23.0.1271.13
google chrome 23.0.1271.14
google chrome 23.0.1271.15
google chrome 23.0.1271.16
google chrome 23.0.1271.17
google chrome 23.0.1271.18
google chrome 23.0.1271.19
google chrome 23.0.1271.20
google chrome 23.0.1271.21
google chrome 23.0.1271.22
google chrome 23.0.1271.23
google chrome 23.0.1271.24
google chrome 23.0.1271.26
google chrome 23.0.1271.30
google chrome 23.0.1271.31
google chrome 23.0.1271.32
google chrome 23.0.1271.33
google chrome 23.0.1271.35
google chrome 23.0.1271.36
google chrome 23.0.1271.37
google chrome 23.0.1271.38
google chrome 23.0.1271.39
google chrome 23.0.1271.40
google chrome 23.0.1271.41
google chrome 23.0.1271.44
google chrome 23.0.1271.45
google chrome 23.0.1271.46
google chrome 23.0.1271.49
google chrome 23.0.1271.50
google chrome 23.0.1271.51
google chrome 23.0.1271.52
google chrome 23.0.1271.53
google chrome 23.0.1271.54
google chrome 23.0.1271.55
google chrome 23.0.1271.56
google chrome 23.0.1271.57
google chrome 23.0.1271.58
google chrome 23.0.1271.59
google chrome 23.0.1271.60
google chrome 23.0.1271.61
google v8 *
google v8 1.0
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032",
              "versionEndIncluding": "23.0.1271.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E",
              "versionEndIncluding": "3.13.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, no lleva a cabo adecuadamente todas las operaciones de escritura, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-5128",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-11-07T11:43:16.053",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "[email protected]",
      "url": "http://osvdb.org/87081"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
    },
    {
      "source": "[email protected]",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/87081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-03-09 00:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4473BA-37DE-4AF1-A828-99AA9D83AAE7",
              "versionEndIncluding": "40.0.2214.115",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF6B47E-9C19-4B03-A8EC-7C338440EF52",
              "versionEndIncluding": "4.1.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.1.0.21, utilizado en Google Chrome anterior a 41.0.2272.76, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-2238",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-09T00:59:28.810",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2521-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2521-1"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9",
              "versionEndIncluding": "4.2.77.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772",
              "versionEndIncluding": "42.0.2311.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.2.77.14, utilizado en Google Chrome anterior a 42.0.2311.90, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-3333",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-19T10:59:13.287",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "[email protected]",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/74221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74221"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-30 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Impacted products
Vendor Product Version
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
    },
    {
      "lang": "es",
      "value": "Google V8 calcula los valores hash de los par\u00e1metros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante el env\u00edo de gran cantidad de par\u00e1metros a mano, como lo demuestran los ataques contra Node.js."
    }
  ],
  "id": "CVE-2011-5037",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-30T01:55:01.733",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/903934"
    },
    {
      "source": "[email protected]",
      "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/903934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
[email protected]http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
[email protected]http://security.gentoo.org/glsa/glsa-201408-16.xml
[email protected]http://www.debian.org/security/2014/dsa-2883
[email protected]http://www.securitytracker.com/id/1029914
[email protected]https://code.google.com/p/chromium/issues/detail?id=328202
[email protected]https://code.google.com/p/chromium/issues/detail?id=345715
[email protected]https://code.google.com/p/chromium/issues/detail?id=349079
[email protected]https://code.google.com/p/v8/source/detail?r=18564
[email protected]https://code.google.com/p/v8/source/detail?r=19614
[email protected]https://code.google.com/p/v8/source/detail?r=19668
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201408-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2883
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029914
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=328202
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=345715
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=349079
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=18564
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19614
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19668
Impacted products
Vendor Product Version
google chrome *
google chrome 33.0.1750.0
google chrome 33.0.1750.1
google chrome 33.0.1750.2
google chrome 33.0.1750.3
google chrome 33.0.1750.4
google chrome 33.0.1750.5
google chrome 33.0.1750.6
google chrome 33.0.1750.7
google chrome 33.0.1750.8
google chrome 33.0.1750.9
google chrome 33.0.1750.10
google chrome 33.0.1750.11
google chrome 33.0.1750.12
google chrome 33.0.1750.13
google chrome 33.0.1750.14
google chrome 33.0.1750.15
google chrome 33.0.1750.16
google chrome 33.0.1750.18
google chrome 33.0.1750.19
google chrome 33.0.1750.20
google chrome 33.0.1750.21
google chrome 33.0.1750.22
google chrome 33.0.1750.23
google chrome 33.0.1750.24
google chrome 33.0.1750.25
google chrome 33.0.1750.26
google chrome 33.0.1750.27
google chrome 33.0.1750.28
google chrome 33.0.1750.29
google chrome 33.0.1750.30
google chrome 33.0.1750.31
google chrome 33.0.1750.34
google chrome 33.0.1750.35
google chrome 33.0.1750.36
google chrome 33.0.1750.37
google chrome 33.0.1750.38
google chrome 33.0.1750.39
google chrome 33.0.1750.40
google chrome 33.0.1750.41
google chrome 33.0.1750.42
google chrome 33.0.1750.43
google chrome 33.0.1750.44
google chrome 33.0.1750.45
google chrome 33.0.1750.46
google chrome 33.0.1750.47
google chrome 33.0.1750.48
google chrome 33.0.1750.49
google chrome 33.0.1750.50
google chrome 33.0.1750.51
google chrome 33.0.1750.52
google chrome 33.0.1750.53
google chrome 33.0.1750.54
google chrome 33.0.1750.55
google chrome 33.0.1750.56
google chrome 33.0.1750.57
google chrome 33.0.1750.58
google chrome 33.0.1750.59
google chrome 33.0.1750.60
google chrome 33.0.1750.61
google chrome 33.0.1750.62
google chrome 33.0.1750.63
google chrome 33.0.1750.64
google chrome 33.0.1750.65
google chrome 33.0.1750.66
google chrome 33.0.1750.67
google chrome 33.0.1750.68
google chrome 33.0.1750.69
google chrome 33.0.1750.70
google chrome 33.0.1750.71
google chrome 33.0.1750.73
google chrome 33.0.1750.74
google chrome 33.0.1750.75
google chrome 33.0.1750.76
google chrome 33.0.1750.77
google chrome 33.0.1750.79
google chrome 33.0.1750.80
google chrome 33.0.1750.81
google chrome 33.0.1750.82
google chrome 33.0.1750.83
google chrome 33.0.1750.85
google chrome 33.0.1750.88
google chrome 33.0.1750.89
google chrome 33.0.1750.90
google chrome 33.0.1750.91
google chrome 33.0.1750.92
google chrome 33.0.1750.93
google chrome 33.0.1750.104
google chrome 33.0.1750.106
google chrome 33.0.1750.107
google chrome 33.0.1750.108
google chrome 33.0.1750.109
google chrome 33.0.1750.110
google chrome 33.0.1750.111
google chrome 33.0.1750.112
google chrome 33.0.1750.113
google chrome 33.0.1750.115
google chrome 33.0.1750.116
google chrome 33.0.1750.117
google chrome 33.0.1750.124
google chrome 33.0.1750.125
google chrome 33.0.1750.126
google chrome 33.0.1750.132
google chrome 33.0.1750.133
google chrome 33.0.1750.135
google chrome 33.0.1750.136
google chrome 33.0.1750.144
google v8 *
google v8 3.23.0
google v8 3.23.1
google v8 3.23.2
google v8 3.23.3
google v8 3.23.4
google v8 3.23.5
google v8 3.23.6
google v8 3.23.7
google v8 3.23.8
google v8 3.23.9
google v8 3.23.10
google v8 3.23.11
google v8 3.23.12
google v8 3.23.13
google v8 3.23.14
google v8 3.23.15
google v8 3.23.16



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4DDCA3-FC7A-458B-8C0A-8699ACF9CE82",
              "versionEndIncluding": "33.0.1750.146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
              "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.144:*:*:*:*:*:*:*",
              "matchCriteriaId": "55273418-C87C-4030-8068-BC6B649DEEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CE1AC76-4886-49A6-9FA0-A2B886760A81",
              "versionEndIncluding": "3.23.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92C80E8-FD13-4ECE-94E1-71011B3A8295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA61F17-6FA5-4191-99CA-B88ABBA83CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "222B289E-C7FB-433A-A9C9-B6B9B0650013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53499FFD-624D-417B-B585-B335D458404D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "308736C3-2D4C-418A-9F5E-C1986C526647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "68BFEA9C-BE4C-4F5C-9E75-7C5D27B35F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2F93F9-4651-4BC9-BCDD-95F4B617D59C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3526D70A-943D-4B0D-9F9E-5C06685E0C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB7E28F-C88F-4F2D-97BF-9278C00B1E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA5D6B2-8E57-4210-B1CB-EB16CA3F2224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BE4589-3B1B-4364-A838-A613DF3ECD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A29907D-B6D4-4919-8311-53B6F60CB403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC923E76-640B-4EDF-AC68-D370E8BE308A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4058640B-7756-47F2-852A-F2687C968C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB56717-A7CF-45C9-B8D8-75D2C4E5D4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B70BC69-7CBE-4910-9F12-E01BA9902898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "97DCE3DB-A3BB-4622-A2EC-C1551624B380",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.23.17.18, utilizado en Google Chrome anterior a 33.0.1750.149, permiten a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2014-1704",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-16T14:06:45.427",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
    },
    {
      "source": "[email protected]",
      "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1029914"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/v8/source/detail?r=18564"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/v8/source/detail?r=19614"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/v8/source/detail?r=19668"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=18564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=19614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=19668"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
References
[email protected]http://code.google.com/p/v8/source/detail?r=17800Patch
[email protected]http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
[email protected]http://secunia.com/advisories/56216
[email protected]http://secunia.com/advisories/56217
[email protected]http://www.debian.org/security/2013/dsa-2811
[email protected]http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html
[email protected]http://www.securitytracker.com/id/1029442
[email protected]https://code.google.com/p/chromium/issues/detail?id=319722
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17800Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319722
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de buffer en runtime.cc en Google V8 anteriores a 3.22.24.7, como se utiliza en Google Chrome anteriores a 31.0.1650.63, permite a atacantes remotos causar denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un array tipado grande, relacionado con las funciones (1) Runtime_TypedArrayInitialize y (2) Runtime_TypedArrayInitializeFromArrayLike."
    }
  ],
  "id": "CVE-2013-6638",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:03.977",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17800"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "[email protected]",
      "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-05 05:11
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
[email protected]http://advisories.mageia.org/MGASA-2014-0516.htmlThird Party Advisory
[email protected]http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.htmlVendor Advisory
[email protected]http://secunia.com/advisories/61184Third Party Advisory
[email protected]http://www-01.ibm.com/support/docview.wss?uid=swg21683389Third Party Advisory
[email protected]http://www.debian.org/security/2014/dsa-2883Third Party Advisory
[email protected]http://www.mandriva.com/security/advisories?name=MDVSA-2015:142Third Party Advisory
[email protected]http://www.securityfocus.com/bid/65930Third Party Advisory, VDB Entry
[email protected]https://code.google.com/p/chromium/issues/detail?id=343964Issue Tracking, Vendor Advisory
[email protected]https://code.google.com/p/chromium/issues/detail?id=344186Issue Tracking, Vendor Advisory
[email protected]https://code.google.com/p/chromium/issues/detail?id=347909Issue Tracking, Vendor Advisory
[email protected]https://code.google.com/p/v8/source/detail?r=19475Vendor Advisory
[email protected]https://code.google.com/p/v8/source/detail?r=19553Vendor Advisory
[email protected]https://code.google.com/p/v8/source/detail?r=19599Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0516.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61184Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21683389Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2883Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:142Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/65930Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=343964Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=344186Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=347909Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19475Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19553Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=19599Vendor Advisory
Impacted products
Vendor Product Version
google chrome *
google chrome 33.0.1750.0
google chrome 33.0.1750.1
google chrome 33.0.1750.2
google chrome 33.0.1750.3
google chrome 33.0.1750.4
google chrome 33.0.1750.5
google chrome 33.0.1750.6
google chrome 33.0.1750.7
google chrome 33.0.1750.8
google chrome 33.0.1750.9
google chrome 33.0.1750.10
google chrome 33.0.1750.11
google chrome 33.0.1750.12
google chrome 33.0.1750.13
google chrome 33.0.1750.14
google chrome 33.0.1750.15
google chrome 33.0.1750.16
google chrome 33.0.1750.18
google chrome 33.0.1750.19
google chrome 33.0.1750.20
google chrome 33.0.1750.21
google chrome 33.0.1750.22
google chrome 33.0.1750.23
google chrome 33.0.1750.24
google chrome 33.0.1750.25
google chrome 33.0.1750.26
google chrome 33.0.1750.27
google chrome 33.0.1750.28
google chrome 33.0.1750.29
google chrome 33.0.1750.30
google chrome 33.0.1750.31
google chrome 33.0.1750.34
google chrome 33.0.1750.35
google chrome 33.0.1750.36
google chrome 33.0.1750.37
google chrome 33.0.1750.38
google chrome 33.0.1750.39
google chrome 33.0.1750.40
google chrome 33.0.1750.41
google chrome 33.0.1750.42
google chrome 33.0.1750.43
google chrome 33.0.1750.44
google chrome 33.0.1750.45
google chrome 33.0.1750.46
google chrome 33.0.1750.47
google chrome 33.0.1750.48
google chrome 33.0.1750.49
google chrome 33.0.1750.50
google chrome 33.0.1750.51
google chrome 33.0.1750.52
google chrome 33.0.1750.53
google chrome 33.0.1750.54
google chrome 33.0.1750.55
google chrome 33.0.1750.56
google chrome 33.0.1750.57
google chrome 33.0.1750.58
google chrome 33.0.1750.59
google chrome 33.0.1750.60
google chrome 33.0.1750.61
google chrome 33.0.1750.62
google chrome 33.0.1750.63
google chrome 33.0.1750.64
google chrome 33.0.1750.65
google chrome 33.0.1750.66
google chrome 33.0.1750.67
google chrome 33.0.1750.68
google chrome 33.0.1750.69
google chrome 33.0.1750.70
google chrome 33.0.1750.71
google chrome 33.0.1750.73
google chrome 33.0.1750.74
google chrome 33.0.1750.75
google chrome 33.0.1750.76
google chrome 33.0.1750.77
google chrome 33.0.1750.79
google chrome 33.0.1750.80
google chrome 33.0.1750.81
google chrome 33.0.1750.82
google chrome 33.0.1750.83
google chrome 33.0.1750.85
google chrome 33.0.1750.88
google chrome 33.0.1750.89
google chrome 33.0.1750.90
google chrome 33.0.1750.91
google chrome 33.0.1750.92
google chrome 33.0.1750.93
google chrome 33.0.1750.104
google chrome 33.0.1750.106
google chrome 33.0.1750.107
google chrome 33.0.1750.108
google chrome 33.0.1750.109
google chrome 33.0.1750.110
google chrome 33.0.1750.111
google chrome 33.0.1750.112
google chrome 33.0.1750.113
google chrome 33.0.1750.115
google chrome 33.0.1750.116
google chrome 33.0.1750.117
google chrome 33.0.1750.124
google chrome 33.0.1750.125
google chrome 33.0.1750.126
google chrome 33.0.1750.132
google chrome 33.0.1750.133
google chrome 33.0.1750.135
google chrome 33.0.1750.136
google v8 *
google v8 3.24.0
google v8 3.24.1
google v8 3.24.2
google v8 3.24.3
google v8 3.24.4
google v8 3.24.5
google v8 3.24.6
google v8 3.24.7
google v8 3.24.8
google v8 3.24.9
google v8 3.24.10
google v8 3.24.11
google v8 3.24.12
google v8 3.24.13
google v8 3.24.14
google v8 3.24.15
google v8 3.24.16
google v8 3.24.17
google v8 3.24.18
google v8 3.24.19
google v8 3.24.20
google v8 3.24.21
google v8 3.24.22
google v8 3.24.23
google v8 3.24.24
google v8 3.24.25
google v8 3.24.26
google v8 3.24.27
google v8 3.24.28
google v8 3.24.29
google v8 3.24.30
google v8 3.24.31
google v8 3.24.32
google v8 3.24.33
google v8 3.24.34
nodejs node.js *
debian debian_linux 7.0
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44CEB321-9295-4743-A24E-A7521F07E717",
              "versionEndIncluding": "33.0.1750.144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
              "matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
              "matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
              "matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5958A347-83C2-459F-800A-F4F99BD51C29",
              "versionEndIncluding": "3.24.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC3C85C-B7EB-4778-8427-57B6E74548F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FF4C1B-570F-4E10-B247-9E696F5C9A6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "890214C7-65FD-4741-9FA9-DFEEBE815ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD29B493-156E-40EB-A139-22273FC03494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D311A38E-9682-41AD-B8DA-B0FEA3FD6B56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F730F35-E59A-40DC-B384-5CD8131E5394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E6B143-17FE-4709-B37F-3F3F8C90F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "747B3F44-61DD-4E59-AB04-644D0DBA22B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "27386950-9F64-483A-98D9-73C2B2E36E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D30427-F440-4913-AA5C-D25E5546BF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA11A8-2CA0-47F1-8B3A-17E4DD2C5872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B32618-C516-49A4-A207-6AA265DA9E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF5F9B6-87F6-4EE7-99A2-5109FABCDD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "98032A71-91CD-4B04-8A85-46143A446013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAEC7292-992F-4B86-B51F-7FAC51F60A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68568D0-2B36-4F03-85ED-518B08D91F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "312B6E8A-7204-480D-A62F-3A0F5A3EE624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "31610339-EC04-4721-AC82-C004C34B0C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9A420C-4F51-4695-9D0B-F755A35D3A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B360F5E7-D59D-459B-A9E8-84F51793D3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5B5A86-F82A-4B3D-B944-4E64CDB9E877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "225B4456-9CF6-4519-9C15-1ABE2D52C6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E417E-DA11-4333-BDB0-C1C6EE9F2851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD92CD47-D942-44C0-8E71-D307AA05C207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CEBADE4-DD37-447B-8450-10BC57F85875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "610627E6-C828-482B-809D-CE86788A5EE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AFEF41-7AC1-46D0-9AB1-E1C7DFCAD492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DD2CDC-8B85-4DC7-A85D-CC85B65B264E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8963550-CA67-404A-853B-86A0D6C34FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "803F421D-D17E-4E49-BD6E-00D40EDE3B81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "76FAAD85-F326-4AC3-8F2D-DB64F610B502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "898DF7D1-AD9C-414A-A810-F0C2C2CF3F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F4A53AD-04F1-4D8E-9B93-270F0A9A9E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "702FE7B3-A2EF-4409-8130-5EDC6A6BD3A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF36D004-5ED4-47CC-83F4-6FD708EC3B8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EB0A95-92AB-432D-A7AE-7670A5117B95",
              "versionEndExcluding": "0.10.31",
              "versionStartIncluding": "0.10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.24.35.10, utilizado en Google Chrome anterior a 33.0.1750.146, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2013-6668",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-05T05:11:22.377",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61184"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65930"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19475"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19553"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-2883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://code.google.com/p/v8/source/detail?r=19599"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2025-04-12 10:46
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
References
[email protected]http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
[email protected]http://www.debian.org/security/2016/dsa-3590
[email protected]http://www.securityfocus.com/bid/90876
[email protected]http://www.securitytracker.com/id/1035981
[email protected]http://www.ubuntu.com/usn/USN-2992-1
[email protected]https://access.redhat.com/errata/RHSA-2016:1190
[email protected]https://codereview.chromium.org/1927003003
[email protected]https://crbug.com/604897
[email protected]https://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1927003003
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/604897
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de regexp (tambi\u00e9n conocida como regular expression) en Google V8 en versiones anteriores a 5.0.71.40, como es usada en Google Chrome en versiones anteriores a 51.0.2704.63, no maneja correctamente los tama\u00f1os de cadena externos, lo que permite a atacantes remotos provocar una denegaci\u00f3n del servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1688",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:17.540",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1927003003"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/604897"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1927003003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/604897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-10-15 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F7F275-A3CD-4A59-9DB4-F577D9DA2A31",
              "versionEndIncluding": "4.6.85.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9908D930-D4BE-4D3A-8503-F162D72C51C2",
              "versionEndIncluding": "45.0.2454.101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.6.85.23, como se utiliza en Google Chrome en versiones anteriores a 46.0.2490.71, permite a atacantes provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-7834",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-10-15T10:59:12.170",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2770-1"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2770-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2770-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2770-2"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
References
[email protected]http://code.google.com/p/v8/source/detail?r=17801Patch
[email protected]http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
[email protected]http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
[email protected]http://secunia.com/advisories/56216
[email protected]http://secunia.com/advisories/56217
[email protected]http://www.debian.org/security/2013/dsa-2811
[email protected]http://www.securitytracker.com/id/1029442
[email protected]https://code.google.com/p/chromium/issues/detail?id=319835
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/v8/source/detail?r=17801Patch
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56217
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2811
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029442
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=319835
Impacted products
Vendor Product Version
google chrome *
google chrome 31.0.1650.0
google chrome 31.0.1650.2
google chrome 31.0.1650.3
google chrome 31.0.1650.4
google chrome 31.0.1650.5
google chrome 31.0.1650.6
google chrome 31.0.1650.7
google chrome 31.0.1650.8
google chrome 31.0.1650.9
google chrome 31.0.1650.10
google chrome 31.0.1650.11
google chrome 31.0.1650.12
google chrome 31.0.1650.13
google chrome 31.0.1650.14
google chrome 31.0.1650.15
google chrome 31.0.1650.16
google chrome 31.0.1650.17
google chrome 31.0.1650.18
google chrome 31.0.1650.19
google chrome 31.0.1650.20
google chrome 31.0.1650.22
google chrome 31.0.1650.23
google chrome 31.0.1650.25
google chrome 31.0.1650.26
google chrome 31.0.1650.27
google chrome 31.0.1650.28
google chrome 31.0.1650.29
google chrome 31.0.1650.30
google chrome 31.0.1650.31
google chrome 31.0.1650.32
google chrome 31.0.1650.33
google chrome 31.0.1650.34
google chrome 31.0.1650.35
google chrome 31.0.1650.36
google chrome 31.0.1650.37
google chrome 31.0.1650.38
google chrome 31.0.1650.39
google chrome 31.0.1650.41
google chrome 31.0.1650.42
google chrome 31.0.1650.43
google chrome 31.0.1650.44
google chrome 31.0.1650.45
google chrome 31.0.1650.46
google chrome 31.0.1650.47
google chrome 31.0.1650.48
google chrome 31.0.1650.49
google chrome 31.0.1650.50
google chrome 31.0.1650.51
google chrome 31.0.1650.52
google chrome 31.0.1650.53
google chrome 31.0.1650.54
google chrome 31.0.1650.55
google chrome 31.0.1650.57
google chrome 31.0.1650.58
google chrome 31.0.1650.59
google chrome 31.0.1650.60
google chrome 31.0.1650.61
google v8 *
google v8 3.22.0
google v8 3.22.1
google v8 3.22.2
google v8 3.22.3
google v8 3.22.4
google v8 3.22.5
google v8 3.22.6
google v8 3.22.7
google v8 3.22.8
google v8 3.22.9
google v8 3.22.10
google v8 3.22.11
google v8 3.22.12
google v8 3.22.13
google v8 3.22.14
google v8 3.22.15
google v8 3.22.16
google v8 3.22.17
google v8 3.22.18
google v8 3.22.19
google v8 3.22.20
google v8 3.22.21
google v8 3.22.22
google v8 3.22.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B166B1D-2593-4AC1-B6B7-136821A6C742",
              "versionEndIncluding": "31.0.1650.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE0CD4B-7AF0-408C-A0A4-5C1BF99DCC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E419AD3-959E-4CBE-AA82-6FF50ADA5F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB7361C-D835-4EA4-A02A-517A88235E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8FBD4F-A625-4481-ACC3-11D1EC38E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CE56C0-FEBB-4B88-B492-7F4834F1E7D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C5BFB2-1662-40C8-91F3-BAADA15BBDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1591A0BA-598A-4B52-990B-D897D0717659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2399FF12-3C99-4822-9C7F-ACE21A75B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0F6EDE-7B69-4522-880B-5D384BA165B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F05FCCF-7EF3-4AE8-9699-C59716B64FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABC4ED3-D2F4-49E4-917C-14CBD4B48217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DACE52-4FEE-46DB-8A3E-453927346324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB25316-F742-489F-982A-F2E93CC2A991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCDDE4F-1AFF-47BB-AEED-1162557C3ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC97D41-FC3F-4257-ADCF-A18CE16BD123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BB30B1-5D2B-4BF0-A9B2-E9DA58DB4421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D94E9E7-694E-4D4D-87E3-C599BF0D34E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "95693DB4-F3A3-4E9B-81BC-9659DC28266F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "543A3EED-3B52-4F32-91CB-CE519502DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA826854-B16A-4F3B-9B45-B20967C398CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5EBF2E-E025-4F7F-8B59-E898526509CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "57710E9D-5ACE-43B8-87E9-B62FE8602316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2094C58D-F541-4622-8A85-0F29E8FA2C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "170A2964-5947-4DDB-8AE2-C919BEF38DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "095EF1A2-A17B-4D1D-A314-770757DBC77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "15659D3B-13DB-447D-B680-3CBA8A153B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "206DDB27-676F-4373-A0CC-762C9F593E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE66FCD-C9F5-4341-983A-BED55E80C3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E32F32F-BEFA-41E2-B77E-576662A36A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CC0102-E20D-479C-AF93-1DBCD0052B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA262B88-A7F0-4F27-A002-7CFFF097D95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D23D07-42C3-49E6-B381-E4F8F7392ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "66941327-5BC4-4F22-920E-5A1E9A2A2234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01B6CFF-9602-4D81-BCB0-49F584B55AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC5025C-3FEC-4C14-B785-5B3B8E093BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB6E22F-B320-449C-97A2-EB8BFB54B73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13D619A-70FA-4C77-8603-6EEA8F6193D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "32059BF8-EF17-41C1-A0FC-39B41E775F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "6636E503-0532-4E10-881E-C3E929CE5B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2259D6-6B9F-4625-9E69-CD157748ABBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9F265B-5685-445B-9EEB-546849AD9272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F7A611-76FC-4AE4-8D5A-F7E75270FDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AF9C17-46A4-46F4-9D22-217EDE0AFAF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2FC44E-D049-42B0-AD76-172C1ED06D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCCB144-4569-4B53-9DE5-A5530135D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F37CEA3-76DF-4B01-BC5A-9DBC9C107C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "699343EA-5C96-4ADB-AADE-3490197DFD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABE41D1-D7F1-417C-80D3-80C404BD9546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71B69CB-3D77-4931-9E3B-9225B7B63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1ED428E-3403-4363-A7B1-A68E65CF7A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05E5233-03DE-425F-8328-106E52FDEF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B4CB82-9609-4C90-8FC6-8BCC147B456F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1FDF34-2EB9-4FD7-AD77-026AE6D797AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B695203-6850-49BC-BAA8-A91E4350A713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1CB211-10B1-4133-89E2-E3F9B4BA2FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1088A37-81E0-4BAA-917A-047DA78B4144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB910D57-F102-4F8D-9A94-5A4DD30EF177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8810453-9BFB-4FFC-89DB-844F7049EEB2",
              "versionEndIncluding": "3.22.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E875447E-662E-46BA-BA2D-79EA05A23DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC95D6E-45D2-4527-9E63-82F4CF838133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC289673-A492-4DB4-9BB7-59B622D23445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF98EA1-3631-46CE-B376-77C202FDDC7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "716E3104-48AF-47FC-ADDD-99F9F6E95583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61E7EEE-4692-475A-A654-FE71F91A65A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48FCBDC9-F3DA-4336-9A5A-149E89358C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E610217-F42C-43D2-A407-A47EE7B582A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "054B64BA-2248-40E2-AAFE-46E51FF6526B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D43992C-A465-43D0-BF25-7D20A7251513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A2A3D5-D6C0-47FD-BD4F-E5658549224C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F638D4A-DB8A-4923-B230-28CED7C73710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4F169A-7A16-40C0-B5AE-06332E3AFF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "052BC6A2-B637-419D-83BF-F196F5A2072F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D72962-AEE1-4CE7-A101-C7FD2E8F2D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D1B607-9E27-4819-AD27-74F3A94FA08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "012ED965-2639-4B47-B161-38241573FB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8887E81-31C5-462B-8809-C6B19D15B728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE2658F-C3DE-465A-9187-DD95F29CBE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "81470A7C-319E-44AB-8231-DDABAF2B37E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D14D52-7AAA-4A69-A2BE-88021ABA02CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "513676FD-CF07-4039-A74E-077F06A768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A85B0FC-D2D9-41F7-AC32-80C1DB23DB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.22.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9279B05-F5E2-4D52-96F0-327D7327270B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n DehoistArrayIndex en el archivo hydrogen-dehoist.cc (tambi\u00e9n se conoce como el archivo hydrogen.cc) en Google V8 anterior a versi\u00f3n 3.22.24.7, tal como es usado en Google Chrome anterior a versi\u00f3n 31.0.1650.63, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de l\u00edmites) o posiblemente tienen otro impacto no especificado por medio de c\u00f3digo JavaScript que establece el valor de un elemento de matriz con un \u00edndice dise\u00f1ado."
    }
  ],
  "id": "CVE-2013-6639",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:04.007",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/v8/source/detail?r=17801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1029442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2025-04-12 10:46
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
References
[email protected]http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
[email protected]http://www.debian.org/security/2016/dsa-3590
[email protected]http://www.securityfocus.com/bid/90876
[email protected]http://www.securitytracker.com/id/1035981
[email protected]http://www.ubuntu.com/usn/USN-2992-1
[email protected]https://access.redhat.com/errata/RHSA-2016:1190
[email protected]https://codereview.chromium.org/1936083002
[email protected]https://crbug.com/602970
[email protected]https://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1936083002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/602970
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC5CA67-5637-4AD0-923D-678947667D6E",
              "versionEndIncluding": "5.1.281",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
    },
    {
      "lang": "es",
      "value": "uri.js en Google V8 en versiones anteriores a 5.1.281.26, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, usa un tipo de matriz incorrecto, lo que permite a atacantes remotos obtener informaci\u00f3n sensible llamando a la funci\u00f3n decodeURI y aprovechando \"confusi\u00f3n de tipo\"."
    }
  ],
  "id": "CVE-2016-1677",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:05.927",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1936083002"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/602970"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1936083002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/602970"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-11-07 11:43
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
Impacted products
Vendor Product Version
google chrome *
google chrome 23.0.1271.0
google chrome 23.0.1271.1
google chrome 23.0.1271.2
google chrome 23.0.1271.3
google chrome 23.0.1271.4
google chrome 23.0.1271.5
google chrome 23.0.1271.6
google chrome 23.0.1271.7
google chrome 23.0.1271.8
google chrome 23.0.1271.9
google chrome 23.0.1271.10
google chrome 23.0.1271.11
google chrome 23.0.1271.12
google chrome 23.0.1271.13
google chrome 23.0.1271.14
google chrome 23.0.1271.15
google chrome 23.0.1271.16
google chrome 23.0.1271.17
google chrome 23.0.1271.18
google chrome 23.0.1271.19
google chrome 23.0.1271.20
google chrome 23.0.1271.21
google chrome 23.0.1271.22
google chrome 23.0.1271.23
google chrome 23.0.1271.24
google chrome 23.0.1271.26
google chrome 23.0.1271.30
google chrome 23.0.1271.31
google chrome 23.0.1271.32
google chrome 23.0.1271.33
google chrome 23.0.1271.35
google chrome 23.0.1271.36
google chrome 23.0.1271.37
google chrome 23.0.1271.38
google chrome 23.0.1271.39
google chrome 23.0.1271.40
google chrome 23.0.1271.41
google chrome 23.0.1271.44
google chrome 23.0.1271.45
google chrome 23.0.1271.46
google chrome 23.0.1271.49
google chrome 23.0.1271.50
google chrome 23.0.1271.51
google chrome 23.0.1271.52
google chrome 23.0.1271.53
google chrome 23.0.1271.54
google chrome 23.0.1271.55
google chrome 23.0.1271.56
google chrome 23.0.1271.57
google chrome 23.0.1271.58
google chrome 23.0.1271.59
google chrome 23.0.1271.60
google chrome 23.0.1271.61
google v8 *
google v8 1.0
google v8 2.4.0
google v8 2.4.1
google v8 2.4.2
google v8 2.4.3
google v8 2.4.4
google v8 2.4.5
google v8 2.4.6
google v8 2.4.7
google v8 2.4.8
google v8 2.4.9
google v8 2.5.0
google v8 2.5.1
google v8 2.5.2
google v8 2.5.3
google v8 2.5.4
google v8 2.5.5
google v8 2.5.6
google v8 2.5.7
google v8 2.5.8
google v8 2.5.9
google v8 3.0.0
google v8 3.0.1
google v8 3.0.2
google v8 3.0.3
google v8 3.0.4
google v8 3.0.5
google v8 3.0.6
google v8 3.0.7
google v8 3.0.8
google v8 3.0.9
google v8 3.0.10
google v8 3.0.11
google v8 3.0.12
google v8 3.1.0
google v8 3.1.1
google v8 3.1.2
google v8 3.1.3
google v8 3.1.4
google v8 3.1.5
google v8 3.1.6
google v8 3.1.7
google v8 3.1.8
google v8 3.2.0
google v8 3.2.1
google v8 3.2.2
google v8 3.2.3
google v8 3.2.4
google v8 3.2.5
google v8 3.2.6
google v8 3.2.7
google v8 3.2.8
google v8 3.2.9
google v8 3.2.10
google v8 3.3.0
google v8 3.3.1
google v8 3.3.2
google v8 3.3.3
google v8 3.3.4
google v8 3.3.5
google v8 3.3.6
google v8 3.3.7
google v8 3.3.8
google v8 3.3.9
google v8 3.3.10
google v8 3.4.0
google v8 3.4.1
google v8 3.4.2
google v8 3.4.3
google v8 3.4.4
google v8 3.4.5
google v8 3.4.6
google v8 3.4.7
google v8 3.4.8
google v8 3.4.9
google v8 3.4.10
google v8 3.4.11
google v8 3.4.12
google v8 3.4.13
google v8 3.4.14
google v8 3.5.0
google v8 3.5.1
google v8 3.5.2
google v8 3.5.3
google v8 3.5.4
google v8 3.5.5
google v8 3.5.6
google v8 3.5.7
google v8 3.5.8
google v8 3.5.9
google v8 3.5.10
google v8 3.6.0
google v8 3.6.1
google v8 3.6.2
google v8 3.6.3
google v8 3.6.4
google v8 3.6.5
google v8 3.6.6
google v8 3.7.0
google v8 3.7.1
google v8 3.7.2
google v8 3.7.3
google v8 3.7.4
google v8 3.7.5
google v8 3.7.6
google v8 3.7.7
google v8 3.7.8
google v8 3.7.9
google v8 3.7.10
google v8 3.7.11
google v8 3.7.12
google v8 3.8.0
google v8 3.8.1
google v8 3.8.2
google v8 3.8.3
google v8 3.8.4
google v8 3.8.5
google v8 3.8.6
google v8 3.8.7
google v8 3.8.8
google v8 3.8.9
google v8 3.9.0
google v8 3.9.1
google v8 3.9.2
google v8 3.9.3
google v8 3.9.4
google v8 3.9.5
google v8 3.9.6
google v8 3.9.7
google v8 3.9.8
google v8 3.9.9
google v8 3.9.10
google v8 3.9.11
google v8 3.9.12
google v8 3.9.13
google v8 3.9.14
google v8 3.9.15
google v8 3.9.16
google v8 3.9.17
google v8 3.9.18
google v8 3.9.19
google v8 3.9.20
google v8 3.9.21
google v8 3.9.22
google v8 3.9.23
google v8 3.9.24
google v8 3.10.0
google v8 3.10.1
google v8 3.10.2
google v8 3.10.3
google v8 3.10.4
google v8 3.10.5
google v8 3.10.6
google v8 3.10.7
google v8 3.10.8
google v8 3.11.0
google v8 3.11.1
google v8 3.11.2
google v8 3.11.3
google v8 3.11.4
google v8 3.11.5
google v8 3.11.6
google v8 3.11.7
google v8 3.11.8
google v8 3.11.9
google v8 3.11.10
google v8 3.12.0
google v8 3.12.1
google v8 3.12.2
google v8 3.12.3
google v8 3.12.4
google v8 3.12.5
google v8 3.12.6
google v8 3.12.7
google v8 3.12.8
google v8 3.12.9
google v8 3.12.10
google v8 3.12.11
google v8 3.12.12
google v8 3.12.13
google v8 3.12.14
google v8 3.12.15
google v8 3.12.16
google v8 3.12.17
google v8 3.12.18
google v8 3.12.19
google v8 3.13.0
google v8 3.13.1
google v8 3.13.2
google v8 3.13.3
google v8 3.13.4
google v8 3.13.5
google v8 3.13.6
linux linux_kernel -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE29114-75CA-41C6-B458-196FF2985032",
              "versionEndIncluding": "23.0.1271.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3F2AC-D9A8-48BB-A207-30A8F118BF28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B15707-7C97-48A4-9F20-EC786BDF13C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FF6845-B328-4E73-83EB-74860C5EB8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8423F18-4875-4ABE-AC80-57340305D91F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C06A20-E967-4879-BEDE-DCA1314DF81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F721A6BE-FBB8-49EA-8C12-AF341C275C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC8404-7EDD-4B34-92DF-77CABE12CA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B7CBF0-47D3-4567-8F3A-648D5107DD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41166C4F-68CF-41AB-8F5D-11CBBA6A0BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "121C4953-953D-47D0-9D66-D0B69AC28831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB366A-A3DD-4DAF-A041-720C526C03AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E21A142-3481-43B9-9395-7F48AF784463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DCFA28-1766-40A8-AB2D-1F99ECAF3F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D0C147B-6B25-48AE-ACC9-6DAB12560290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E62C0B-6FDE-4462-9E9B-7E78A7283705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC860EB3-EB61-421E-B494-6830337F3CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "386ED915-8B2A-428D-A825-B814C1B2D7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FE3859-CBE2-4A47-BE29-1EB193B21E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4844D01-3562-469A-B98E-FA29E42A1A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "28981813-AC63-4D44-BE1E-4E2F9EB6C9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13124B6-7FE5-4047-88D2-88B7FD7BA389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91B54DA-001B-4231-A102-F328D86AA656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DDC74C-D04A-4C44-A597-3AC873A5290F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16EDD52-B5EF-4E66-AC94-39AEA3A008C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD966311-A0DE-4554-984C-1C175E411BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E316E65-EFA7-428F-BA83-B29E019DE1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD447C2-6789-4EDC-AEFD-830AA3B653F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9661CBA-A581-454A-A923-19C3CDFE6391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2437082-6AA3-4CBD-895C-CA14463D831D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "215F3C35-D1CD-44FE-A62A-4BCBACE52587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D66B4A-FBC8-4017-9E32-490AF9298716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "7258FEEE-B85C-4923-B60D-9B327DA92047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E9516A-A3DC-4B1C-BF56-5A4406E5468E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4D20A-E3A2-493B-89F5-E6BBE37B19CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B0A1B-6E9E-4A71-9506-574BFA1C10CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B974908F-B63B-4EDC-B3EA-C52FD638C957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E32E86F-09A0-4CE3-BF9C-C140A0539D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C12838-19AA-44CD-879D-39036C107874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "137C6B9C-E81A-48EA-8E6D-842D444180B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "16515194-DAE1-4F9E-8091-1D0C8A3C0BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1B004-0CBF-41F1-96E9-E02A6C3745E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "1724A5F9-0A7F-40FF-B0F8-C0BBC982D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "257C675B-398B-4E68-999A-39454845B07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "549E9049-23C4-49F0-BA34-062DA14A5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84CF07D-B93A-4F59-A7C0-8C6F59629F1E",
              "versionEndIncluding": "3.13.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91521ADE-72E4-40F0-B801-8C23C7F6A671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BED0B9-184D-4024-B5AF-AD07EDD041D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCE281DD-26FE-4867-8545-4A87A7422907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C71732-A365-4D0C-A454-4CA97FE2E6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8385D1FA-5B91-4EE2-AC54-BAE88BC42B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D461744-1EFA-4199-8E4F-85251B9DDC0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65A852D-4C51-4D36-BDF3-F94D94C2125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C8CCCF-E821-41A4-BFF0-723AC6756B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2EDB065-A57C-4983-B013-D7F61899E754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42AC745-38D2-4EA7-BF52-D813B1D915CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "97344584-711C-4236-8AC3-2D27DA23C03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD89681-B759-4E75-8B67-E4EB8E7980C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD4047F-28A6-4EFF-8F88-269C9F64AD5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5912554E-E0A2-4ED3-AAC8-8936C72ACD3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCF836E-2A9F-47E9-96BB-B2F7785F9C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F53A9F-8B17-40EC-AF24-4D31428707A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A952358-E494-4E2C-8E11-640DF4AF84C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "358349AB-8852-4B0A-A030-D671C9867232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE6F996-966A-4908-B0AE-26A1C5FE8CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0FE5002-AA78-4301-B0E2-799143959810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F96FE8-B6CC-4AD2-B25D-4EB71323D921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E0792C-2385-4FBC-BBE9-8C6E7358A417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00AA3B1F-4907-4CAA-B7D8-0466F462E528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EB5E95-3C5A-4794-8F7F-AC49561DEA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "907856F9-C6AD-445A-9999-0C01BDEEE822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A8EA39-A301-4EB2-8C9B-CA062AA6A06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "198F06B3-8C5D-462A-A515-3FF9CD85CB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C24EA6-DA1A-4985-8A84-028C6761AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "421D71D2-EB93-4911-87B2-17A153B61C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F716C286-0469-4E9A-83C7-83CCDFC5B8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D29C3D6E-A981-4AC2-8B2C-3245E3F47716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8788CA-552D-4853-91A8-CE932ADE282D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC66D6CA-5795-446B-B991-BC82761EF62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "575CFB7A-11D5-4DCE-ADCA-AA8C5A1664DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99A948D-E630-4409-97AB-66C050524413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E3368C-9D6D-4C6C-8DC6-FF393C2ABB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A36A429-BF87-47BB-AD11-7AB8815E6206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB5D4E2-7742-447E-8ADF-DAF01B37781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28326A91-461D-4352-A4E1-B8C2CB7CF4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE687FF9-4441-48AA-AD34-E84700D717FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FAC7AD-604C-4E79-A162-F7DED541EF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D40A4E-26B5-418F-A7A6-AA7588299F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B4EB3B-489A-4FAE-8F05-0976D8BFD74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0FB943-A6D3-4802-A3ED-CCD74974A4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F93F8E3-9C85-43F6-9E7D-47AD90A6260E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87E6D2B-769C-4137-9AFD-9EC4FA697B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1950ECA1-C56C-4C32-A5DA-F6DB4F848625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "20FEF415-3FCD-4008-BE4F-4D1BE87F7ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AC25766-2B74-410A-877F-15685E17462B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECEDCBE7-59CA-4A16-B098-28F37E6AF3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B055FCB-E1BE-4B40-AE3C-5FF0B800D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7AD6435-B632-49C0-8080-CCE8EF6F771F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0F53AC-1980-44DE-897A-FEDDA4BCEE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C32FFF-6D3B-4546-9F30-2E08EE4EA5B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D843D7-646F-4F36-9039-623AD81D5394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "51521515-3A22-4C55-9048-5EE96EFFE0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "573802E2-1404-4560-A971-92FE5A4DF747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC919A5A-D4FD-4E7F-8482-B4A046157196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00B997D-4ED0-460C-9398-879F1CF38130",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F950D6ED-F7A9-460B-878A-A76A51A3C681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B1BDAD-DEEF-4340-8390-80DC7B8EE3C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7B5EA9-B57D-413A-AADE-DE704AF38289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "903F85A1-CAA2-466E-84FE-171CE57746B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B9101C-2EFD-40AE-8F44-99E9B317C2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A217A47-FAB7-4EE7-80A4-80F6625C4AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5019DC34-F9AB-400C-B0BA-CD745BBCF64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C3AE39-D48F-4D3F-AA2E-1DBC766C5332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2049330D-2110-4E19-95AC-BD12899B580F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87D5E05-7F41-4D07-A582-55E32D315468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C426E3E3-3783-4EB8-AF71-8D5CE61E5AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1BB230-2FFC-4EB9-B241-220E70683861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7694D28-7C7F-4434-A03C-B8A1F727FF9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A5C71B-2A7C-415E-B004-17B9B2BE5609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B3EAA7-AA01-44ED-BEF7-D96FA7783AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF20FBFE-EC21-41D0-A556-0CA85A5AE8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "515F4C07-EC8F-48F8-8FC5-A5AE3009E7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B2EFD6-FD5C-4EF6-82A8-DB269FF638E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD57857-1769-4B65-980E-8918A2F92CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4496715-BEC7-4495-81F6-D7A6F02C993F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B915E17-9A92-4D48-8F87-791DA5EAB46F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD9A39F-F3A7-46DA-AA28-8A03FDEDA423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E9CEB-8CDE-424B-BC80-74F6EA7E403A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52A85C40-CFFA-4448-A678-E35E8DE11FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "10458D4B-EC1B-42D7-B868-3AF043EA92D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65680CC0-57D0-4E6E-8CBE-D853B799DD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7B7E0C-0E07-42D8-A92B-14DB14051A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D978A7-134D-4BD9-B2DD-97F1D9F459B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D055A1-A91D-462B-AD27-8D963564E7DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460C148-9632-409E-A880-E54EAE8AC09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C211998D-6D50-41FC-B21D-21E247E26B90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6FBD9-C103-4B2D-8D31-43747965F934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1013C428-E4B3-497B-B057-3131646263A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E161736-1C08-490B-820D-FC35FACE5144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D67F4F0-3911-4C9E-831D-06390F0C0A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D43E1A-EEA5-4E0E-92DE-1ADFB936AC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "89556CDB-86C7-4909-9EAF-21F985862BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A34E22A-20CC-460C-92BF-E8A9F8B622F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "479F97E2-FBBD-4784-BD27-F94F931050D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E38ED7C-136F-4A88-A762-7790DEAF7373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30D9B21-7941-4BD1-850E-C9B80DFAA314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "232DA7A5-68D4-409C-9A5E-59928189A081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED61B1C-F352-405E-B237-1AA40F593C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE2AE4E-FBA0-432D-A319-16E2F0265A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7FAA54-7A79-4B6D-ABC0-534CD994595C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CAA136B-9404-4BD2-BE3D-D1AB12134E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D369B1-5E98-46C9-9CF9-910C330EEC64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B3631A-471C-40A8-9EB3-ECE921672AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC8D1E9-0FD2-4C87-AD92-ABC460123219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61B1498-7E6C-4CA1-8CBC-0A43CB2A7594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C463B0D-CCD8-49FB-BEA1-EE02AF9A3668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E5B4F1-136A-4AD6-B5D6-E8F118FFC6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D531639-6926-4842-A6A4-F97F7CDEDF7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "51CDF645-3757-4C11-85A2-241DC0639C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB7287E-D015-46F7-BE90-228FB4E771BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E54AB56-AA39-41B9-AC76-8929FBBBC2C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0309560-C695-4300-B6EC-09FFCAE76BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "818D390D-91E7-482D-AC69-7E6261849418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C845DA5-7CBC-440C-9C75-77A4BEA87CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "999DDC92-7924-4461-BB54-82D9F82DECED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "33924A69-F0D8-4E6F-9554-D02A55DC6D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1FC622-E8B7-4756-B609-7754C3C5EE7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4FF2A4-2484-4A29-9F0F-D7BC5015FE2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D43A9A-7820-4097-8AD5-80A4781C2031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A824F502-9FC2-4726-B4E1-660EC74FBC68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5159BF22-2E1C-4A73-B7BA-C78A12D8EEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07140C6-4648-4EB6-8D1F-991F24C2A2C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF04257-F8DE-4C14-8F54-BE2CDFECEE34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CB87F4-C655-4200-AB0A-F2CE5C672D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDE3951-8071-475E-84FE-9C8D2EC0670A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A65BE16-D853-488F-9BD2-16BF2181DDF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B96BD0B-E35F-46B2-8583-E57B671ED8AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C4AE78B-6B8E-4AF4-951D-1833F346BC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB357B3E-57E0-46D7-9203-AA6EF73A868D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71E6A99-2B95-4CD7-9EB2-5051AA950FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "9013FCED-2032-47E0-8931-76164AD1DA22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F68D355-67EC-444D-AB75-899AC11B8C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6517275C-EE88-439E-9D0E-ACEE554F251E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7183B8C0-14A5-4889-95CF-B4EA1D2980E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B203B37-0C29-40D8-AFD0-4FDF733623A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F16DF6-7967-43D3-BAC1-4C42E7FDC7FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B37DDE-4652-400D-B2EA-E82AB8DC3622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE56FE77-7BC5-4A31-8060-DDB1900F36CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6531439-1B28-4D9D-B80A-E6BD66813B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A8DCB0-8C09-48CC-8702-89AE3E88B994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4CF2D5-AC6A-46B0-A44C-ECB277BFB1DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.9.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CD446-B89C-46CE-8706-536DB87D4E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FDF525-DE8C-465C-9166-700BF7507C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F78C73-4CCB-47DB-9498-6A4899843DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74CCFFC-64DF-41ED-AE20-9F3D17543C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D596F510-9AA4-4B0D-A27B-F97EEC8F3CBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F378EAF8-ACDB-4AB3-99CE-6A687B64B848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF285ED2-7599-4D5E-B0DD-6F644B94DF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B672C7A8-7920-44E8-804B-AB5F0ACE76BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F799D6-D674-4F23-A04A-93FF630E1D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D89D524-B4A3-4D81-970A-FDEFBBBD2E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "898D6786-0AAB-45CE-B8BD-AC9C0A66E9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587EBC5D-A6DE-4979-951C-4FA0BCFEFC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11B36F-A41C-45BE-B56E-EEA70E24905D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2622CF-824D-413E-ADD1-DC0574361477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FEDB83-CF5B-4F6A-813E-5C44A9C289CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2371F6-C4B4-401A-B668-2F9E9BE5C9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "054A3530-CE7A-459C-BB81-F3156BE5293A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F5973D-C96F-4655-BC1D-48CBCC16B097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6A3ED5-B959-4261-AC91-972785CE4EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "886008C1-D35E-4803-8D4B-F7E592C9E564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC48B27-52E2-432D-990F-8713912EF294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "734CC349-E6C8-4AEB-ABAF-D2A3F253B71B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "588A82D9-424E-45C9-9B5A-62FFE68033DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0B4D05D-B862-4CFD-8147-991DECE4B14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBAECA2-045A-4D7C-A5E7-7877C8DB9468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E9CC9A-2DCE-46A5-82B0-0C32B0C0AAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "76175662-01A9-42A9-B0CB-D4C0C0A5BE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0E26EC-36AD-4B3C-89A0-7B30CD867DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A902B7BD-B0B4-4D22-BF2B-25508FC8F428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9FE0B-6B44-4C88-B7D3-9B6F3B120BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201E8F-FE30-4B95-AC7C-6FB0FE6A2E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA46AE1-B568-4E0A-A0E2-1E1EBBE76E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EBABEB-B235-4401-A69B-1B0398AA0EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B34F5A-C5DB-4CEA-B626-22789CEA9158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCB6F72-7BD5-4DF0-97FF-C61B6039AD97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F8E58C-B157-4038-9915-A4D198EF095C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4183BF2F-A11C-44E0-B8B7-12CF9C0DF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "02034625-0B63-4892-9C81-C37794C70E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4235824-8ADD-4D22-A7F3-F252795B015F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F526848C-C42A-4776-A180-C5A1A5D8360F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "79699BB1-7BC4-456F-A8F7-974031133919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA465525-4A91-4917-B5F4-720F9650FE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262EB3BC-C68A-48B6-BA97-61954324398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD09697-6818-4915-988F-79B4430AFE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "073E4947-3C28-4532-95DA-3AEC9367342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACFD93D-C5E5-4EE6-B9E9-24788FA085F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6771D50-5DE9-4CDD-97D8-582D2B11BDBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0AE6-8665-4C8C-9EF5-BA5D99F2B0B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:-:*:*:*:*:x64:*",
              "matchCriteriaId": "FD90DD84-C896-49DB-8E95-56453C59966D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
    },
    {
      "lang": "es",
      "value": "Google V8 antes de v3.13.7.5, tal como se utiliza en Google Chrome antes de v23.0.1271.64, en plataformas de 64 bits de Linux, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript modificado que desencadena un acceso fuera de l\u00edmites a una matriz."
    }
  ],
  "evaluatorImpact": "Per: http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html\r\n\r\n\"Linux 64-bit only\"",
  "id": "CVE-2012-5120",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-11-07T11:43:15.367",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "[email protected]",
      "url": "http://osvdb.org/87085"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/87085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/56413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2025-04-12 10:46
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
References
[email protected]http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
[email protected]http://rhn.redhat.com/errata/RHSA-2016-1485.html
[email protected]http://www.debian.org/security/2016/dsa-3637
[email protected]http://www.securityfocus.com/bid/92053
[email protected]http://www.securitytracker.com/id/1036428
[email protected]http://www.securitytracker.com/id/1038201
[email protected]http://www.ubuntu.com/usn/USN-3041-1
[email protected]https://codereview.chromium.org/2078403002/
[email protected]https://codereview.chromium.org/2102243002
[email protected]https://codereview.chromium.org/2111133002
[email protected]https://crbug.com/620553
[email protected]https://security.gentoo.org/glsa/201610-09
[email protected]https://source.android.com/security/bulletin/2017-04-01
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1485.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3637
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92053
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036428
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038201
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3041-1
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2078403002/
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2102243002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2111133002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/620553
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-09
af854a3a-2127-422b-91ae-364da2661108https://source.android.com/security/bulletin/2017-04-01
Impacted products
Vendor Product Version
google chrome 51.0.2704.106
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "C413A468-044A-412D-AC99-A2691B22A83F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8377FE4-224C-40A4-AD53-E1E2CDAE56DA",
              "versionEndIncluding": "5.2.360",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "Google V8 en versiones anteriores a 5.2.361.32, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no procesa adecuadamente los objetos recortados por la izquierda, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-5129",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-23T19:59:11.297",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1038201"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2078403002/"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2102243002"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2111133002"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/620553"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "[email protected]",
      "url": "https://source.android.com/security/bulletin/2017-04-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2078403002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2102243002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2111133002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/620553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://source.android.com/security/bulletin/2017-04-01"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-05-14 21:59
Modified
2025-04-12 10:46
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
[email protected]http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
[email protected]http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
[email protected]http://rhn.redhat.com/errata/RHSA-2016-1080.html
[email protected]http://rhn.redhat.com/errata/RHSA-2017-0002.html
[email protected]http://www.debian.org/security/2016/dsa-3590
[email protected]http://www.securityfocus.com/bid/90584
[email protected]http://www.securitytracker.com/id/1035872
[email protected]http://www.ubuntu.com/usn/USN-2960-1
[email protected]https://access.redhat.com/errata/RHSA-2017:0879
[email protected]https://access.redhat.com/errata/RHSA-2017:0880
[email protected]https://access.redhat.com/errata/RHSA-2017:0881
[email protected]https://access.redhat.com/errata/RHSA-2017:0882
[email protected]https://access.redhat.com/errata/RHSA-2018:0336
[email protected]https://codereview.chromium.org/1945313002
[email protected]https://crbug.com/606115
[email protected]https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
[email protected]https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
[email protected]https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
[email protected]https://security.gentoo.org/glsa/201605-02
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1080.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0002.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90584
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035872
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2960-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0879
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0880
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0881
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:0882
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0336
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1945313002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/606115
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201605-02



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "564CADC6-8AB4-4FE0-8E0A-245E87712035",
              "versionEndIncluding": "50.0.2661.87",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D770B4-E1AB-40F6-A9FC-88E0FE860C81",
              "versionEndExcluding": "0.10.46",
              "versionStartIncluding": "0.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D7908B-0B23-4CC4-9585-0120DF187A47",
              "versionEndExcluding": "0.12.15",
              "versionStartIncluding": "0.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "A47FC4F7-1F77-4314-B4B3-3C5D8E335379",
              "versionEndIncluding": "4.1.2",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
              "matchCriteriaId": "9731B34D-C6F6-4129-BFEB-6C5C171F4CC0",
              "versionEndExcluding": "4.4.6",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "30165C60-84D5-49FC-84C9-5CE9CF0DC43D",
              "versionEndExcluding": "5.12.0",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "9ED36E22-DA95-4913-AB4E-4FB696031FFA",
              "versionEndIncluding": "6.2.0",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n Zone::New en zone.cc en Google V8 en versiones anteriores a 5.0.71.47, tal como se utiliza en Google Chrome en versiones anteriores a 50.0.2661.102, no determina correctamente cu\u00e1ndo expandir ciertas asignaciones de memoria, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de buffer) o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1669",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-05-14T21:59:09.460",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/90584"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035872"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2960-1"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2017:0879"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2017:0880"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2017:0881"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2017:0882"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2018:0336"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1945313002"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/606115"
    },
    {
      "source": "[email protected]",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
    },
    {
      "source": "[email protected]",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
    },
    {
      "source": "[email protected]",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201605-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90584"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2960-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2017:0882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2018:0336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1945313002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/606115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201605-02"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-10-25 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4D1BAE-4658-489F-926D-49951109D827",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "014BE926-B695-4F9B-8F3E-115F1FAFD480",
              "versionEndIncluding": "15.0.874.101",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
    },
    {
      "lang": "es",
      "value": "Google V8, tal como se utiliza en Google Chrome en versiones anteriores a la 15.0.874.102, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente realizar otras acciones sin especificar a trav\u00e9s de c\u00f3digo JavaScript modificado que provoca operaciones de escritura fuera de los l\u00edmites."
    }
  ],
  "id": "CVE-2011-3886",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-10-25T19:55:01.760",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
    },
    {
      "source": "[email protected]",
      "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
    },
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
    },
    {
      "source": "[email protected]",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-21 11:14
Modified
2025-04-12 10:46
Severity ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
References
[email protected]http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
[email protected]http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html
[email protected]http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html
[email protected]http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html
[email protected]http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
[email protected]http://secunia.com/advisories/58920
[email protected]http://secunia.com/advisories/59155
[email protected]http://secunia.com/advisories/60372
[email protected]http://www.debian.org/security/2014/dsa-2939
[email protected]http://www.securitytracker.com/id/1030270
[email protected]https://code.google.com/p/chromium/issues/detail?id=358057
[email protected]https://code.google.com/p/v8/source/detail?r=20363
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58920
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59155
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60372
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2939
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030270
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=358057
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/v8/source/detail?r=20363
Impacted products
Vendor Product Version
fedoraproject fedora 20
fedoraproject fedora 21
fedoraproject fedora 22
google v8 *
google v8 3.25.0
google v8 3.25.1
google v8 3.25.2
google v8 3.25.3
google v8 3.25.4
google v8 3.25.5
google v8 3.25.6
google v8 3.25.7
google v8 3.25.8
google v8 3.25.9
google v8 3.25.10
google v8 3.25.11
google v8 3.25.12
google v8 3.25.13
google v8 3.25.14
google v8 3.25.15
google v8 3.25.16
google v8 3.25.17
google v8 3.25.18
google v8 3.25.19
google v8 3.25.20
google v8 3.25.21
google v8 3.25.22
google v8 3.25.23
google v8 3.25.24
google v8 3.25.25
google v8 3.25.26
google v8 3.25.27
google chrome *
google chrome 35.0.1916.0
google chrome 35.0.1916.1
google chrome 35.0.1916.2
google chrome 35.0.1916.3
google chrome 35.0.1916.4
google chrome 35.0.1916.5
google chrome 35.0.1916.6
google chrome 35.0.1916.7
google chrome 35.0.1916.8
google chrome 35.0.1916.9
google chrome 35.0.1916.10
google chrome 35.0.1916.11
google chrome 35.0.1916.13
google chrome 35.0.1916.14
google chrome 35.0.1916.15
google chrome 35.0.1916.17
google chrome 35.0.1916.18
google chrome 35.0.1916.19
google chrome 35.0.1916.20
google chrome 35.0.1916.21
google chrome 35.0.1916.22
google chrome 35.0.1916.23
google chrome 35.0.1916.27
google chrome 35.0.1916.31
google chrome 35.0.1916.32
google chrome 35.0.1916.33
google chrome 35.0.1916.34
google chrome 35.0.1916.35
google chrome 35.0.1916.36
google chrome 35.0.1916.37
google chrome 35.0.1916.38
google chrome 35.0.1916.39
google chrome 35.0.1916.40
google chrome 35.0.1916.41
google chrome 35.0.1916.42
google chrome 35.0.1916.43
google chrome 35.0.1916.44
google chrome 35.0.1916.45
google chrome 35.0.1916.46
google chrome 35.0.1916.47
google chrome 35.0.1916.48
google chrome 35.0.1916.49
google chrome 35.0.1916.51
google chrome 35.0.1916.52
google chrome 35.0.1916.54
google chrome 35.0.1916.56
google chrome 35.0.1916.57
google chrome 35.0.1916.59
google chrome 35.0.1916.61
google chrome 35.0.1916.68
google chrome 35.0.1916.69
google chrome 35.0.1916.71
google chrome 35.0.1916.72
google chrome 35.0.1916.74
google chrome 35.0.1916.77
google chrome 35.0.1916.80
google chrome 35.0.1916.82
google chrome 35.0.1916.84
google chrome 35.0.1916.85
google chrome 35.0.1916.86
google chrome 35.0.1916.88
google chrome 35.0.1916.90
google chrome 35.0.1916.92
google chrome 35.0.1916.93
google chrome 35.0.1916.95
google chrome 35.0.1916.96
google chrome 35.0.1916.98
google chrome 35.0.1916.99
google chrome 35.0.1916.101
google chrome 35.0.1916.103
google chrome 35.0.1916.104
google chrome 35.0.1916.105
google chrome 35.0.1916.106
google chrome 35.0.1916.107
google chrome 35.0.1916.108
google chrome 35.0.1916.109
google chrome 35.0.1916.110
google chrome 35.0.1916.111
google chrome 35.0.1916.112



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
              "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
              "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9006307-BB0D-49C1-B7CE-B0C645BBB080",
              "versionEndIncluding": "3.25.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84A1139-B995-40F7-9424-EBE8487AE70F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FE6480-321D-401F-9A6D-853D9B2F216E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA187E89-5530-4AE4-B486-8168C1D18D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2542143-7E41-475E-89B0-59E23B2447E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA11334-CCBE-418E-B370-4C439401E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10BFBD8-385A-4419-AC0E-D64A4E4970A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "00BF91BB-623B-4134-A49D-45B86DBD5543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EFB9BF-4E8A-489C-A5EA-1685A10F1AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F95FABF-F383-4F63-9C33-E2DA3D20AB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF0583C-9FE8-4F59-9FEB-603BD3100277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD6EC4E-5E3D-453A-B258-658CB56BBA6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8718DE2-ACA3-452D-901A-9F233C99B3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "407BF16A-6CC9-4279-A819-2360EACF0976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "61265FC3-47D2-4741-A6A7-10B7A7ACF4A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B15C413-3BE0-49DE-9D20-0F01AF6F3C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4738D2F-7169-4FA9-91B8-938989276A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0108D-5E5F-4C6B-A0B1-F2D3CBC53C7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "44080621-DE3C-4E00-956E-D11B3D574ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8B8D82-B3A6-45BA-AB06-40343653B63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD60808B-171A-49E8-9E0C-A75100426562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACC92F2-37F2-42C4-86EF-F747B6E2365E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "5165EFE3-1E24-4C21-86A3-9AE32308C13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE74725F-26B0-484B-9B57-0CE590BD554D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "960DA0A8-79F0-4283-A367-55D73CA64A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7D7FB7-10AB-4291-8DC9-C6E4F9468E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BDE46A-6461-4E65-8B4B-89770494D191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C6188C3-684A-402C-A369-BBE53681FD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEBEA72B-EF8B-4421-BD43-E2F2566F725E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24036B85-837E-46F1-8D2A-7B06E0657979",
              "versionEndIncluding": "35.0.1916.113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7A8B66A-B3CA-44D4-8840-E544D95C5C55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4626CE7E-1135-43BB-A999-D9E9645F4F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B6A451-EF11-47B4-84E7-3EF2554717BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E5FCB33-E3B3-4CB5-8009-67EBAA2AF27A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "825D51C2-BF0E-4A17-B07B-FBBE07FF3430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44AE8107-4530-48A9-BF3D-6CEEFFDE81DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94744496-D0BE-4FAC-B0DE-40E2EF7D2967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D18C1D47-733C-4B51-9A04-253D06D20528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6B4DAE-315E-4D49-A4E2-169AE8C659AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E267532-0240-48B5-A8A7-D452DCE68545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B073B1B6-37FC-4481-A4A8-D859F9CAD0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "249F1026-0BEE-44FC-BA08-B18A67EC2D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7BF63D-3561-4636-9D0F-5C029DE4FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "65DCFD8D-42CD-4E88-9B66-10D30390A029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B78C9F-2431-4BED-AE00-C9C6F49D91BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "6638F45A-3E2E-47A7-9E29-51BC80E821CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C21673-D3BE-4549-ADBE-86A8C544ACED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "905CE4CB-23CE-46B3-AF25-8300A348D330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D7D729-94F9-406F-9AD7-FD4830234FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B2C2C1-6D3C-416D-8BA2-8A1E8783260C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E4E3A0D-5FFD-49BB-B0DC-D966D4FEE656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09378C5-9960-4DBA-BADF-75F59A670949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5DCFC6-4E56-4C8C-884C-DF1CB3BC7259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BEB034A-ED1A-4692-BC3D-EC87204A6092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7DC0366-8512-4679-9C01-92B894CB1E65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "42440388-7439-407F-A753-77B5E196E764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "08529C78-3AEF-4A48-B57A-A3AFD220E717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4418F2D-F462-4E9B-BD09-12D24726BBAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6B7553-A96D-48BC-A555-DB94EB630AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B752A1B-08A6-4D76-9560-4B8287A43D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD5AB04-7B94-4B00-907A-499A19176509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF805B-852D-412D-8B90-A4166041A0F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "741566D6-E3E0-43E6-8B12-19C1CD77C213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9BBD82A-39A6-4CC9-94FE-E3E81E0C06FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "F561EBB8-231D-481F-B109-CFEF3F010FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "3495A795-48EA-4BE9-B6CF-DF934AE3EE1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "4097E83B-5E58-4E70-B1B6-533B97C6405A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF37D299-CB0F-4F94-BBFE-4C1C966A4AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "9965D997-4F96-48BF-94CE-BA471ADE2A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDAB66F-038E-4955-81B7-A6E2157C0BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "F095537D-5045-4450-BCBF-4C93E6E042F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "710040CA-3DEF-484A-88FF-C44D17526B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8B5FDF-5ABE-4A17-B956-FE7CC3F3F1AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "5434C6FD-3C1C-4272-9D8F-5F7AB8E68046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F907549-BEA6-46C7-A528-7E97A8655595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C66DBB18-CA4B-439E-8D2E-8E5E6A42CF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E24A976-B366-412C-8635-CD65687C3A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "717CD257-B2A1-4DE6-83BA-6CE0F58B1B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE9002-9D3A-4D58-A032-1E35364FAFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "313D6BBA-A159-47DA-97E9-CE63AD1DEBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "0576D407-07F9-4163-8937-8D85974918A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F45D58-425C-4ABB-ADD3-2BBADA74A19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC63BF1F-DB9F-4C4E-8460-40A801084020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3D4FD-9707-4B18-96CE-D7CF7EA5F881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "694FBD5C-32E7-4E99-9BDD-8CE8E5D45CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E21C9-50F7-44A3-B642-4BFF4699EBD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE68628B-FEBF-4A75-99C6-C6FA76A5989E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "6755C15D-08BD-47DA-B363-6F31F7DE5923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDF01221-5CE0-4559-83E6-3273D573F0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "061A50AD-9D9F-44CA-867B-2E10B9282CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "587440DE-F09E-4789-9B58-4FCDCBFA431E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F1FFDF-509C-4608-9538-EFF07A5031C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE0FDEC-2FDB-4902-9904-F2F9E2E6226E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F34690-1EFA-49D3-91B7-E3BD0B3D7056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "44578154-8DFF-4EC7-834C-B54FD6149B91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C2D488-342C-4CAC-A07D-2C198465BC32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D63F62-CC1E-43CF-B1D6-192492796862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5366995-F5FD-4F6E-BFB7-D1E61E52B9DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF55EAB7-A108-4B80-A969-D07A2EDA6184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E16492-4A75-474C-9DEA-B150763843B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431FC69-6C1B-475D-B646-FFB2210C438B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA8FBB0-1004-40C2-AADD-4DE09CFE9326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6CF0AA-AEBE-48FD-A83B-D9ADC25C323F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C6EC014-5EB1-4C19-B828-5DBA6A525194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E90CAB9-09DE-462B-96E4-4FAEC5642F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3CF5D9-E8DE-4751-A873-A3A6769BC19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86895A1-98A7-46C8-8E52-889CB34EEEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E52314C-CB22-4702-8108-F855CEC349D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "379EB1A9-61DB-4A31-8568-DFB5BA3EE610",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de enteros en la funci\u00f3n LCodeGen::PrepareKeyedOperand en arm/lithium-codegen-arm.cc en Google V8 anterior a 3.25.28.16, utilizado en Google Chrome anterior a 35.0.1916.114, permite a atacantes remotos causar una denegaci\u00f3n de servicios o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que provocan un valor de clave negativo."
    }
  ],
  "id": "CVE-2014-3152",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-21T11:14:09.990",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/58920"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/59155"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/60372"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2014/dsa-2939"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1030270"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/v8/source/detail?r=20363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/v8/source/detail?r=20363"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-01-22 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
References
[email protected]http://googlechromereleases.blogspot.com/2015/01/stable-update.htmlVendor Advisory
[email protected]http://rhn.redhat.com/errata/RHSA-2015-0093.html
[email protected]http://secunia.com/advisories/62383
[email protected]http://secunia.com/advisories/62575
[email protected]http://security.gentoo.org/glsa/glsa-201502-13.xml
[email protected]http://www.securitytracker.com/id/1031623
[email protected]http://www.ubuntu.com/usn/USN-2476-1
[email protected]https://exchange.xforce.ibmcloud.com/vulnerabilities/100361
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2015/01/stable-update.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0093.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62383
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62575
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1031623
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2476-1
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/100361
Impacted products
Vendor Product Version
google chrome *
chromium chromium *
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B248CC65-0394-4432-9520-52E99C17EA4A",
              "versionEndIncluding": "40.0.2214.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:chromium:chromium:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF18F88-88CC-44C7-8695-B37D0AE88DF7",
              "versionEndIncluding": "40.0.2214.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5024444-F7D4-4EE4-9555-BCD1EFE49083",
              "versionEndIncluding": "3.30.33.14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.30.33.15,usado en Google Chrome anterior a 40.0.2214.91, permite a atacantes causar una denegaci\u00f3n de servicio o la posibilidad de tener otro impacto a trav\u00e9s de vectores no conocidos."
    }
  ],
  "id": "CVE-2015-1346",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-01-22T22:59:29.520",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/62383"
    },
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/62575"
    },
    {
      "source": "[email protected]",
      "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1031623"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2476-1"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/62383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/62575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2476-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-04-19 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
References
[email protected]http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
[email protected]http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
[email protected]http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html
[email protected]http://rhn.redhat.com/errata/RHSA-2015-0816.html
[email protected]http://ubuntu.com/usn/usn-2570-1
[email protected]http://www.debian.org/security/2015/dsa-3238
[email protected]http://www.securitytracker.com/id/1032209
[email protected]https://code.google.com/p/chromium/issues/detail?id=460917
[email protected]https://codereview.chromium.org/1000893003
[email protected]https://codereview.chromium.org/1019033004
[email protected]https://security.gentoo.org/glsa/201506-04
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0816.html
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-2570-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3238
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032209
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=460917
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1000893003
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1019033004
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201506-04
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EC91DF-6907-4FDA-9F2A-A644C2C331D9",
              "versionEndIncluding": "4.2.77.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772",
              "versionEndIncluding": "42.0.2311.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ReduceTransitionElementsKind en hydrogen-check-elimination.cc en Google V8 anterior a 4.2.77.8, utilizado en Google Chrome anterior a 42.0.2311.90, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de c\u00f3digo JavaScript manipulado que aprovecha la \u0027confusi\u00f3n de tipos\u0027 en la optimizaci\u00f3n de la comprobaci\u00f3n de la eliminaci\u00f3n."
    }
  ],
  "evaluatorComment": "\u003ca href=\"https://cwe.mitre.org/data/definitions/843.html\"\u003eCWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)\u003c/a\u003e",
  "id": "CVE-2015-1242",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-19T10:59:06.757",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
    },
    {
      "source": "[email protected]",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1032209"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1000893003"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1019033004"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201506-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-2570-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1032209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1000893003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1019033004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201506-04"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-23 19:59
Modified
2025-04-12 10:46
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
[email protected]http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
[email protected]http://rhn.redhat.com/errata/RHSA-2016-1485.html
[email protected]http://www.debian.org/security/2016/dsa-3637
[email protected]http://www.securityfocus.com/bid/92053
[email protected]http://www.securitytracker.com/id/1036428
[email protected]http://www.ubuntu.com/usn/USN-3041-1
[email protected]https://codereview.chromium.org/2082633002
[email protected]https://codereview.chromium.org/2084183004
[email protected]https://codereview.chromium.org/2085223002
[email protected]https://codereview.chromium.org/2101983002
[email protected]https://codereview.chromium.org/2103033002
[email protected]https://crbug.com/619166
[email protected]https://security.gentoo.org/glsa/201610-09
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1485.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3637
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92053
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036428
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3041-1
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2082633002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2084183004
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2085223002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2101983002
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/2103033002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/619166
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-09
Impacted products
Vendor Product Version
google chrome *
google v8 5.2.360



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC23C474-0857-44A5-ADAE-8AFDEB4EFECE",
              "versionEndIncluding": "51.0.2704.106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FF8F6B-7BAB-4528-88E2-05E52DF7AAF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
    },
    {
      "lang": "es",
      "value": "objects.cc en Google V8 en versiones anteriores a 5.2.361.27, como se utiliza en Google Chrome en versiones anteriores a 52.0.2743.82, no impide que los interceptores de la API modifiquen un objetivo de almacenamiento sin ajustar una propiedad, lo que permite a atacantes remotos eludir la Same Origin Policy a trav\u00e9s de un sitio web manipulado."
    }
  ],
  "id": "CVE-2016-5128",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-23T19:59:10.170",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2082633002"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2084183004"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2085223002"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2101983002"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/2103033002"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/619166"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201610-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1036428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3041-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2082633002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2084183004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2085223002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2101983002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/2103033002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/619166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-09"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-05-20 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B54CC-8096-4708-840D-D8A8C09C7955",
              "versionEndIncluding": "4.3.61.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F238C75-E24A-406F-BEB5-8758C8FE9603",
              "versionEndIncluding": "42.0.2311.152",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 4.3.61.21, utilizado en Google Chrome anterior a 43.0.2357.65, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-3910",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-05-20T10:59:19.933",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/74730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74730"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-06-05 23:59
Modified
2025-04-12 10:46
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
[email protected]http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
[email protected]http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
[email protected]http://www.debian.org/security/2016/dsa-3590
[email protected]http://www.securityfocus.com/bid/90876
[email protected]http://www.securitytracker.com/id/1035981
[email protected]http://www.ubuntu.com/usn/USN-2992-1
[email protected]https://access.redhat.com/errata/RHSA-2016:1190
[email protected]https://codereview.chromium.org/1875053002
[email protected]https://crbug.com/595259
[email protected]https://security.gentoo.org/glsa/201607-07
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3590
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/90876
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035981
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2992-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1190
af854a3a-2127-422b-91ae-364da2661108https://codereview.chromium.org/1875053002
af854a3a-2127-422b-91ae-364da2661108https://crbug.com/595259
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201607-07



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6F8A68-B4C0-4DB4-945F-4041F731FDE1",
              "versionEndIncluding": "5.0.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80D4D1E-C218-4105-8DB1-1D6BCC693F23",
              "versionEndIncluding": "50.0.2661.102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
    },
    {
      "lang": "es",
      "value": "objects.cc en Google V8 en versiones anteriores a 5.0.71.32, como es usado en Google Chrome en versiones anteriores a 51.0.2704.63, no restringe adecuadamente el empeoramiento descuidado, lo que permite a atacantes remotos provocar un denegaci\u00f3n de servicio (desbordamiento de buffer basado en memoria din\u00e1mica) o posiblmente tener otro impacto no especificado a trav\u00e9s de un c\u00f3digo JavaScript manipulado."
    }
  ],
  "id": "CVE-2016-1678",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-06-05T23:59:06.880",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "[email protected]",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "[email protected]",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1875053002"
    },
    {
      "source": "[email protected]",
      "url": "https://crbug.com/595259"
    },
    {
      "source": "[email protected]",
      "url": "https://security.gentoo.org/glsa/201607-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2992-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2016:1190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1875053002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://crbug.com/595259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201607-07"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-07-09 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
Impacted products
Vendor Product Version
google v8 -
iojs io.js *
iojs io.js 2.0.0
iojs io.js 2.0.1
iojs io.js 2.0.2
iojs io.js 2.1.0
iojs io.js 2.2.0
iojs io.js 2.2.1
iojs io.js 2.3.0
iojs io.js 2.3.1
iojs io.js 2.3.2
nodejs node.js *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iojs:io.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3188BB5-6918-455C-8D25-B4DBA22830D6",
              "versionEndIncluding": "1.8.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABEE90B-14C3-4147-BBDA-6E1186452174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FF9263D-673F-40A4-8D40-56DE5AD63B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BE5478-4021-42D4-B101-A572AAE17DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2233DADC-4FBB-4459-AD8D-B15636DC5970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CC13EF-7061-4833-A079-EAB70A32F64B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4A14A1-1D14-4CE8-9198-80C1772A8AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D2B3E1-973D-46ED-ADE4-BECE0CAFD678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8261E351-8CB2-4BCB-AB75-9FDD96DC2BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iojs:io.js:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C236FE4E-1FF0-47E5-91F9-75ADD6C61498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BCBBCD4-2142-44B7-B3ED-6D2A301F85C6",
              "versionEndIncluding": "0.12.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n de Utf8DecoderBase::WriteUtf16Slow en unicode.decoder.cc en Google V8, al igual que como se usa en Node.js anterior a 0.12.6, io.js anterior a 1.8.3 y 2.x antes de 2.3.3 y otros productos, no verifica que haya memoria disponible para un par surrogado UTF-16, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la posibilidad de causar otro impacto a trav\u00e9s de una secuencia de bytes manipulada."
    }
  ],
  "id": "CVE-2015-5380",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-07-09T10:59:00.057",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/75556"
    },
    {
      "source": "[email protected]",
      "url": "https://codereview.chromium.org/1226493003"
    },
    {
      "source": "[email protected]",
      "url": "https://github.com/joyent/node/issues/25583"
    },
    {
      "source": "[email protected]",
      "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/75556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://codereview.chromium.org/1226493003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/joyent/node/issues/25583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-06 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12CC8E6-3341-4505-99CF-384840C20815",
              "versionEndIncluding": "46.0.2490.86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "698C18EC-5A8D-4F42-88A9-F2BCAA1B8EA3",
              "versionEndIncluding": "4.6.85.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.73, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-8478",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-12-06T01:59:25.437",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2825-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2825-1"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-09-03 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E69B037-C7E9-4D99-9CF5-12041ACF6DE2",
              "versionEndIncluding": "4.4.63",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBDC4A7D-C94E-42B2-983F-A7660C62A1CD",
              "versionEndIncluding": "44.0.2403",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.5.103.29, como se utiliza en Google Chrome en versiones anteriores a 45.0.2454.85, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2015-6580",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-09-03T22:59:13.657",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id/1033472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033472"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-14 11:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
Impacted products
Vendor Product Version
google v8 *
google chrome *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB5A295-363E-4C75-8EB0-8672F50AF303",
              "versionEndIncluding": "4.7.80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F830030-A662-45C2-950D-EC2598644202",
              "versionEndIncluding": "47.0.2526.73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 en versiones anteriores a 4.7.80.23, como se utiliza en Google Chrome en versiones anteriores a 47.0.2526.80, permite a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos, un problema diferente a CVE-2015-8478."
    }
  ],
  "id": "CVE-2015-8548",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-12-14T11:59:04.967",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
    },
    {
      "source": "[email protected]",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.ubuntu.com/usn/USN-2860-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2860-1"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-05-22 13:29
Modified
2025-04-11 00:51
Severity ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Impacted products
Vendor Product Version
google chrome *
google chrome 27.0.1453.0
google chrome 27.0.1453.1
google chrome 27.0.1453.2
google chrome 27.0.1453.3
google chrome 27.0.1453.4
google chrome 27.0.1453.5
google chrome 27.0.1453.6
google chrome 27.0.1453.7
google chrome 27.0.1453.8
google chrome 27.0.1453.9
google chrome 27.0.1453.10
google chrome 27.0.1453.11
google chrome 27.0.1453.12
google chrome 27.0.1453.13
google chrome 27.0.1453.15
google chrome 27.0.1453.34
google chrome 27.0.1453.35
google chrome 27.0.1453.36
google chrome 27.0.1453.37
google chrome 27.0.1453.38
google chrome 27.0.1453.39
google chrome 27.0.1453.40
google chrome 27.0.1453.41
google chrome 27.0.1453.42
google chrome 27.0.1453.43
google chrome 27.0.1453.44
google chrome 27.0.1453.45
google chrome 27.0.1453.46
google chrome 27.0.1453.47
google chrome 27.0.1453.49
google chrome 27.0.1453.50
google chrome 27.0.1453.51
google chrome 27.0.1453.52
google chrome 27.0.1453.54
google chrome 27.0.1453.55
google chrome 27.0.1453.56
google chrome 27.0.1453.57
google chrome 27.0.1453.58
google chrome 27.0.1453.59
google chrome 27.0.1453.60
google chrome 27.0.1453.61
google chrome 27.0.1453.62
google chrome 27.0.1453.63
google chrome 27.0.1453.64
google chrome 27.0.1453.65
google chrome 27.0.1453.66
google chrome 27.0.1453.67
google chrome 27.0.1453.68
google chrome 27.0.1453.69
google chrome 27.0.1453.70
google chrome 27.0.1453.71
google chrome 27.0.1453.72
google chrome 27.0.1453.73
google chrome 27.0.1453.74
google chrome 27.0.1453.75
google chrome 27.0.1453.76
google chrome 27.0.1453.77
google chrome 27.0.1453.78
google chrome 27.0.1453.79
google chrome 27.0.1453.80
google chrome 27.0.1453.81
google chrome 27.0.1453.82
google chrome 27.0.1453.83
google chrome 27.0.1453.84
google chrome 27.0.1453.85
google chrome 27.0.1453.86
google chrome 27.0.1453.87
google chrome 27.0.1453.88
google chrome 27.0.1453.89
google chrome 27.0.1453.90
google v8 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAB43EE-4A88-4B1F-8167-6917FD095F81",
              "versionEndIncluding": "27.0.1453.91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB7C7-519D-4084-9F48-9D992A829246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D7F7CA-6DE0-4F03-A7AC-C99C91A57913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A874B4-CA16-4FEC-B67C-6707D58DF338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BFC6C5-455A-4F64-9BE8-8C65E7196650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F569848F-1558-447F-8852-F240FEEFAC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD52267-6CC1-403E-AEF8-D2B257E8013D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4DB744-7805-4CEC-8720-207031051F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5B5169-6135-4B1B-99E4-31813005B601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33356AF-7F3F-4CC9-AC6A-09669FF1E842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A98AF9-A23C-4B67-A93C-7E6F39917DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F26B1CB-9B8F-4FD3-9BAC-32141EBBD766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8005EA70-8B99-4653-9F58-D7EA3A538A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7E711E-1240-4875-B824-FBA5FAB4BBAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9DFC6EF-C4F6-4861-8712-27C335DE9E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "11667B12-9FAE-4043-B23D-983F178BFC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "57180BB1-D41C-42BE-B35E-532D451CC0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BEDF20-33CB-42AF-9335-9BF41B53DB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "80356017-C7C6-4F72-9A92-2F13C9ADE762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "513A84A5-8EA5-4095-84C1-5B55E07CE332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "268DE157-0335-404D-9568-F54D5AB1F4DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC8931C-122D-4E0C-8855-456070822EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138D90F-0954-4627-A6CF-4671AC474FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5FE20F-29B9-4E48-88A8-E00AD790E93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E19C352-0C20-4AC1-BF53-1B0A416F0FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6271E601-9E4D-4765-B71D-7FA2B9FE0013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9702130A-CB3F-433E-892B-7B4338A048B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "129CCA51-B755-4A61-8B63-EC69AA2970F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "D572B358-361A-49E2-B9E9-CC97F6424418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "841CA94D-859E-425A-A735-62A35B20E23F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F1B5E4-BA8B-440B-B8D2-2E2093F4B32E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE6989D-BE91-4C92-9734-61A7F234E9F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4481D4-4143-4BC0-983C-974695711F54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A5927A-3182-4BB5-8AC2-72EC2F43027C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "2780C1B8-F4B6-4C11-974C-AB0205896782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "08808A78-646E-4D6D-BD57-5EC533D904FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F526E2-8625-4337-9855-0FB3FB135BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AF361A-32B7-40A6-9863-793ED2C29C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E9901E-F811-4736-B7C7-847584B162C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9762D5-D548-4910-B8F1-3A0E3664C6CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "540B23F2-8434-4E40-9CBE-E8A60D7DB05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1FD2F21-FB01-4D78-8C05-0BBD2D257C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8E2340-ED37-4942-B0D6-72E25AF8886C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "892CABA3-5B2C-4168-9F1D-03D58D212A0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95B8C085-3EDE-4363-973C-EC649E6F07EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "6775A3FB-7B3C-4713-B1F7-82D49C8867E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A6E53E-EEE8-4D16-BEE0-1549E3C4FBE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C48274-9025-4909-AA5F-2A6C90902646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C9EBB3-3329-43C6-998F-BAB480181BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A9D90E-1827-4F82-B2C6-214E0733B128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCD6FE8-504F-4B2B-B401-91F31862063E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD33D555-75B1-43BC-B32E-B5D794419882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F8257E-D36C-4799-BD3D-CA8AE2E7701E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AB2B3D-EFE4-48BA-8D70-DAC500321472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E40617D-2EB9-4773-A81B-5BA4F1BA6786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44A775E-C82A-4B5C-BA3B-20022408CF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E21A34-4AFB-4A44-BC09-68B6672DFD93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0450801-F2EB-48B5-9DE4-6A0BCF7E3F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50BF3E0-4AFB-43CD-A7BF-13827000D0A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5BD9A8-A717-4398-847F-4C7D71AD5588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24422D7-523C-4A21-9649-06BB0A1908B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "040EF42D-185F-446C-944B-712AE2A62036",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C139C6E-3FA7-4295-9DE3-938EDEB09D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "A518C048-1CB5-4BB9-B2D7-85A4399E8AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "92874CC7-49E9-4A7F-9021-1C7ECE35B2AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "345DA945-0490-4A5E-8E20-7FC5886AB170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA7F6E3-F872-4EF4-B2E5-C1677867F166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "3383A496-84BF-427F-88A0-1620A36E9177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "482C95EF-FA97-4709-9FB4-B7AB3437C69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D5B77B-5860-4855-B416-E84E43E267EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E157716D-4FC2-4F3A-B5ED-96C098408D1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7900AA49-FCFE-4068-BA49-50EA0B53C4CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Google V8, que se utiliza en Google Chrome anterior a v27.0.1453.93, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fuera de los l\u00edmites de lectura) a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2013-2838",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-22T13:29:55.987",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
    },
    {
      "source": "[email protected]",
      "url": "http://www.debian.org/security/2013/dsa-2695"
    },
    {
      "source": "[email protected]",
      "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
    },
    {
      "source": "[email protected]",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-10-08 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
google chrome *
google v8 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49217EEC-AE40-4FBD-A5D4-B4A323CD5645",
              "versionEndIncluding": "38.0.2125.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE7D19C-F45D-4A89-8740-8F9D450093C3",
              "versionEndIncluding": "3.28.69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Google V8 anterior a 3.28.71.15, utilizado en Google Chrome anterior a 38.0.2125.101, permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2014-7967",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-10-08T10:55:07.080",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

CVE-2013-6640 (GCVE-0-2013-6640)
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
References
http://code.google.com/p/v8/source/detail?r=17801x_refsource_CONFIRM
http://secunia.com/advisories/56217third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.htmlvendor-advisory, x_refsource_SUSE
http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2013/dsa-2811vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/56216third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1029442vdb-entry, x_refsource_SECTRACK
https://code.google.com/p/chromium/issues/detail?id=319860x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.253Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17801"
          },
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17801"
        },
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-6640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17801",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17801"
            },
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319860",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319860"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6640",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5037 (GCVE-0-2011-5037)
Vulnerability from cvelistv5
Published
2011-12-30 01:00
Modified
2024-08-07 00:23
Severity ?
Summary
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.836Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
          },
          {
            "name": "VU#903934",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/903934"
          },
          {
            "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-06T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
        },
        {
          "name": "VU#903934",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/903934"
        },
        {
          "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2011-5037",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.nruns.com/_downloads/advisory28122011.pdf",
              "refsource": "MISC",
              "url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
            },
            {
              "name": "VU#903934",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/903934"
            },
            {
              "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
            },
            {
              "name": "http://www.ocert.org/advisories/ocert-2011-003.html",
              "refsource": "MISC",
              "url": "http://www.ocert.org/advisories/ocert-2011-003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5037",
    "datePublished": "2011-12-30T01:00:00",
    "dateReserved": "2011-12-29T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-6639 (GCVE-0-2013-6639)
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
References
http://code.google.com/p/v8/source/detail?r=17801x_refsource_CONFIRM
http://secunia.com/advisories/56217third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.htmlvendor-advisory, x_refsource_SUSE
http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlx_refsource_CONFIRM
https://code.google.com/p/chromium/issues/detail?id=319835x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2013/dsa-2811vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/56216third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1029442vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17801"
          },
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17801"
        },
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-6639",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17801",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17801"
            },
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319835",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319835"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6639",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3152 (GCVE-0-2014-3152)
Vulnerability from cvelistv5
Published
2014-05-21 10:00
Modified
2024-08-06 10:35
Severity ?
Summary
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:56.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2015-6845",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=20363"
          },
          {
            "name": "FEDORA-2015-6890",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
          },
          {
            "name": "FEDORA-2015-6908",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
          },
          {
            "name": "DSA-2939",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2939"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
          },
          {
            "name": "60372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60372"
          },
          {
            "name": "openSUSE-SU-2014:0783",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
          },
          {
            "name": "59155",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59155"
          },
          {
            "name": "58920",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58920"
          },
          {
            "name": "1030270",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030270"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "FEDORA-2015-6845",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=20363"
        },
        {
          "name": "FEDORA-2015-6890",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
        },
        {
          "name": "FEDORA-2015-6908",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
        },
        {
          "name": "DSA-2939",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2939"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
        },
        {
          "name": "60372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60372"
        },
        {
          "name": "openSUSE-SU-2014:0783",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
        },
        {
          "name": "59155",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59155"
        },
        {
          "name": "58920",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58920"
        },
        {
          "name": "1030270",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030270"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2014-3152",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2015-6845",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157363.html"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=20363",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=20363"
            },
            {
              "name": "FEDORA-2015-6890",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157338.html"
            },
            {
              "name": "FEDORA-2015-6908",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157357.html"
            },
            {
              "name": "DSA-2939",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2939"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
            },
            {
              "name": "60372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60372"
            },
            {
              "name": "openSUSE-SU-2014:0783",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=358057",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=358057"
            },
            {
              "name": "59155",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59155"
            },
            {
              "name": "58920",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58920"
            },
            {
              "name": "1030270",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030270"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-3152",
    "datePublished": "2014-05-21T10:00:00",
    "dateReserved": "2014-05-03T00:00:00",
    "dateUpdated": "2024-08-06T10:35:56.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-3679 (GCVE-0-2016-3679)
Vulnerability from cvelistv5
Published
2016-03-29 10:00
Modified
2024-08-06 00:03
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:03:34.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2016:0525",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
          },
          {
            "name": "openSUSE-SU-2016:0929",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
          },
          {
            "name": "openSUSE-SU-2016:1059",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
          },
          {
            "name": "1035423",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035423"
          },
          {
            "name": "openSUSE-SU-2016:0930",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
          },
          {
            "name": "USN-2955-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2955-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-30T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2016:0525",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
        },
        {
          "name": "openSUSE-SU-2016:0929",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
        },
        {
          "name": "openSUSE-SU-2016:1059",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
        },
        {
          "name": "1035423",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035423"
        },
        {
          "name": "openSUSE-SU-2016:0930",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
        },
        {
          "name": "USN-2955-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2955-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-3679",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2016:0525",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html"
            },
            {
              "name": "openSUSE-SU-2016:0929",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html"
            },
            {
              "name": "openSUSE-SU-2016:1059",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html"
            },
            {
              "name": "1035423",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035423"
            },
            {
              "name": "openSUSE-SU-2016:0930",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html"
            },
            {
              "name": "USN-2955-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2955-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-3679",
    "datePublished": "2016-03-29T10:00:00",
    "dateReserved": "2016-03-28T00:00:00",
    "dateUpdated": "2024-08-06T00:03:34.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-6580 (GCVE-0-2015-6580)
Vulnerability from cvelistv5
Published
2015-09-03 22:00
Modified
2024-08-06 07:22
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:22:22.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
          },
          {
            "name": "1033472",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033472"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-09-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-20T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
        },
        {
          "name": "1033472",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1033472"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-6580",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
            },
            {
              "name": "1033472",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1033472"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-6580",
    "datePublished": "2015-09-03T22:00:00",
    "dateReserved": "2015-08-21T00:00:00",
    "dateUpdated": "2024-08-06T07:22:22.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1688 (GCVE-0-2016-1688)
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.959Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/604897"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1927003003"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/604897"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1927003003"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-1688",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "https://crbug.com/604897",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/604897"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "https://codereview.chromium.org/1927003003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1927003003"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1688",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-7834 (GCVE-0-2015-7834)
Vulnerability from cvelistv5
Published
2015-10-15 10:00
Modified
2024-08-06 07:59
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:59:00.379Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
          },
          {
            "name": "USN-2770-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2770-1"
          },
          {
            "name": "USN-2770-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2770-2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-22T18:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
        },
        {
          "name": "USN-2770-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2770-1"
        },
        {
          "name": "USN-2770-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2770-2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-7834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html"
            },
            {
              "name": "USN-2770-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2770-1"
            },
            {
              "name": "USN-2770-2",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2770-2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-7834",
    "datePublished": "2015-10-15T10:00:00",
    "dateReserved": "2015-10-14T00:00:00",
    "dateUpdated": "2024-08-06T07:59:00.379Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1704 (GCVE-0-2014-1704)
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 09:50
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:50:10.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2883",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2883"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
          },
          {
            "name": "GLSA-201408-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=18564"
          },
          {
            "name": "1029914",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029914"
          },
          {
            "name": "openSUSE-SU-2014:0501",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19668"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19614"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-04T17:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "DSA-2883",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2883"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
        },
        {
          "name": "GLSA-201408-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=18564"
        },
        {
          "name": "1029914",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029914"
        },
        {
          "name": "openSUSE-SU-2014:0501",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19668"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19614"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2014-1704",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2883",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2883"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html"
            },
            {
              "name": "GLSA-201408-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=18564",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=18564"
            },
            {
              "name": "1029914",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029914"
            },
            {
              "name": "openSUSE-SU-2014:0501",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=345715",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=345715"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19668",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19668"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19614",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19614"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=349079",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=349079"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=328202",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=328202"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-1704",
    "datePublished": "2014-03-16T10:00:00",
    "dateReserved": "2014-01-29T00:00:00",
    "dateUpdated": "2024-08-06T09:50:10.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2555 (GCVE-0-2009-2555)
Vulnerability from cvelistv5
Published
2009-07-21 16:00
Modified
2024-08-07 05:52
Severity ?
Summary
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:15.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
          },
          {
            "name": "35722",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35722"
          },
          {
            "name": "googlechrome-javascript-bo(51801)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
          },
          {
            "name": "35844",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35844"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codereview.chromium.org/141042"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codereview.chromium.org/141042/diff/6/1004"
          },
          {
            "name": "ADV-2009-1924",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1924"
          },
          {
            "name": "55939",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55939"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
        },
        {
          "name": "35722",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35722"
        },
        {
          "name": "googlechrome-javascript-bo(51801)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
        },
        {
          "name": "35844",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35844"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codereview.chromium.org/141042"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codereview.chromium.org/141042/diff/6/1004"
        },
        {
          "name": "ADV-2009-1924",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1924"
        },
        {
          "name": "55939",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55939"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2009-2555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=14719",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=14719"
            },
            {
              "name": "35722",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35722"
            },
            {
              "name": "googlechrome-javascript-bo(51801)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51801"
            },
            {
              "name": "35844",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35844"
            },
            {
              "name": "http://codereview.chromium.org/141042",
              "refsource": "CONFIRM",
              "url": "http://codereview.chromium.org/141042"
            },
            {
              "name": "http://codereview.chromium.org/141042/diff/6/1004",
              "refsource": "CONFIRM",
              "url": "http://codereview.chromium.org/141042/diff/6/1004"
            },
            {
              "name": "ADV-2009-1924",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1924"
            },
            {
              "name": "55939",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55939"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2555",
    "datePublished": "2009-07-21T16:00:00",
    "dateReserved": "2009-07-21T00:00:00",
    "dateUpdated": "2024-08-07T05:52:15.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-3333 (GCVE-0-2015-3333)
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 05:47
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:47:57.084Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-2570-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-2570-1"
          },
          {
            "name": "DSA-3238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3238"
          },
          {
            "name": "74221",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74221"
          },
          {
            "name": "openSUSE-SU-2015:0748",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-2570-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-2570-1"
        },
        {
          "name": "DSA-3238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3238"
        },
        {
          "name": "74221",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74221"
        },
        {
          "name": "openSUSE-SU-2015:0748",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-3333",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-2570-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-2570-1"
            },
            {
              "name": "DSA-3238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3238"
            },
            {
              "name": "74221",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74221"
            },
            {
              "name": "openSUSE-SU-2015:0748",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3333",
    "datePublished": "2015-04-19T10:00:00",
    "dateReserved": "2015-04-19T00:00:00",
    "dateUpdated": "2024-08-06T05:47:57.084Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-5129 (GCVE-0-2016-5129)
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
Summary
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
References
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.htmlvendor-advisory, x_refsource_SUSE
https://source.android.com/security/bulletin/2017-04-01x_refsource_CONFIRM
http://www.securityfocus.com/bid/92053vdb-entry, x_refsource_BID
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.htmlx_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-3041-1vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.htmlvendor-advisory, x_refsource_SUSE
https://codereview.chromium.org/2078403002/x_refsource_CONFIRM
https://crbug.com/620553x_refsource_CONFIRM
https://codereview.chromium.org/2102243002x_refsource_CONFIRM
https://codereview.chromium.org/2111133002x_refsource_CONFIRM
https://security.gentoo.org/glsa/201610-09vendor-advisory, x_refsource_GENTOO
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2016-1485.htmlvendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1036428vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id/1038201vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2016/dsa-3637vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:53:47.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1868",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
          },
          {
            "name": "openSUSE-SU-2016:1869",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2017-04-01"
          },
          {
            "name": "92053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
          },
          {
            "name": "USN-3041-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3041-1"
          },
          {
            "name": "openSUSE-SU-2016:1918",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2078403002/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/620553"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2102243002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2111133002"
          },
          {
            "name": "GLSA-201610-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201610-09"
          },
          {
            "name": "openSUSE-SU-2016:1865",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
          },
          {
            "name": "RHSA-2016:1485",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
          },
          {
            "name": "1036428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036428"
          },
          {
            "name": "1038201",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038201"
          },
          {
            "name": "DSA-3637",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1868",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
        },
        {
          "name": "openSUSE-SU-2016:1869",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://source.android.com/security/bulletin/2017-04-01"
        },
        {
          "name": "92053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
        },
        {
          "name": "USN-3041-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3041-1"
        },
        {
          "name": "openSUSE-SU-2016:1918",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2078403002/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/620553"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2102243002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2111133002"
        },
        {
          "name": "GLSA-201610-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201610-09"
        },
        {
          "name": "openSUSE-SU-2016:1865",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
        },
        {
          "name": "RHSA-2016:1485",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
        },
        {
          "name": "1036428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036428"
        },
        {
          "name": "1038201",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038201"
        },
        {
          "name": "DSA-3637",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-5129",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1868",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
            },
            {
              "name": "openSUSE-SU-2016:1869",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
            },
            {
              "name": "https://source.android.com/security/bulletin/2017-04-01",
              "refsource": "CONFIRM",
              "url": "https://source.android.com/security/bulletin/2017-04-01"
            },
            {
              "name": "92053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92053"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
            },
            {
              "name": "USN-3041-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3041-1"
            },
            {
              "name": "openSUSE-SU-2016:1918",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
            },
            {
              "name": "https://codereview.chromium.org/2078403002/",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2078403002/"
            },
            {
              "name": "https://crbug.com/620553",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/620553"
            },
            {
              "name": "https://codereview.chromium.org/2102243002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2102243002"
            },
            {
              "name": "https://codereview.chromium.org/2111133002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2111133002"
            },
            {
              "name": "GLSA-201610-09",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201610-09"
            },
            {
              "name": "openSUSE-SU-2016:1865",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
            },
            {
              "name": "RHSA-2016:1485",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
            },
            {
              "name": "1036428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036428"
            },
            {
              "name": "1038201",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038201"
            },
            {
              "name": "DSA-3637",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-5129",
    "datePublished": "2016-07-23T19:00:00",
    "dateReserved": "2016-05-31T00:00:00",
    "dateUpdated": "2024-08-06T00:53:47.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-8548 (GCVE-0-2015-8548)
Vulnerability from cvelistv5
Published
2015-12-14 11:00
Modified
2024-08-06 08:20
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:20:43.104Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
          },
          {
            "name": "RHSA-2015:2618",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
          },
          {
            "name": "USN-2860-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2860-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-05T14:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
        },
        {
          "name": "RHSA-2015:2618",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
        },
        {
          "name": "USN-2860-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2860-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-8548",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html"
            },
            {
              "name": "RHSA-2015:2618",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html"
            },
            {
              "name": "USN-2860-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2860-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-8548",
    "datePublished": "2015-12-14T11:00:00",
    "dateReserved": "2015-12-13T00:00:00",
    "dateUpdated": "2024-08-06T08:20:43.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-3886 (GCVE-0-2011-3886)
Vulnerability from cvelistv5
Published
2011-10-25 19:00
Modified
2024-08-06 23:53
Severity ?
Summary
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:31.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:13201",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
          },
          {
            "name": "google-chrome-v8-code-exec(70964)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:13201",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
        },
        {
          "name": "google-chrome-v8-code-exec(70964)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2011-3886",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:13201",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13201"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=98773",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=98773"
            },
            {
              "name": "http://code.google.com/p/chromium/issues/detail?id=99167",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/chromium/issues/detail?id=99167"
            },
            {
              "name": "google-chrome-v8-code-exec(70964)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70964"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2011-3886",
    "datePublished": "2011-10-25T19:00:00",
    "dateReserved": "2011-10-01T00:00:00",
    "dateUpdated": "2024-08-06T23:53:31.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1669 (GCVE-0-2016-1669)
Vulnerability from cvelistv5
Published
2016-05-14 21:00
Modified
2024-08-05 23:02
Severity ?
Summary
The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
References
http://www.securityfocus.com/bid/90584vdb-entry, x_refsource_BID
https://access.redhat.com/errata/RHSA-2017:0880vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1035872vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2016-1080.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.htmlvendor-advisory, x_refsource_SUSE
https://access.redhat.com/errata/RHSA-2017:0881vendor-advisory, x_refsource_REDHAT
https://codereview.chromium.org/1945313002x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2018:0336vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2017:0882vendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2016/dsa-3590vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-2960-1vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/vendor-advisory, x_refsource_FEDORA
https://crbug.com/606115x_refsource_CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541x_refsource_CONFIRM
https://access.redhat.com/errata/RHSA-2017:0879vendor-advisory, x_refsource_REDHAT
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2017-0002.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.htmlvendor-advisory, x_refsource_SUSE
https://security.gentoo.org/glsa/201605-02vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90584",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90584"
          },
          {
            "name": "RHSA-2017:0880",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0880"
          },
          {
            "name": "1035872",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035872"
          },
          {
            "name": "RHSA-2016:1080",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
          },
          {
            "name": "openSUSE-SU-2016:1304",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
          },
          {
            "name": "RHSA-2017:0881",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0881"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1945313002"
          },
          {
            "name": "RHSA-2018:0336",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2018:0336"
          },
          {
            "name": "RHSA-2017:0882",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0882"
          },
          {
            "name": "openSUSE-SU-2016:1655",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "name": "USN-2960-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2960-1"
          },
          {
            "name": "FEDORA-2016-6fd3131c03",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
          },
          {
            "name": "FEDORA-2016-e720bc8451",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/606115"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
          },
          {
            "name": "RHSA-2017:0879",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:0879"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2016:1834",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
          },
          {
            "name": "RHSA-2017:0002",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
          },
          {
            "name": "openSUSE-SU-2016:1319",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
          },
          {
            "name": "GLSA-201605-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201605-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-22T10:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90584",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90584"
        },
        {
          "name": "RHSA-2017:0880",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0880"
        },
        {
          "name": "1035872",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035872"
        },
        {
          "name": "RHSA-2016:1080",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
        },
        {
          "name": "openSUSE-SU-2016:1304",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
        },
        {
          "name": "RHSA-2017:0881",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0881"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1945313002"
        },
        {
          "name": "RHSA-2018:0336",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2018:0336"
        },
        {
          "name": "RHSA-2017:0882",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0882"
        },
        {
          "name": "openSUSE-SU-2016:1655",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "name": "USN-2960-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2960-1"
        },
        {
          "name": "FEDORA-2016-6fd3131c03",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
        },
        {
          "name": "FEDORA-2016-e720bc8451",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/606115"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
        },
        {
          "name": "RHSA-2017:0879",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:0879"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2016:1834",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
        },
        {
          "name": "RHSA-2017:0002",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
        },
        {
          "name": "openSUSE-SU-2016:1319",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
        },
        {
          "name": "GLSA-201605-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201605-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-1669",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90584",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90584"
            },
            {
              "name": "RHSA-2017:0880",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0880"
            },
            {
              "name": "1035872",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035872"
            },
            {
              "name": "RHSA-2016:1080",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html"
            },
            {
              "name": "openSUSE-SU-2016:1304",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"
            },
            {
              "name": "RHSA-2017:0881",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0881"
            },
            {
              "name": "https://codereview.chromium.org/1945313002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1945313002"
            },
            {
              "name": "RHSA-2018:0336",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2018:0336"
            },
            {
              "name": "RHSA-2017:0882",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0882"
            },
            {
              "name": "openSUSE-SU-2016:1655",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "USN-2960-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2960-1"
            },
            {
              "name": "FEDORA-2016-6fd3131c03",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"
            },
            {
              "name": "FEDORA-2016-e720bc8451",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"
            },
            {
              "name": "https://crbug.com/606115",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/606115"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
            },
            {
              "name": "RHSA-2017:0879",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:0879"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2016:1834",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"
            },
            {
              "name": "RHSA-2017:0002",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html"
            },
            {
              "name": "openSUSE-SU-2016:1319",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"
            },
            {
              "name": "GLSA-201605-02",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201605-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1669",
    "datePublished": "2016-05-14T21:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1678 (GCVE-0-2016-1678)
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:12.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/595259"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1875053002"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/595259"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1875053002"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-1678",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "https://crbug.com/595259",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/595259"
            },
            {
              "name": "https://codereview.chromium.org/1875053002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1875053002"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1678",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:12.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1677 (GCVE-0-2016-1677)
Vulnerability from cvelistv5
Published
2016-06-05 23:00
Modified
2024-08-05 23:02
Severity ?
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:02:13.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/602970"
          },
          {
            "name": "90876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90876"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1936083002"
          },
          {
            "name": "openSUSE-SU-2016:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
          },
          {
            "name": "1035981",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035981"
          },
          {
            "name": "DSA-3590",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3590"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
          },
          {
            "name": "USN-2992-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2992-1"
          },
          {
            "name": "openSUSE-SU-2016:1430",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
          },
          {
            "name": "RHSA-2016:1190",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2016:1190"
          },
          {
            "name": "GLSA-201607-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-07"
          },
          {
            "name": "openSUSE-SU-2016:1433",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/602970"
        },
        {
          "name": "90876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90876"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1936083002"
        },
        {
          "name": "openSUSE-SU-2016:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
        },
        {
          "name": "1035981",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035981"
        },
        {
          "name": "DSA-3590",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3590"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
        },
        {
          "name": "USN-2992-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2992-1"
        },
        {
          "name": "openSUSE-SU-2016:1430",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
        },
        {
          "name": "RHSA-2016:1190",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2016:1190"
        },
        {
          "name": "GLSA-201607-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-07"
        },
        {
          "name": "openSUSE-SU-2016:1433",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-1677",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://crbug.com/602970",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/602970"
            },
            {
              "name": "90876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90876"
            },
            {
              "name": "https://codereview.chromium.org/1936083002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1936083002"
            },
            {
              "name": "openSUSE-SU-2016:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
            },
            {
              "name": "1035981",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035981"
            },
            {
              "name": "DSA-3590",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3590"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
            },
            {
              "name": "USN-2992-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2992-1"
            },
            {
              "name": "openSUSE-SU-2016:1430",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
            },
            {
              "name": "RHSA-2016:1190",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2016:1190"
            },
            {
              "name": "GLSA-201607-07",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-07"
            },
            {
              "name": "openSUSE-SU-2016:1433",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-1677",
    "datePublished": "2016-06-05T23:00:00",
    "dateReserved": "2016-01-12T00:00:00",
    "dateUpdated": "2024-08-05T23:02:13.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-5128 (GCVE-0-2016-5128)
Vulnerability from cvelistv5
Published
2016-07-23 19:00
Modified
2024-08-06 00:53
Severity ?
Summary
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
References
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/92053vdb-entry, x_refsource_BID
https://codereview.chromium.org/2101983002x_refsource_CONFIRM
http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.htmlx_refsource_CONFIRM
https://codereview.chromium.org/2082633002x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-3041-1vendor-advisory, x_refsource_UBUNTU
https://codereview.chromium.org/2085223002x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.htmlvendor-advisory, x_refsource_SUSE
https://codereview.chromium.org/2084183004x_refsource_CONFIRM
https://codereview.chromium.org/2103033002x_refsource_CONFIRM
https://security.gentoo.org/glsa/201610-09vendor-advisory, x_refsource_GENTOO
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2016-1485.htmlvendor-advisory, x_refsource_REDHAT
https://crbug.com/619166x_refsource_CONFIRM
http://www.securitytracker.com/id/1036428vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2016/dsa-3637vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:53:47.358Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:1868",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
          },
          {
            "name": "openSUSE-SU-2016:1869",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
          },
          {
            "name": "92053",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2101983002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2082633002"
          },
          {
            "name": "USN-3041-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3041-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2085223002"
          },
          {
            "name": "openSUSE-SU-2016:1918",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2084183004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/2103033002"
          },
          {
            "name": "GLSA-201610-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201610-09"
          },
          {
            "name": "openSUSE-SU-2016:1865",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
          },
          {
            "name": "RHSA-2016:1485",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://crbug.com/619166"
          },
          {
            "name": "1036428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036428"
          },
          {
            "name": "DSA-3637",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:1868",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
        },
        {
          "name": "openSUSE-SU-2016:1869",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
        },
        {
          "name": "92053",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2101983002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2082633002"
        },
        {
          "name": "USN-3041-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3041-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2085223002"
        },
        {
          "name": "openSUSE-SU-2016:1918",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2084183004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/2103033002"
        },
        {
          "name": "GLSA-201610-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201610-09"
        },
        {
          "name": "openSUSE-SU-2016:1865",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
        },
        {
          "name": "RHSA-2016:1485",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://crbug.com/619166"
        },
        {
          "name": "1036428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036428"
        },
        {
          "name": "DSA-3637",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-5128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:1868",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"
            },
            {
              "name": "openSUSE-SU-2016:1869",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"
            },
            {
              "name": "92053",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92053"
            },
            {
              "name": "https://codereview.chromium.org/2101983002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2101983002"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"
            },
            {
              "name": "https://codereview.chromium.org/2082633002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2082633002"
            },
            {
              "name": "USN-3041-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3041-1"
            },
            {
              "name": "https://codereview.chromium.org/2085223002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2085223002"
            },
            {
              "name": "openSUSE-SU-2016:1918",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"
            },
            {
              "name": "https://codereview.chromium.org/2084183004",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2084183004"
            },
            {
              "name": "https://codereview.chromium.org/2103033002",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/2103033002"
            },
            {
              "name": "GLSA-201610-09",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201610-09"
            },
            {
              "name": "openSUSE-SU-2016:1865",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"
            },
            {
              "name": "RHSA-2016:1485",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html"
            },
            {
              "name": "https://crbug.com/619166",
              "refsource": "CONFIRM",
              "url": "https://crbug.com/619166"
            },
            {
              "name": "1036428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036428"
            },
            {
              "name": "DSA-3637",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-5128",
    "datePublished": "2016-07-23T19:00:00",
    "dateReserved": "2016-05-31T00:00:00",
    "dateUpdated": "2024-08-06T00:53:47.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-1346 (GCVE-0-2015-1346)
Vulnerability from cvelistv5
Published
2015-01-22 22:00
Modified
2024-08-06 04:40
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:40:18.662Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
          },
          {
            "name": "62575",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62575"
          },
          {
            "name": "google-v8-cve20151346-code-exec(100361)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
          },
          {
            "name": "USN-2476-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2476-1"
          },
          {
            "name": "GLSA-201502-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
          },
          {
            "name": "1031623",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031623"
          },
          {
            "name": "RHSA-2015:0093",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
          },
          {
            "name": "62383",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62383"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
        },
        {
          "name": "62575",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62575"
        },
        {
          "name": "google-v8-cve20151346-code-exec(100361)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
        },
        {
          "name": "USN-2476-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2476-1"
        },
        {
          "name": "GLSA-201502-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
        },
        {
          "name": "1031623",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031623"
        },
        {
          "name": "RHSA-2015:0093",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
        },
        {
          "name": "62383",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62383"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-1346",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
            },
            {
              "name": "62575",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62575"
            },
            {
              "name": "google-v8-cve20151346-code-exec(100361)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361"
            },
            {
              "name": "USN-2476-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2476-1"
            },
            {
              "name": "GLSA-201502-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
            },
            {
              "name": "1031623",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031623"
            },
            {
              "name": "RHSA-2015:0093",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
            },
            {
              "name": "62383",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62383"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-1346",
    "datePublished": "2015-01-22T22:00:00",
    "dateReserved": "2015-01-22T00:00:00",
    "dateUpdated": "2024-08-06T04:40:18.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-5380 (GCVE-0-2015-5380)
Vulnerability from cvelistv5
Published
2015-07-09 10:00
Modified
2024-08-06 06:50
Severity ?
Summary
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:02.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1226493003"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/joyent/node/issues/25583"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
          },
          {
            "name": "75556",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75556"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1226493003"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://medium.com/%40iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/joyent/node/issues/25583"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
        },
        {
          "name": "75556",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75556"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-5380",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://codereview.chromium.org/1226493003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1226493003"
            },
            {
              "name": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852",
              "refsource": "CONFIRM",
              "url": "https://medium.com/@iojs/important-security-upgrades-for-node-js-and-io-js-8ac14ece5852"
            },
            {
              "name": "https://github.com/joyent/node/issues/25583",
              "refsource": "CONFIRM",
              "url": "https://github.com/joyent/node/issues/25583"
            },
            {
              "name": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/",
              "refsource": "CONFIRM",
              "url": "http://blog.nodejs.org/2015/07/03/node-v0-12-6-stable/"
            },
            {
              "name": "75556",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75556"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-5380",
    "datePublished": "2015-07-09T10:00:00",
    "dateReserved": "2015-07-06T00:00:00",
    "dateUpdated": "2024-08-06T06:50:02.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-2843 (GCVE-0-2016-2843)
Vulnerability from cvelistv5
Published
2016-03-06 02:00
Modified
2024-08-05 23:32
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:32:21.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1035185",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035185"
          },
          {
            "name": "USN-2920-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2920-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-01T15:57:02",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "1035185",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035185"
        },
        {
          "name": "USN-2920-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2920-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2016-2843",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1035185",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035185"
            },
            {
              "name": "USN-2920-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2920-1"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2016-2843",
    "datePublished": "2016-03-06T02:00:00",
    "dateReserved": "2016-03-05T00:00:00",
    "dateUpdated": "2024-08-05T23:32:21.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2838 (GCVE-0-2013-2838)
Vulnerability from cvelistv5
Published
2013-05-22 10:00
Modified
2024-08-06 15:52
Severity ?
Summary
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:52:20.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
          },
          {
            "name": "DSA-2695",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2695"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
          },
          {
            "name": "oval:org.mitre.oval:def:16625",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
        },
        {
          "name": "DSA-2695",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2695"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
        },
        {
          "name": "oval:org.mitre.oval:def:16625",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-2838",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=235311",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=235311"
            },
            {
              "name": "DSA-2695",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2695"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
            },
            {
              "name": "oval:org.mitre.oval:def:16625",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16625"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2013-2838",
    "datePublished": "2013-05-22T10:00:00",
    "dateReserved": "2013-04-11T00:00:00",
    "dateUpdated": "2024-08-06T15:52:20.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-2238 (GCVE-0-2015-2238)
Vulnerability from cvelistv5
Published
2015-03-09 00:00
Modified
2024-08-06 05:10
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:10:15.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-2521-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2521-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-13T15:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-2521-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2521-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-2238",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-2521-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2521-1"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-2238",
    "datePublished": "2015-03-09T00:00:00",
    "dateReserved": "2015-03-08T00:00:00",
    "dateUpdated": "2024-08-06T05:10:15.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-6668 (GCVE-0-2013-6668)
Vulnerability from cvelistv5
Published
2014-03-05 02:00
Modified
2024-08-06 17:46
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
          },
          {
            "name": "65930",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65930"
          },
          {
            "name": "DSA-2883",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2883"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
          },
          {
            "name": "61184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19475"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19553"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/v8/source/detail?r=19599"
          },
          {
            "name": "MDVSA-2015:142",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-04T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
        },
        {
          "name": "65930",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65930"
        },
        {
          "name": "DSA-2883",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2883"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
        },
        {
          "name": "61184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19475"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19553"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/v8/source/detail?r=19599"
        },
        {
          "name": "MDVSA-2015:142",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-6668",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=344186",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=344186"
            },
            {
              "name": "65930",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65930"
            },
            {
              "name": "DSA-2883",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2883"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0516.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0516.html"
            },
            {
              "name": "61184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61184"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19475",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19475"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=343964",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=343964"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=347909",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=347909"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19553",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19553"
            },
            {
              "name": "https://code.google.com/p/v8/source/detail?r=19599",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/v8/source/detail?r=19599"
            },
            {
              "name": "MDVSA-2015:142",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6668",
    "datePublished": "2014-03-05T02:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-5128 (GCVE-0-2012-5128)
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:02.695Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56413",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56413"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
          },
          {
            "name": "87081",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/87081"
          },
          {
            "name": "oval:org.mitre.oval:def:15221",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "56413",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56413"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
        },
        {
          "name": "87081",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/87081"
        },
        {
          "name": "oval:org.mitre.oval:def:15221",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2012-5128",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56413",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56413"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=157124",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=157124"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
            },
            {
              "name": "87081",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/87081"
            },
            {
              "name": "oval:org.mitre.oval:def:15221",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15221"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5128",
    "datePublished": "2012-11-07T11:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:02.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-3910 (GCVE-0-2015-3910)
Vulnerability from cvelistv5
Published
2015-05-20 10:00
Modified
2024-08-06 05:56
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:56:16.030Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2015:0969",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
          },
          {
            "name": "74730",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74730"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2015:0969",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
        },
        {
          "name": "74730",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74730"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-3910",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2015:0969",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html"
            },
            {
              "name": "74730",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74730"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-3910",
    "datePublished": "2015-05-20T10:00:00",
    "dateReserved": "2015-05-12T00:00:00",
    "dateUpdated": "2024-08-06T05:56:16.030Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-0836 (GCVE-0-2013-0836)
Vulnerability from cvelistv5
Published
2013-01-15 21:00
Modified
2024-08-06 14:41
Severity ?
Summary
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:41:47.384Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:0236",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
          },
          {
            "name": "oval:org.mitre.oval:def:16459",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:0236",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
        },
        {
          "name": "oval:org.mitre.oval:def:16459",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-0836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:0236",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=150545",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=150545"
            },
            {
              "name": "oval:org.mitre.oval:def:16459",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16459"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2013-0836",
    "datePublished": "2013-01-15T21:00:00",
    "dateReserved": "2013-01-07T00:00:00",
    "dateUpdated": "2024-08-06T14:41:47.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-7967 (GCVE-0-2014-7967)
Vulnerability from cvelistv5
Published
2014-10-08 10:00
Modified
2024-08-06 13:03
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-10-08T08:57:00",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2014-7967",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2014-7967",
    "datePublished": "2014-10-08T10:00:00",
    "dateReserved": "2014-10-08T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2632 (GCVE-0-2013-2632)
Vulnerability from cvelistv5
Published
2013-03-21 21:00
Modified
2024-09-17 00:11
Severity ?
Summary
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:44:32.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-21T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/browse/trunk/ChangeLog"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=194749",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=194749"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/03/dev-channel-update_18.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2632",
    "datePublished": "2013-03-21T21:00:00Z",
    "dateReserved": "2013-03-21T00:00:00Z",
    "dateUpdated": "2024-09-17T00:11:00.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-1242 (GCVE-0-2015-1242)
Vulnerability from cvelistv5
Published
2015-04-19 10:00
Modified
2024-08-06 04:33
Severity ?
Summary
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:33:20.662Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2015:0816",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
          },
          {
            "name": "USN-2570-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-2570-1"
          },
          {
            "name": "DSA-3238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3238"
          },
          {
            "name": "openSUSE-SU-2015:1887",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
          },
          {
            "name": "GLSA-201506-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201506-04"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1019033004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://codereview.chromium.org/1000893003"
          },
          {
            "name": "1032209",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032209"
          },
          {
            "name": "openSUSE-SU-2015:0748",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-30T16:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "RHSA-2015:0816",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
        },
        {
          "name": "USN-2570-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-2570-1"
        },
        {
          "name": "DSA-3238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3238"
        },
        {
          "name": "openSUSE-SU-2015:1887",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
        },
        {
          "name": "GLSA-201506-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201506-04"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1019033004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://codereview.chromium.org/1000893003"
        },
        {
          "name": "1032209",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032209"
        },
        {
          "name": "openSUSE-SU-2015:0748",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-1242",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2015:0816",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
            },
            {
              "name": "USN-2570-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-2570-1"
            },
            {
              "name": "DSA-3238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2015/dsa-3238"
            },
            {
              "name": "openSUSE-SU-2015:1887",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
            },
            {
              "name": "GLSA-201506-04",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201506-04"
            },
            {
              "name": "https://codereview.chromium.org/1019033004",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1019033004"
            },
            {
              "name": "https://codereview.chromium.org/1000893003",
              "refsource": "CONFIRM",
              "url": "https://codereview.chromium.org/1000893003"
            },
            {
              "name": "1032209",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032209"
            },
            {
              "name": "openSUSE-SU-2015:0748",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=460917",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=460917"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-1242",
    "datePublished": "2015-04-19T10:00:00",
    "dateReserved": "2015-01-21T00:00:00",
    "dateUpdated": "2024-08-06T04:33:20.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-6638 (GCVE-0-2013-6638)
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:46
Severity ?
Summary
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
References
http://secunia.com/advisories/56217third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.htmlvendor-advisory, x_refsource_SUSE
http://code.google.com/p/v8/source/detail?r=17800x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.htmlvendor-advisory, x_refsource_SUSE
http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.htmlmailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.htmlvendor-advisory, x_refsource_SUSE
http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2013/dsa-2811vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/56216third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1029442vdb-entry, x_refsource_SECTRACK
https://code.google.com/p/chromium/issues/detail?id=319722x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:22.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56217",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56217"
          },
          {
            "name": "openSUSE-SU-2013:1962",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/v8/source/detail?r=17800"
          },
          {
            "name": "openSUSE-SU-2014:0092",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
          },
          {
            "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
          },
          {
            "name": "openSUSE-SU-2013:1960",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
          },
          {
            "name": "openSUSE-SU-2014:0065",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
          },
          {
            "name": "openSUSE-SU-2013:1933",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
          },
          {
            "name": "DSA-2811",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2811"
          },
          {
            "name": "openSUSE-SU-2013:1927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
          },
          {
            "name": "56216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56216"
          },
          {
            "name": "1029442",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029442"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-04T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "56217",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56217"
        },
        {
          "name": "openSUSE-SU-2013:1962",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/v8/source/detail?r=17800"
        },
        {
          "name": "openSUSE-SU-2014:0092",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
        },
        {
          "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.mail-archive.com/v8-dev%40googlegroups.com/msg79646.html"
        },
        {
          "name": "openSUSE-SU-2013:1960",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
        },
        {
          "name": "openSUSE-SU-2014:0065",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
        },
        {
          "name": "openSUSE-SU-2013:1933",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
        },
        {
          "name": "DSA-2811",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2811"
        },
        {
          "name": "openSUSE-SU-2013:1927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
        },
        {
          "name": "56216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56216"
        },
        {
          "name": "1029442",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029442"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2013-6638",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56217",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56217"
            },
            {
              "name": "openSUSE-SU-2013:1962",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html"
            },
            {
              "name": "http://code.google.com/p/v8/source/detail?r=17800",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/v8/source/detail?r=17800"
            },
            {
              "name": "openSUSE-SU-2014:0092",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html"
            },
            {
              "name": "[v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)",
              "refsource": "MLIST",
              "url": "http://www.mail-archive.com/[email protected]/msg79646.html"
            },
            {
              "name": "openSUSE-SU-2013:1960",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html"
            },
            {
              "name": "openSUSE-SU-2014:0065",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html"
            },
            {
              "name": "openSUSE-SU-2013:1933",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html"
            },
            {
              "name": "DSA-2811",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2811"
            },
            {
              "name": "openSUSE-SU-2013:1927",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html"
            },
            {
              "name": "56216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56216"
            },
            {
              "name": "1029442",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029442"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=319722",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=319722"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6638",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-05T00:00:00",
    "dateUpdated": "2024-08-06T17:46:22.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-5120 (GCVE-0-2012-5120)
Vulnerability from cvelistv5
Published
2012-11-07 11:00
Modified
2024-08-06 20:58
Severity ?
Summary
Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:01.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "56413",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56413"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
          },
          {
            "name": "87085",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/87085"
          },
          {
            "name": "chrome-cve20125120-code-exec(79867)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "name": "56413",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56413"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
        },
        {
          "name": "87085",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/87085"
        },
        {
          "name": "chrome-cve20125120-code-exec(79867)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2012-5120",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "56413",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56413"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=150729",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=150729"
            },
            {
              "name": "87085",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/87085"
            },
            {
              "name": "chrome-cve20125120-code-exec(79867)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79867"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5120",
    "datePublished": "2012-11-07T11:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:01.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-8478 (GCVE-0-2015-8478)
Vulnerability from cvelistv5
Published
2015-12-06 01:00
Modified
2024-08-06 08:20
Severity ?
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:20:41.782Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
          },
          {
            "name": "USN-2825-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2825-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-05T20:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
        },
        {
          "name": "USN-2825-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2825-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2015-8478",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html"
            },
            {
              "name": "USN-2825-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2825-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2015-8478",
    "datePublished": "2015-12-06T01:00:00",
    "dateReserved": "2015-12-05T00:00:00",
    "dateUpdated": "2024-08-06T08:20:41.782Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

OSZAR »