8.2 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.086 Low
EPSS
Percentile
94.3%
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
CPE | Name | Operator | Version |
---|---|---|---|
chrome | le | 2.0.172.33 | |
chrome | eq | 0.2.149.29 | |
chrome | eq | 0.2.149.30 | |
chrome | eq | 0.2.152.1 | |
chrome | eq | 0.2.153.1 | |
chrome | eq | 0.3.154.0 | |
chrome | eq | 0.3.154.3 | |
chrome | eq | 0.4.154.18 | |
chrome | eq | 0.4.154.22 | |
chrome | eq | 0.4.154.31 |
secunia.com/advisories/35844
www.osvdb.org/55939
www.securityfocus.com/bid/35722
www.vupen.com/english/advisories/2009/1924
code.google.com/p/chromium/issues/detail?id=14719
codereview.chromium.org/141042
codereview.chromium.org/141042/diff/6/1004
exchange.xforce.ibmcloud.com/vulnerabilities/51801
googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html