fkie_cve-2013-6650
Vulnerability from fkie_nvd
Published
2014-01-28 14:30
Modified
2025-04-11 00:51
Severity ?
Summary
The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| debian | debian_linux | 7.0 | |
| debian | debian_linux | 8.0 | |
| chrome | * | ||
| chrome | 32.0.1700.0 | ||
| chrome | 32.0.1700.2 | ||
| chrome | 32.0.1700.3 | ||
| chrome | 32.0.1700.4 | ||
| chrome | 32.0.1700.5 | ||
| chrome | 32.0.1700.6 | ||
| chrome | 32.0.1700.7 | ||
| chrome | 32.0.1700.8 | ||
| chrome | 32.0.1700.9 | ||
| chrome | 32.0.1700.10 | ||
| chrome | 32.0.1700.11 | ||
| chrome | 32.0.1700.12 | ||
| chrome | 32.0.1700.13 | ||
| chrome | 32.0.1700.14 | ||
| chrome | 32.0.1700.15 | ||
| chrome | 32.0.1700.16 | ||
| chrome | 32.0.1700.17 | ||
| chrome | 32.0.1700.18 | ||
| chrome | 32.0.1700.19 | ||
| chrome | 32.0.1700.21 | ||
| chrome | 32.0.1700.22 | ||
| chrome | 32.0.1700.23 | ||
| chrome | 32.0.1700.24 | ||
| chrome | 32.0.1700.26 | ||
| chrome | 32.0.1700.27 | ||
| chrome | 32.0.1700.28 | ||
| chrome | 32.0.1700.29 | ||
| chrome | 32.0.1700.30 | ||
| chrome | 32.0.1700.31 | ||
| chrome | 32.0.1700.32 | ||
| chrome | 32.0.1700.33 | ||
| chrome | 32.0.1700.34 | ||
| chrome | 32.0.1700.35 | ||
| chrome | 32.0.1700.38 | ||
| chrome | 32.0.1700.39 | ||
| chrome | 32.0.1700.41 | ||
| chrome | 32.0.1700.50 | ||
| chrome | 32.0.1700.51 | ||
| chrome | 32.0.1700.52 | ||
| chrome | 32.0.1700.53 | ||
| chrome | 32.0.1700.54 | ||
| chrome | 32.0.1700.55 | ||
| chrome | 32.0.1700.56 | ||
| chrome | 32.0.1700.57 | ||
| chrome | 32.0.1700.58 | ||
| chrome | 32.0.1700.59 | ||
| chrome | 32.0.1700.62 | ||
| chrome | 32.0.1700.63 | ||
| chrome | 32.0.1700.64 | ||
| chrome | 32.0.1700.65 | ||
| chrome | 32.0.1700.66 | ||
| chrome | 32.0.1700.67 | ||
| chrome | 32.0.1700.68 | ||
| chrome | 32.0.1700.69 | ||
| chrome | 32.0.1700.70 | ||
| chrome | 32.0.1700.71 | ||
| chrome | 32.0.1700.72 | ||
| chrome | 32.0.1700.74 | ||
| chrome | 32.0.1700.75 | ||
| chrome | 32.0.1700.76 | ||
| chrome | 32.0.1700.77 | ||
| chrome | 32.0.1700.94 | ||
| chrome | 32.0.1700.95 | ||
| chrome | 32.0.1700.96 | ||
| chrome | 32.0.1700.97 | ||
| chrome | 32.0.1700.98 | ||
| chrome | 32.0.1700.99 | ||
| chrome | 32.0.1700.100 | ||
| opensuse | opensuse | 12.3 | |
| opensuse | opensuse | 13.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C09FC000-DD26-480F-B2B8-6C6F7C9D169D",
"versionEndIncluding": "32.0.1700.101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD924DBF-E249-438D-BA2F-3C0BACD414C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2933E363-BBA2-4997-B9AA-CDEA26C03EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.3:*:*:*:*:*:*:*",
"matchCriteriaId": "95EBFD73-F2E0-471F-A523-0EEC46838248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.4:*:*:*:*:*:*:*",
"matchCriteriaId": "90C6D8E5-7DA6-4903-AF1B-58DC2EDE38F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E51C592D-A265-4B31-A819-E4C4F641F369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4D8BFF-466D-4CC5-BE6D-1E8BB13152CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6F37F40B-E221-4004-AE4C-7278F4790E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B32A24-627C-43B3-B449-4889D07E33A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEBE1C4-591F-4964-A8E4-B568F15B9A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE2DEA2-C061-4656-9B0F-DB929256C277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F50887B9-7FF7-40A2-BAC5-62B6FF9CEB92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.12:*:*:*:*:*:*:*",
"matchCriteriaId": "75BE8557-F16D-46B9-8B62-7F8D52AEA11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDC0D0A-7FF3-4B36-82D5-85589E81C9EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.14:*:*:*:*:*:*:*",
"matchCriteriaId": "43E026DE-9409-47F1-A025-A27B3A9B7C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.15:*:*:*:*:*:*:*",
"matchCriteriaId": "07AF7FAC-1199-4C54-827F-3D393BBDC378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.16:*:*:*:*:*:*:*",
"matchCriteriaId": "80024D3E-1CDC-400B-A472-7C80607E8E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.17:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECF96A3-6D1E-4EF5-8C15-3B56CBD66E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.18:*:*:*:*:*:*:*",
"matchCriteriaId": "84D88DB7-F6DF-43BA-8259-FEB9EE68AB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C65F6423-4B98-468D-AE3F-371B557BBCBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.21:*:*:*:*:*:*:*",
"matchCriteriaId": "862CB0B0-BD74-4DF0-A01C-CAAB376A3DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F61BAD72-0D19-4065-A209-E8F608EE3393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.23:*:*:*:*:*:*:*",
"matchCriteriaId": "39555F26-B98C-4116-B58C-ABD3FFA8D3FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.24:*:*:*:*:*:*:*",
"matchCriteriaId": "19493290-8C67-4BBC-85EF-31941711443E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.26:*:*:*:*:*:*:*",
"matchCriteriaId": "485F2654-C86B-4270-9B0D-878B23E4A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.27:*:*:*:*:*:*:*",
"matchCriteriaId": "FF42F96A-120A-4637-8AD3-9CCFD8A185FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.28:*:*:*:*:*:*:*",
"matchCriteriaId": "1E513EEE-4CC1-470F-A729-1F949720F6AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2B135F7E-E68B-4FDB-96B9-45E920A9FAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.30:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3EFD4E-DE0C-4043-B607-3120A728AAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BF7547FA-E82F-4E9E-AF6C-5A334A7CEAB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1DDC7C-DFA6-4CF6-89E9-FDA0CD9F13D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.33:*:*:*:*:*:*:*",
"matchCriteriaId": "17DFD87F-5F8A-4D61-80AA-B3915378989D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.34:*:*:*:*:*:*:*",
"matchCriteriaId": "779ADDB1-A249-4044-8879-C242E5169308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.35:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3E8EAB-8EBC-475A-BF2A-F26803ECA550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.38:*:*:*:*:*:*:*",
"matchCriteriaId": "E70483EC-39D3-4195-9CDA-E51493A62C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.39:*:*:*:*:*:*:*",
"matchCriteriaId": "37FE96DD-3B47-4700-9CF1-9F4E8808464C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.41:*:*:*:*:*:*:*",
"matchCriteriaId": "F24F0E17-97FB-4817-A435-1F4DFD2405FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.50:*:*:*:*:*:*:*",
"matchCriteriaId": "3042C392-8F37-48A8-9AA2-BD7B54C34681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.51:*:*:*:*:*:*:*",
"matchCriteriaId": "69A55CC7-C7EB-4920-A352-DEBBFE0C4DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.52:*:*:*:*:*:*:*",
"matchCriteriaId": "8816D214-468E-45B3-B9E0-4C7C47D0CF9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.53:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E56356-B560-4608-B9A8-19621F1FC243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.54:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC53165-76C8-4F29-A22E-98102159835C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.55:*:*:*:*:*:*:*",
"matchCriteriaId": "73D7800D-0E74-4726-887E-80C8A08EF88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.56:*:*:*:*:*:*:*",
"matchCriteriaId": "260AD062-8509-4822-B5E8-FF126148CD9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.57:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC9BFF7-28AE-4D05-8405-0CD6A4CF199A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.58:*:*:*:*:*:*:*",
"matchCriteriaId": "FA54E045-6D92-479F-B8BB-D578C987EDFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.59:*:*:*:*:*:*:*",
"matchCriteriaId": "38088242-60F9-4A19-9FE7-E63A7A70A6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.62:*:*:*:*:*:*:*",
"matchCriteriaId": "978BFA68-736E-45C8-AD6B-93C20187DDCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.63:*:*:*:*:*:*:*",
"matchCriteriaId": "51641C25-6D29-46A2-BEA4-92FA63800B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.64:*:*:*:*:*:*:*",
"matchCriteriaId": "8080D81C-456B-4912-B023-F40CD63C1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.65:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8B2DEA-4324-4B96-9138-5BD835713191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.66:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCC1343-D62F-44C1-8A1B-6A449424F9B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.67:*:*:*:*:*:*:*",
"matchCriteriaId": "B0673B28-DEB0-4DB8-95B9-4342CB30E8C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.68:*:*:*:*:*:*:*",
"matchCriteriaId": "16884FC4-C67D-4F30-8207-D4E464676248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.69:*:*:*:*:*:*:*",
"matchCriteriaId": "EA14BCBC-7F1C-449F-80FA-0E5F6CFB66CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.70:*:*:*:*:*:*:*",
"matchCriteriaId": "47140ACB-D48B-41EB-BBE7-09226FE85C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.71:*:*:*:*:*:*:*",
"matchCriteriaId": "BD9942E5-BCC5-49FA-BD6C-A8E6DED252DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.72:*:*:*:*:*:*:*",
"matchCriteriaId": "1187F67E-A665-48C8-A2CC-83A7E7A593BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.74:*:*:*:*:*:*:*",
"matchCriteriaId": "6CCBDEF8-5EBA-413A-994E-820A84A4C9CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.75:*:*:*:*:*:*:*",
"matchCriteriaId": "46DF9112-2DA6-4BA0-83CD-54623A5EC640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.76:*:*:*:*:*:*:*",
"matchCriteriaId": "11B6273A-746F-48D7-A59D-6CE87BF9BBF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.77:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF6A0B0-C052-4345-AE73-9C5B63F50354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.94:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD10821-8B98-466D-98F6-4942DF59416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.95:*:*:*:*:*:*:*",
"matchCriteriaId": "D932062A-8336-4349-AFE4-7D277E020BEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.96:*:*:*:*:*:*:*",
"matchCriteriaId": "7922F9B2-C15B-441B-BC9C-4591652BE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.97:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B42A0-73B3-4EF8-9C56-6A820EF2CB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.98:*:*:*:*:*:*:*",
"matchCriteriaId": "B3EF1D80-D086-4308-B229-D146A88B5D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.99:*:*:*:*:*:*:*",
"matchCriteriaId": "8C159F4D-E92D-4879-9A6B-56CFB68C683C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:32.0.1700.100:*:*:*:*:*:*:*",
"matchCriteriaId": "4CA241EB-7213-4815-A46E-866F4568C8DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of \"popular pages.\""
},
{
"lang": "es",
"value": "La funci\u00f3n StoreBuffer::ExemptPopularPages en store-buffer.cc de Google V8 anterior a la versi\u00f3n 3.22.24.16, tal y como se usa en Google Chrome anterior a la versi\u00f3n 32.0.1700.102, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores que desencadenen un manejo incorrecto de \"p\u00e1ginas populares.\""
}
],
"id": "CVE-2013-6650",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-01-28T14:30:39.497",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://crbug.com/331444"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2862"
},
{
"source": "cve@mitre.org",
"url": "https://code.google.com/p/v8/source/detail?r=18483"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://crbug.com/331444"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://code.google.com/p/v8/source/detail?r=18483"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…