Google V8, as used in Google Chrome before 2.0.172.43, allows remote attackers to bypass intended restrictions on reading memory, and possibly obtain sensitive information or execute arbitrary code in the Chrome sandbox, via crafted JavaScript.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/chromium/issues/detail?id=18639 - Vendor Advisory | |
References | () http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html - Vendor Advisory | |
References | () http://osvdb.org/57421 - | |
References | () http://secunia.com/advisories/36417 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/36149 - | |
References | () http://www.securitytracker.com/id?1022773 - | |
References | () http://www.vupen.com/english/advisories/2009/2420 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52902 - |
Information
Published : 2009-08-27 17:00
Updated : 2024-11-21 01:06
NVD link : CVE-2009-2935
Mitre link : CVE-2009-2935
CVE.ORG link : CVE-2009-2935
JSON object : View
Products Affected
- chrome
CWE
CWE-264
Permissions, Privileges, and Access Controls