Heap-based buffer overflow in src/jsregexp.cc in Google V8 prior to 1.1.10.14, as used in Google Chrome prior to 2.0.172.37, allows remote malicious users to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google v8 |
||
google chrome |
||
google chrome 0.2.149.29 |
||
google chrome 0.2.149.30 |
||
google chrome 0.2.152.1 |
||
google chrome 0.2.153.1 |
||
google chrome 0.3.154.0 |
||
google chrome 0.3.154.3 |
||
google chrome 0.4.154.18 |
||
google chrome 0.4.154.22 |
||
google chrome 0.4.154.31 |
||
google chrome 0.4.154.33 |
||
google chrome 1.0.154.36 |
||
google chrome 1.0.154.39 |
||
google chrome 1.0.154.42 |
||
google chrome 1.0.154.43 |
||
google chrome 1.0.154.46 |
||
google chrome 1.0.154.48 |
||
google chrome 1.0.154.52 |
||
google chrome 1.0.154.53 |
||
google chrome 1.0.154.59 |
||
google chrome 2.0.156.1 |
||
google chrome 2.0.157.0 |
||
google chrome 2.0.157.2 |
||
google chrome 2.0.158.0 |
||
google chrome 2.0.159.0 |
||
google chrome 2.0.172 |
||
google chrome 2.0.172.30 |
||
google chrome 2.0.172.31 |