9.3
CVSSv2

CVE-2017-15399

Published: 28/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A use after free in V8 in Google Chrome before 62.0.3202.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

Vendor Advisories

Synopsis Critical: chromium-browser security update Type/Severity Security Advisory: Critical Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
A use after free in V8 in Google Chrome prior to 620320289 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page ...
A use-after-free has been found in the V8 component of the Chromium browser before 620320289 ...

Github Repositories

V8_November_2017 Some V8 vuls which they were fixed in about November 2017 CVE-2017-5070 bugschromiumorg/p/chromium/issues/detail?id=722756 Chrome version: 5803029110 Channel: stable This problem belongs to the crankshaft,in the latest V8 version(16th May 2017)(use crankshaft to JIT),I can reproduce this issueAt this version,the chrome use crankshaft to JIT CVE-