First published: Wed Jul 31 2013(Updated: )
Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=28.0.1500.94 | |
Google Chrome | =28.0.1500.0 | |
Google Chrome | =28.0.1500.2 | |
Google Chrome | =28.0.1500.3 | |
Google Chrome | =28.0.1500.4 | |
Google Chrome | =28.0.1500.5 | |
Google Chrome | =28.0.1500.6 | |
Google Chrome | =28.0.1500.8 | |
Google Chrome | =28.0.1500.9 | |
Google Chrome | =28.0.1500.10 | |
Google Chrome | =28.0.1500.11 | |
Google Chrome | =28.0.1500.12 | |
Google Chrome | =28.0.1500.13 | |
Google Chrome | =28.0.1500.14 | |
Google Chrome | =28.0.1500.15 | |
Google Chrome | =28.0.1500.16 | |
Google Chrome | =28.0.1500.17 | |
Google Chrome | =28.0.1500.18 | |
Google Chrome | =28.0.1500.19 | |
Google Chrome | =28.0.1500.20 | |
Google Chrome | =28.0.1500.21 | |
Google Chrome | =28.0.1500.22 | |
Google Chrome | =28.0.1500.23 | |
Google Chrome | =28.0.1500.24 | |
Google Chrome | =28.0.1500.25 | |
Google Chrome | =28.0.1500.26 | |
Google Chrome | =28.0.1500.27 | |
Google Chrome | =28.0.1500.28 | |
Google Chrome | =28.0.1500.29 | |
Google Chrome | =28.0.1500.31 | |
Google Chrome | =28.0.1500.32 | |
Google Chrome | =28.0.1500.33 | |
Google Chrome | =28.0.1500.34 | |
Google Chrome | =28.0.1500.35 | |
Google Chrome | =28.0.1500.36 | |
Google Chrome | =28.0.1500.37 | |
Google Chrome | =28.0.1500.38 | |
Google Chrome | =28.0.1500.39 | |
Google Chrome | =28.0.1500.40 | |
Google Chrome | =28.0.1500.41 | |
Google Chrome | =28.0.1500.42 | |
Google Chrome | =28.0.1500.43 | |
Google Chrome | =28.0.1500.44 | |
Google Chrome | =28.0.1500.45 | |
Google Chrome | =28.0.1500.46 | |
Google Chrome | =28.0.1500.47 | |
Google Chrome | =28.0.1500.48 | |
Google Chrome | =28.0.1500.49 | |
Google Chrome | =28.0.1500.50 | |
Google Chrome | =28.0.1500.51 | |
Google Chrome | =28.0.1500.52 | |
Google Chrome | =28.0.1500.53 | |
Google Chrome | =28.0.1500.54 | |
Google Chrome | =28.0.1500.56 | |
Google Chrome | =28.0.1500.58 | |
Google Chrome | =28.0.1500.59 | |
Google Chrome | =28.0.1500.60 | |
Google Chrome | =28.0.1500.61 | |
Google Chrome | =28.0.1500.62 | |
Google Chrome | =28.0.1500.63 | |
Google Chrome | =28.0.1500.64 | |
Google Chrome | =28.0.1500.66 | |
Google Chrome | =28.0.1500.68 | |
Google Chrome | =28.0.1500.70 | |
Google Chrome | =28.0.1500.71 | |
Google Chrome | =28.0.1500.72 | |
Google Chrome | =28.0.1500.89 | |
Google Chrome | =28.0.1500.91 | |
Google Chrome | =28.0.1500.93 | |
Redhat Openstack | =3.0 | |
Debian Debian Linux | =7.0 | |
Nodejs Node.js | >=0.10.0<0.10.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.