CVE-2009-2935
27.08.2009, 17:00
Google V8, as used in Google Chrome before 2.0.172.43, allows remote attackers to bypass intended restrictions on reading memory, and possibly obtain sensitive information or execute arbitrary code in the Chrome sandbox, via crafted JavaScript.Enginsight
Vendor | Product | Version |
---|---|---|
chrome | 𝑥 ≤ 2.0.172.37 | |
chrome | 0.2.149.27 | |
chrome | 0.2.149.29 | |
chrome | 0.2.149.30 | |
chrome | 0.2.152.1 | |
chrome | 0.2.153.1 | |
chrome | 0.3.154.0 | |
chrome | 0.3.154.3 | |
chrome | 0.4.154.18 | |
chrome | 0.4.154.22 | |
chrome | 0.4.154.31 | |
chrome | 0.4.154.33 | |
chrome | 1.0.154.36 | |
chrome | 1.0.154.39 | |
chrome | 1.0.154.42 | |
chrome | 1.0.154.43 | |
chrome | 1.0.154.46 | |
chrome | 1.0.154.48 | |
chrome | 1.0.154.52 | |
chrome | 1.0.154.53 | |
chrome | 1.0.154.59 | |
chrome | 2.0.156.1 | |
chrome | 2.0.157.0 | |
chrome | 2.0.157.2 | |
chrome | 2.0.158.0 | |
chrome | 2.0.159.0 | |
chrome | 2.0.172 | |
chrome | 2.0.172.30 | |
chrome | 2.0.172.31 | |
chrome | 2.0.172.33 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References