296,574
Total vulnerabilities in the database
Google V8, as used in Google Chrome before 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.
Software | From | Fixed in |
---|---|---|
google / chrome | - | 14.0.835.163 |