Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-6663 (GCVE-0-2013-6663)
Vulnerability from cvelistv5 – Published: 2014-03-05 02:00 – Updated: 2024-08-06 17:46- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:46:22.303Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "65930",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65930"
},
{
"name": "DSA-2883",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT6441"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/kb/HT6537"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "61318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61318"
},
{
"name": "APPLE-SA-2014-09-17-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT6440"
},
{
"name": "61306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61306"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-01-04T17:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "65930",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65930"
},
{
"name": "DSA-2883",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT6441"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/kb/HT6537"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "61318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61318"
},
{
"name": "APPLE-SA-2014-09-17-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT6440"
},
{
"name": "61306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61306"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-6663",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "65930",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65930"
},
{
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "61318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61318"
},
{
"name": "APPLE-SA-2014-09-17-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name": "http://support.apple.com/kb/HT6440",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6440"
},
{
"name": "61306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61306"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=344492",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-6663",
"datePublished": "2014-03-05T02:00:00.000Z",
"dateReserved": "2013-11-05T00:00:00.000Z",
"dateUpdated": "2024-08-06T17:46:22.303Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2014-AVI-393
Vulnerability from certfr_avis - Published: 2014-09-18 - Updated: 2014-09-18
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | Safari | Apple Safari versions antérieures à 6.2 | ||
| Apple | N/A | Apple OS X Server versions antérieures à 3.2.1 | ||
| Apple | N/A | Apple iOS versions antérieures à 8 | ||
| Apple | N/A | Apple OS X Mavericks versions antérieures à 10.9.5 | ||
| Apple | N/A | Apple TV versions antérieures à 7 | ||
| Apple | N/A | Apple Xcode versions antérieures à 6.0.1 | ||
| Apple | Safari | Apple Safari versions antérieures à 7.1 | ||
| Apple | N/A | Apple OS X Server versions antérieures à 2.2.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Safari versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Server versions ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Mavericks versions ant\u00e9rieures \u00e0 10.9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple TV versions ant\u00e9rieures \u00e0 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Xcode versions ant\u00e9rieures \u00e0 6.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Safari versions ant\u00e9rieures \u00e0 7.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Server versions ant\u00e9rieures \u00e0 2.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-4396",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4396"
},
{
"name": "CVE-2014-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1389"
},
{
"name": "CVE-2014-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4424"
},
{
"name": "CVE-2014-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3479"
},
{
"name": "CVE-2014-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4394"
},
{
"name": "CVE-2014-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0238"
},
{
"name": "CVE-2014-1348",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1348"
},
{
"name": "CVE-2014-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4410"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2014-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0207"
},
{
"name": "CVE-2014-4369",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4369"
},
{
"name": "CVE-2014-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4378"
},
{
"name": "CVE-2014-4379",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4379"
},
{
"name": "CVE-2014-4375",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4375"
},
{
"name": "CVE-2014-4406",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4406"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2014-4377",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4377"
},
{
"name": "CVE-2014-4395",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4395"
},
{
"name": "CVE-2014-4418",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4418"
},
{
"name": "CVE-2014-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4399"
},
{
"name": "CVE-2014-4397",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4397"
},
{
"name": "CVE-2013-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6835"
},
{
"name": "CVE-2014-4366",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4366"
},
{
"name": "CVE-2014-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4422"
},
{
"name": "CVE-2014-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4367"
},
{
"name": "CVE-2014-4398",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4398"
},
{
"name": "CVE-2014-4380",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4380"
},
{
"name": "CVE-2014-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0185"
},
{
"name": "CVE-2014-4364",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4364"
},
{
"name": "CVE-2014-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4372"
},
{
"name": "CVE-2014-4362",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4362"
},
{
"name": "CVE-2014-0032",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0032"
},
{
"name": "CVE-2014-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4415"
},
{
"name": "CVE-2014-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4411"
},
{
"name": "CVE-2014-4350",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4350"
},
{
"name": "CVE-2014-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3515"
},
{
"name": "CVE-2014-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1385"
},
{
"name": "CVE-2014-4368",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4368"
},
{
"name": "CVE-2014-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0237"
},
{
"name": "CVE-2014-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4409"
},
{
"name": "CVE-2014-4403",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4403"
},
{
"name": "CVE-2014-4405",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4405"
},
{
"name": "CVE-2014-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4416"
},
{
"name": "CVE-2014-4401",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4401"
},
{
"name": "CVE-2014-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2525"
},
{
"name": "CVE-2014-4374",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4374"
},
{
"name": "CVE-2014-0221",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0221"
},
{
"name": "CVE-2014-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1388"
},
{
"name": "CVE-2014-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4421"
},
{
"name": "CVE-2014-1360",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1360"
},
{
"name": "CVE-2014-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0195"
},
{
"name": "CVE-2013-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6663"
},
{
"name": "CVE-2014-4413",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4413"
},
{
"name": "CVE-2014-4376",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4376"
},
{
"name": "CVE-2014-4356",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4356"
},
{
"name": "CVE-2014-4386",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4386"
},
{
"name": "CVE-2014-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1943"
},
{
"name": "CVE-2014-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4381"
},
{
"name": "CVE-2014-4404",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4404"
},
{
"name": "CVE-2014-4353",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4353"
},
{
"name": "CVE-2014-1384",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1384"
},
{
"name": "CVE-2014-4383",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4383"
},
{
"name": "CVE-2014-4390",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4390"
},
{
"name": "CVE-2014-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4423"
},
{
"name": "CVE-2014-4412",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4412"
},
{
"name": "CVE-2014-4419",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4419"
},
{
"name": "CVE-2014-4420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4420"
},
{
"name": "CVE-2014-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1387"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4384",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4384"
},
{
"name": "CVE-2014-4363",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4363"
},
{
"name": "CVE-2014-4400",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4400"
},
{
"name": "CVE-2014-1391",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1391"
},
{
"name": "CVE-2014-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4408"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2014-4407",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4407"
},
{
"name": "CVE-2014-3480",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3480"
},
{
"name": "CVE-2014-3478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3478"
},
{
"name": "CVE-2014-3470",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3470"
},
{
"name": "CVE-2014-3981",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3981"
},
{
"name": "CVE-2014-4361",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4361"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2013-7345",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7345"
},
{
"name": "CVE-2014-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4389"
},
{
"name": "CVE-2014-4357",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4357"
},
{
"name": "CVE-2013-5227",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5227"
},
{
"name": "CVE-2014-4979",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4979"
},
{
"name": "CVE-2014-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
},
{
"name": "CVE-2014-4371",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4371"
},
{
"name": "CVE-2014-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4402"
},
{
"name": "CVE-2014-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4373"
},
{
"name": "CVE-2014-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4393"
},
{
"name": "CVE-2014-2270",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2270"
},
{
"name": "CVE-2014-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4352"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-2014-4414",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4414"
},
{
"name": "CVE-2014-4354",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4354"
},
{
"name": "CVE-2014-4388",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4388"
},
{
"name": "CVE-2014-3487",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3487"
},
{
"name": "CVE-2014-4049",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4049"
},
{
"name": "CVE-2011-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2391"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
}
],
"initial_release_date": "2014-09-18T00:00:00",
"last_revision_date": "2014-09-18T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-393",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eApple\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6449 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6449"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6442 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6442"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6448 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6448"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6441 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6441"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6443 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6443"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6444 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6440 du 17 septembre 2014",
"url": "http://support.apple.com/kb/HT6440"
}
]
}
CERTFR-2014-AVI-100
Vulnerability from certfr_avis - Published: 2014-03-04 - Updated: 2014-03-04
De multiples vulnérabilités ont été corrigées dans Google Chrome. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Google Chrome 33.0.1750.146
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Google Chrome 33.0.1750.146\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-6668",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6668"
},
{
"name": "CVE-2013-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6663"
},
{
"name": "CVE-2013-6666",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6666"
},
{
"name": "CVE-2013-6667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6667"
},
{
"name": "CVE-2013-6665",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6665"
},
{
"name": "CVE-2013-6664",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6664"
}
],
"initial_release_date": "2014-03-04T00:00:00",
"last_revision_date": "2014-03-04T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-100",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-03-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Chrome\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 03 mars 2014",
"url": "http://googlechromereleases.blogspot.fr/2014/03/stable-channel-update.html"
}
]
}
GSD-2013-6663
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-6663",
"description": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.",
"id": "GSD-2013-6663",
"references": [
"https://www.suse.com/security/cve/CVE-2013-6663.html",
"https://www.debian.org/security/2014/dsa-2883",
"https://advisories.mageia.org/CVE-2013-6663.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-6663"
],
"details": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.",
"id": "GSD-2013-6663",
"modified": "2023-12-13T01:22:19.121442Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-6663",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "65930",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65930"
},
{
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "61318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61318"
},
{
"name": "APPLE-SA-2014-09-17-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name": "http://support.apple.com/kb/HT6440",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6440"
},
{
"name": "61306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61306"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=344492",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "33.0.1750.144",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-6663"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://code.google.com/p/chromium/issues/detail?id=344492",
"refsource": "CONFIRM",
"tags": [],
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision",
"refsource": "CONFIRM",
"tags": [],
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"name": "DSA-2883",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "APPLE-SA-2014-09-17-2",
"refsource": "APPLE",
"tags": [],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE",
"tags": [],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"name": "http://support.apple.com/kb/HT6440",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT6440"
},
{
"name": "https://support.apple.com/kb/HT6537",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.apple.com/kb/HT6537"
},
{
"name": "65930",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/65930"
},
{
"name": "http://support.apple.com/kb/HT6442",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT6442"
},
{
"name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT6441"
},
{
"name": "61318",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/61318"
},
{
"name": "61306",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/61306"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-01-07T02:59Z",
"publishedDate": "2014-03-05T05:11Z"
}
}
}
GHSA-PJCQ-P3FR-JPJ9
Vulnerability from github – Published: 2022-05-17 03:07 – Updated: 2022-05-17 03:07Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.
{
"affected": [],
"aliases": [
"CVE-2013-6663"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-03-05T05:11:00Z",
"severity": "HIGH"
},
"details": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.",
"id": "GHSA-pjcq-p3fr-jpj9",
"modified": "2022-05-17T03:07:10Z",
"published": "2022-05-17T03:07:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6663"
},
{
"type": "WEB",
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"type": "WEB",
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT6537"
},
{
"type": "WEB",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"type": "WEB",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61306"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61318"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT6440"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT6441"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT6442"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/65930"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2013-6663
Vulnerability from fkie_nvd - Published: 2014-03-05 05:11 - Updated: 2025-04-12 10:46| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| chrome | 33.0.1750.0 | ||
| chrome | 33.0.1750.1 | ||
| chrome | 33.0.1750.2 | ||
| chrome | 33.0.1750.3 | ||
| chrome | 33.0.1750.4 | ||
| chrome | 33.0.1750.5 | ||
| chrome | 33.0.1750.6 | ||
| chrome | 33.0.1750.7 | ||
| chrome | 33.0.1750.8 | ||
| chrome | 33.0.1750.9 | ||
| chrome | 33.0.1750.10 | ||
| chrome | 33.0.1750.11 | ||
| chrome | 33.0.1750.12 | ||
| chrome | 33.0.1750.13 | ||
| chrome | 33.0.1750.14 | ||
| chrome | 33.0.1750.15 | ||
| chrome | 33.0.1750.16 | ||
| chrome | 33.0.1750.18 | ||
| chrome | 33.0.1750.19 | ||
| chrome | 33.0.1750.20 | ||
| chrome | 33.0.1750.21 | ||
| chrome | 33.0.1750.22 | ||
| chrome | 33.0.1750.23 | ||
| chrome | 33.0.1750.24 | ||
| chrome | 33.0.1750.25 | ||
| chrome | 33.0.1750.26 | ||
| chrome | 33.0.1750.27 | ||
| chrome | 33.0.1750.28 | ||
| chrome | 33.0.1750.29 | ||
| chrome | 33.0.1750.30 | ||
| chrome | 33.0.1750.31 | ||
| chrome | 33.0.1750.34 | ||
| chrome | 33.0.1750.35 | ||
| chrome | 33.0.1750.36 | ||
| chrome | 33.0.1750.37 | ||
| chrome | 33.0.1750.38 | ||
| chrome | 33.0.1750.39 | ||
| chrome | 33.0.1750.40 | ||
| chrome | 33.0.1750.41 | ||
| chrome | 33.0.1750.42 | ||
| chrome | 33.0.1750.43 | ||
| chrome | 33.0.1750.44 | ||
| chrome | 33.0.1750.45 | ||
| chrome | 33.0.1750.46 | ||
| chrome | 33.0.1750.47 | ||
| chrome | 33.0.1750.48 | ||
| chrome | 33.0.1750.49 | ||
| chrome | 33.0.1750.50 | ||
| chrome | 33.0.1750.51 | ||
| chrome | 33.0.1750.52 | ||
| chrome | 33.0.1750.53 | ||
| chrome | 33.0.1750.54 | ||
| chrome | 33.0.1750.55 | ||
| chrome | 33.0.1750.56 | ||
| chrome | 33.0.1750.57 | ||
| chrome | 33.0.1750.58 | ||
| chrome | 33.0.1750.59 | ||
| chrome | 33.0.1750.60 | ||
| chrome | 33.0.1750.61 | ||
| chrome | 33.0.1750.62 | ||
| chrome | 33.0.1750.63 | ||
| chrome | 33.0.1750.64 | ||
| chrome | 33.0.1750.65 | ||
| chrome | 33.0.1750.66 | ||
| chrome | 33.0.1750.67 | ||
| chrome | 33.0.1750.68 | ||
| chrome | 33.0.1750.69 | ||
| chrome | 33.0.1750.70 | ||
| chrome | 33.0.1750.71 | ||
| chrome | 33.0.1750.73 | ||
| chrome | 33.0.1750.74 | ||
| chrome | 33.0.1750.75 | ||
| chrome | 33.0.1750.76 | ||
| chrome | 33.0.1750.77 | ||
| chrome | 33.0.1750.79 | ||
| chrome | 33.0.1750.80 | ||
| chrome | 33.0.1750.81 | ||
| chrome | 33.0.1750.82 | ||
| chrome | 33.0.1750.83 | ||
| chrome | 33.0.1750.85 | ||
| chrome | 33.0.1750.88 | ||
| chrome | 33.0.1750.89 | ||
| chrome | 33.0.1750.90 | ||
| chrome | 33.0.1750.91 | ||
| chrome | 33.0.1750.92 | ||
| chrome | 33.0.1750.93 | ||
| chrome | 33.0.1750.104 | ||
| chrome | 33.0.1750.106 | ||
| chrome | 33.0.1750.107 | ||
| chrome | 33.0.1750.108 | ||
| chrome | 33.0.1750.109 | ||
| chrome | 33.0.1750.110 | ||
| chrome | 33.0.1750.111 | ||
| chrome | 33.0.1750.112 | ||
| chrome | 33.0.1750.113 | ||
| chrome | 33.0.1750.115 | ||
| chrome | 33.0.1750.116 | ||
| chrome | 33.0.1750.117 | ||
| chrome | 33.0.1750.124 | ||
| chrome | 33.0.1750.125 | ||
| chrome | 33.0.1750.126 | ||
| chrome | 33.0.1750.132 | ||
| chrome | 33.0.1750.133 | ||
| chrome | 33.0.1750.135 | ||
| chrome | 33.0.1750.136 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44CEB321-9295-4743-A24E-A7521F07E717",
"versionEndIncluding": "33.0.1750.144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B702C2-083D-46B9-9B31-1D974FBE4190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4C6EAD-1414-4E1A-8535-31D7DE1B1A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
"matchCriteriaId": "16C5F36A-63B5-4DCB-93FC-BEFB31E12689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F425088C-CC28-41AC-9F14-4A4F6E63B865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF9A555-391F-4F39-A9B2-5C864015256B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AA76734E-6604-4CDD-9141-BF0BBE05F736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A513C8B2-4026-40BF-8770-6AB4550C2352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
"matchCriteriaId": "152F7E36-2716-43F4-B251-7195A3206952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
"matchCriteriaId": "157463C3-CB07-41BA-8527-C047E88013A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B5240466-55A1-4767-9BD1-122411EF8C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2E4B17-5832-4B49-9CA8-3F92B7AFAE0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
"matchCriteriaId": "01488955-E181-448B-BD5A-946A66D5493E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCBFC3C-63F7-4B9B-8D94-7334FB7F0EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A6C77B47-BD9F-40A9-8482-AA20CA0FA823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD2BF1C-CFF1-4310-B0B4-A26BFA68868A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0F327FEE-5500-4AA3-BEC6-0F625305F2FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8CE5AB-7722-4C50-AC11-948C117984C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1248F8-FF76-4186-89F3-CBE5696E5347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EEE80E-73EB-4C22-AE9E-045664FBBE22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CA2D67-43C1-4438-9C12-452DCC090A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
"matchCriteriaId": "AAAA310F-8E93-4FC2-8B79-C09F18B25BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
"matchCriteriaId": "96FAA317-56CC-42A1-9102-E2BEA4421D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
"matchCriteriaId": "30AC9E40-5362-4A3A-8EC3-5D99A24FAD38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
"matchCriteriaId": "E0C25460-6472-4DE3-BD7A-E47AC0ECB56C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
"matchCriteriaId": "95E2C59C-7399-4347-BC5D-3345A2940E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
"matchCriteriaId": "9C933326-6E6D-4DE6-9F95-42403901FF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6C47B0-BDAC-4C53-B1A7-E580CE7B8F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
"matchCriteriaId": "0D60B297-F755-4FFD-B7C3-E01A164DC0C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A8E793-A73E-4255-99E9-4D0BC6E4C0F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2B20DC1B-B8DD-4B52-BA2E-89BC5E993C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
"matchCriteriaId": "618FD568-E766-4A36-84B3-D07E92B69ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2AF349-B386-4DA3-8FFB-5ABC92D13FC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
"matchCriteriaId": "A0825DC0-2D08-4552-AA24-D823694DCEB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9086DA40-25B8-409C-8DC5-C501E8F79F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBD8A08-F330-42C9-9F48-03D1AFD7A10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1117D4-35D8-498C-A2FB-CF28E3CDB3A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF13799-F69A-4354-BC3D-737A5F36E3F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
"matchCriteriaId": "79D398C2-9EED-480C-B32B-705755CEB59B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
"matchCriteriaId": "62405FD2-8482-438B-9C4A-7CDAD2574E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD718C6-4FEA-487F-9E8C-4AB3A1838302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
"matchCriteriaId": "6445AD42-E14C-4E85-9A42-FD29F5BC30AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
"matchCriteriaId": "9E12FC87-01D1-464D-A311-CC4BB07712F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
"matchCriteriaId": "C4146B78-C168-4567-B6F8-926B337FBF25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA4EF23-D134-41F1-9649-4D41CB61E5B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
"matchCriteriaId": "A37F46D1-AFBD-4C99-8754-9A7425AD930B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
"matchCriteriaId": "48F5D234-E5A0-4597-8DE1-9444E654B14B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
"matchCriteriaId": "400E408D-80C3-4F5F-90A1-D021737CC56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9E3A9F-21D3-425B-8579-00760123F3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
"matchCriteriaId": "004F59DD-8048-43BC-8825-4D16AA3C2A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
"matchCriteriaId": "899F83C8-9E62-4F24-B700-6E8923E3CC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB3A7F9-CB39-465F-BDE6-BDA45BFA2C23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB08D2F-D16B-4EA0-8E93-B2CB029EC615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8AF8A1-D6C1-41C4-8700-0DE6AE36F580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
"matchCriteriaId": "01417CE6-D5BD-4F21-ACD7-4E043F185CD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
"matchCriteriaId": "740E7BA5-DB23-4446-AA77-A5D89C1D0D0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2FD596-144B-487A-B4D7-757B8C314250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
"matchCriteriaId": "4E86041C-5CB9-40A8-916E-45B55A555995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
"matchCriteriaId": "C92F9C20-B758-4B96-A828-6DE47E8A829C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
"matchCriteriaId": "89EBAC78-C8F5-4B92-9E59-725E32A5421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
"matchCriteriaId": "358FFC27-5E22-4CA1-82E7-9D4FA629FE88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
"matchCriteriaId": "910E8BF3-3C9E-41E0-81D1-597FE30C7315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
"matchCriteriaId": "D677EA9A-6660-4F50-A2B1-3E2F391920F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
"matchCriteriaId": "38F4B138-D297-4D13-86A5-35F906447E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
"matchCriteriaId": "1E46BE1B-F522-43F6-9333-702EFF2713D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
"matchCriteriaId": "B8666DC3-7638-4130-9F95-4408DD5F660A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
"matchCriteriaId": "E680816E-9641-4E14-8775-35458534E1D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
"matchCriteriaId": "ABFA742A-50C4-46A9-AAE7-29A642F637A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
"matchCriteriaId": "CC75D010-BC64-440E-A426-DA0117CE6407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
"matchCriteriaId": "03784488-72E5-4E32-B507-89571DE61697",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
"matchCriteriaId": "4C33E433-14E7-469D-B02F-A3D7DB8C77C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
"matchCriteriaId": "239D5A00-B33C-4AA1-96F1-AF960928394C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
"matchCriteriaId": "D60D8B55-EECB-48D3-BE09-B1964A0D3170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
"matchCriteriaId": "4C75D512-48AF-4D74-8644-7EF100D96F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
"matchCriteriaId": "66E3400D-8A75-45E9-AFDC-366AC0C86323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
"matchCriteriaId": "BF597FC6-FF2F-44C5-9C9C-9E0C4437C66D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B32192-D874-41C8-B1B9-5C99B12D93B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
"matchCriteriaId": "57019F85-3B0C-40C5-AEFF-ECE1FFB87DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
"matchCriteriaId": "B83518FA-7E1C-41A1-BFB1-90CC1955339B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
"matchCriteriaId": "342112D8-CAEF-42FF-8A1D-71391CBD7FB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
"matchCriteriaId": "8B07E8DC-420B-4A8C-B19B-135AEF38B96A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
"matchCriteriaId": "8840A482-3305-43DE-812A-72CE1124C718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
"matchCriteriaId": "CC532185-B2B9-46C3-9626-FB8C67C8DFB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC0ED28-201A-4E21-8864-AC85F3E53F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
"matchCriteriaId": "61260ECB-4DA8-4313-9077-6F87592EC45A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
"matchCriteriaId": "6E03ADCE-5009-4364-9308-18956EE2172F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9BB86D-B853-4FB6-8CE9-7D30E04E47C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
"matchCriteriaId": "E9EEF2AC-83CE-40AD-820E-CAA669A848F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
"matchCriteriaId": "8479F4C0-1097-4BBB-855E-FBDFD3065482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
"matchCriteriaId": "82A5CAA6-89B4-4C53-BDCC-FA0248262836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF184C5-9AA7-4C6A-B9E1-208297A21A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
"matchCriteriaId": "E95FF3AE-1EEC-471F-8927-6C12FA766EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
"matchCriteriaId": "5A154FBB-A21F-4496-BB35-18845095A657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
"matchCriteriaId": "4256B074-FC64-481E-9AA6-19D0A3E469FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4CB1AD-C8D7-41EE-BC3A-E66C325F2F26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B7E15-A59D-4C01-89EB-13F4639A4BEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
"matchCriteriaId": "3A573C2D-81F8-4D2E-8605-F3727FA7C121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7B0968-7187-480D-AC6D-82E55F4A7579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
"matchCriteriaId": "46206063-DE0B-4FEC-BEE4-015D548B18D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2057E6-EA25-4EA6-A825-8530F51F6B59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D115D222-0920-4068-A69E-B6039EECD3FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
"matchCriteriaId": "51692796-586F-48F8-93F2-9588EC5A7880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC3FF10-A864-4C78-BF43-A80A0AF587D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0F12D-88BB-4FF3-8E0A-6E6CD5069C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
"matchCriteriaId": "5242BD85-6950-427B-B6C6-EBF17D65EE72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
"matchCriteriaId": "5513404A-2257-4C46-AE2A-B7EB57243BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view."
},
{
"lang": "es",
"value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en la funci\u00f3n SVGImage::setContainerSize en core/svg/graphics/SVGImage.cpp en la implementaci\u00f3n SVG en Blink, utilizado en Google Chrome anterior a 33.0.1750.146, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores relacionados con la redimensi\u00f3n de una vista."
}
],
"id": "CVE-2013-6663",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-03-05T05:11:22.187",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/61306"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/61318"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT6440"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT6441"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT6442"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/65930"
},
{
"source": "cve@mitre.org",
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"source": "cve@mitre.org",
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
},
{
"source": "cve@mitre.org",
"url": "https://support.apple.com/kb/HT6537"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/61306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/61318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT6440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT6441"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT6442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/65930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://code.google.com/p/chromium/issues/detail?id=344492"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://src.chromium.org/viewvc/blink?revision=168152\u0026view=revision"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/kb/HT6537"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.