Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://code.google.com/p/v8/source/detail?r=20595", "name": "https://code.google.com/p/v8/source/detail?r=20595", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://code.google.com/p/v8/source/detail?r=20377", "name": "https://code.google.com/p/v8/source/detail?r=20377", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://code.google.com/p/v8/source/detail?r=20388", "name": "https://code.google.com/p/v8/source/detail?r=20388", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://code.google.com/p/chromium/issues/detail?id=354967", "name": "https://code.google.com/p/chromium/issues/detail?id=354967", "tags": ["Permissions Required"], "refsource": "CONFIRM"}, {"url": "https://code.google.com/p/v8/source/detail?r=20593", "name": "https://code.google.com/p/v8/source/detail?r=20593", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://code.google.com/p/v8/source/detail?r=20375", "name": "https://code.google.com/p/v8/source/detail?r=20375", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html", "name": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html", "tags": ["Broken Link", "Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/58301", "name": "58301", "tags": ["Broken Link", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2014/dsa-2920", "name": "DSA-2920", "tags": ["Third Party Advisory"], "refsource": "DEBIAN"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html", "name": "openSUSE-SU-2014:0669", "tags": ["Broken Link"], "refsource": "SUSE"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html", "name": "openSUSE-SU-2014:0668", "tags": ["Broken Link"], "refsource": "SUSE"}, {"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml", "name": "GLSA-201408-16", "tags": ["Third Party Advisory"], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/60372", "name": "60372", "tags": ["Broken Link"], "refsource": "SECUNIA"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote attackers to bypass intended access restrictions by leveraging \"type confusion\" and reading property values, related to i18n.js and runtime.cc."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-843"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2014-1730", "ASSIGNER": "security@google.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 6.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2014-04-26T10:55Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "34.0.1847.131"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}, {"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "34.0.1847.132"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-11-10T17:58Z"}