- Description
- Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- Source
- chrome-cve-admin@google.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Google Chromium V8 Out-of-Bounds Memory Access Vulnerability
- Exploit added on
- Jan 17, 2024
- Exploit action due
- Feb 7, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
CVE Cold Case. Isn't it crazy that even after a year we basically know nothing about the V8 ITW CVE-2024-0519. How is the property fast deletion path useful? Some minor notes about it here: https://t.co/k3nT5qpflO
@mistymntncop
14 Jan 2025
4286 Impressions
14 Retweets
59 Likes
26 Bookmarks
3 Replies
0 Quotes
🚨 Attention Chrome Users! 🚨 Critical zero-day vulnerabilities (CVE-2024-0519, CVE-2024-5274) exploited in attacks! 😱 These can lead to code execution and data theft. 📥 Update Chrome to v125.0.6422.112+ immediately! Stay safe and secure. 🛡️ #CyberSafety #ChromeUpdate 🔗… ht
@innoworkspro
22 Nov 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-0519 is the vuln that got away. The swiftness of its patch has thwarted attempts to reverse it so far. We know we can create a inconsistency between the objs map (UnusedPropertyFields=0) and property array. But it doesn't seem useful...
@mistymntncop
15 Nov 2024
1056 Impressions
0 Retweets
7 Likes
5 Bookmarks
2 Replies
0 Quotes
Actively exploited CVE : CVE-2024-0519
@transilienceai
25 Oct 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F1333551-8202-4042-AD12-C0767B189306",
"versionEndExcluding": "120.0.6099.224"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6EF8247D-D1FA-4C35-88A3-0F0AF4F7DA15",
"versionEndExcluding": "7.2.5"
}
],
"operator": "OR"
}
]
}
]