{"id":"CVE-2016-1677","details":"uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\"","modified":"2026-04-16T06:16:19.064095825Z","published":"2016-06-05T23:59:05.927Z","related":["openSUSE-SU-2024:10171-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90876"},{"type":"WEB","url":"https://codereview.chromium.org/1936083002"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035981"},{"type":"WEB","url":"https://crbug.com/602970"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3590"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2992-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1190"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201607-07"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/v8/v8","events":[{"introduced":"0"},{"last_affected":"167dc63b4c9a1d0f0fe1b19af93644ac9a561e83"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.281"}]}}],"versions":["3.21.18","3.26.30","3.28.33","3.28.34","3.28.36","3.28.37","3.28.39","3.28.40","3.28.41","3.28.42","3.28.44","3.28.46","3.28.47","3.28.49","3.28.55","3.28.56","3.28.58","3.28.61","3.28.63","3.28.66","3.28.67","3.28.68","3.28.70","3.28.72","3.29.1","3.29.12","3.29.13","3.29.15","3.29.18","3.29.19","3.29.2","3.29.21","3.29.22","3.29.26","3.29.28","3.29.3","3.29.30","3.29.31","3.29.32","3.29.33","3.29.34","3.29.36","3.29.37","3.29.39","3.29.4","3.29.42","3.29.44","3.29.45","3.29.46","3.29.47","3.29.48","3.29.49","3.29.5","3.29.51","3.29.52","3.29.54","3.29.55","3.29.56","3.29.58","3.29.6","3.29.60","3.29.61","3.29.62","3.29.63","3.29.65","3.29.67","3.29.68","3.29.69","3.29.7","3.29.71","3.29.72","3.29.73","3.29.76","3.29.77","3.29.79","3.29.8","3.29.80","3.29.85","3.29.86","5.1.281"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"50.0.2661.102"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1677.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}