{"id":"UBUNTU-CVE-2014-7192","details":"Eval injection vulnerability in index.js in the syntax-error package before 1.1.1 for Node.js 0.10.x, as used in IBM Rational Application Developer and other products, allows remote attackers to execute arbitrary code via a crafted file.","modified":"2025-10-24T04:45:13Z","published":"2014-12-11T11:59:00Z","upstream":["CVE-2014-7192"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-7192"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-7192"}],"affected":[{"package":{"name":"libv8-3.14","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libv8-3.14@3.14.5.8-5ubuntu2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.14.5.8-5ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.14.5.8-5ubuntu2","binary_name":"libv8-3.14-dev"},{"binary_version":"3.14.5.8-5ubuntu2","binary_name":"libv8-3.14.5"},{"binary_version":"3.14.5.8-5ubuntu2","binary_name":"libv8-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7192.json"}},{"package":{"name":"libv8-3.14","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libv8-3.14@3.14.5.8-11ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.14.5.8-11ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.14.5.8-11ubuntu1","binary_name":"libv8-3.14-dev"},{"binary_version":"3.14.5.8-11ubuntu1","binary_name":"libv8-3.14.5"},{"binary_version":"3.14.5.8-11ubuntu1","binary_name":"libv8-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7192.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}