Search for vulnerabilities
Vulnerability details: VCID-2sjp-scq9-8fcg
Vulnerability ID VCID-2sjp-scq9-8fcg
Aliases CVE-2018-6064
Summary Type Confusion in the implementation of __defineGetter__ in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Status Published
Exploitability 2.0
Weighted Severity 7.9
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6064.json
https://api.first.org/data/v1/epss?cve=CVE-2018-6064
https://crbug.com/798644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6117
https://www.exploit-db.com/exploits/44394/
https://www.zerodayinitiative.com/advisories/ZDI-19-368/
1552481 https://bugzilla.redhat.com/show_bug.cgi?id=1552481
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
CVE-2018-6064 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1498
CVE-2018-6064 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44394.js
CVE-2018-6064 https://nvd.nist.gov/vuln/detail/CVE-2018-6064
RHSA-2018:0484 https://access.redhat.com/errata/RHSA-2018:0484
Data source Exploit-DB
Date added April 3, 2018
Description Google Chrome V8 - 'ElementsAccessorBase::CollectValuesOrEntriesImpl' Type Confusion
Ransomware campaign use Known
Source publication date April 3, 2018
Exploit type dos
Platform multiple
Source update date April 3, 2018
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1498
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6064.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6064
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6064
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.95528
EPSS Score 0.2196
Published At Aug. 11, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:58:41.465851+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2018-6064 37.0.0