[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-2298-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":82,"duplicates":83,"related":84,"reserved_at":9,"published_at":102,"modified_at":103,"state":9,"summary":104,"references_raw":106,"kevs":186,"epss":9,"epss_history":187,"metrics":188,"affected":189},"USN-2298-1","oxide-qt vulnerabilities\n\nA type confusion bug was discovered in V8. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2014-1730)\n\nA type confusion bug was discovered in Blink. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2014-1731)\n\nMultiple security issues including memory safety bugs were discovered in\nChromium. If a user were tricked in to opening a specially crafted website,\nan attacker could potentially exploit these to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking the program. (CVE-2014-1735, CVE-2014-3162)\n\nMultiple use-after-free issues were discovered in the WebSockets\nimplementation. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial of\nservice via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2014-1740)\n\nMultiple integer overflows were discovered in CharacterData\nimplementation. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit these to cause a denial of\nservice via renderer crash or execute arbitrary code with the privileges\nof the sandboxed render process. (CVE-2014-1741)\n\nMultiple use-after-free issues were discovered in Blink. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via renderer crash\nor execute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2014-1742, CVE-2014-1743)\n\nAn integer overflow bug was discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash or execute arbitrary code with the privileges of the user invoking\nthe program. (CVE-2014-1744)\n\nAn out-of-bounds read was discovered in Chromium. If a user were tricked\nin to opening a specially crafter website, an attacker could potentially\nexploit this to cause a denial of service via application crash.\n(CVE-2014-1746)\n\nIt was discovered that Blink allowed scrollbar painting to extend in to\nthe parent frame in some circumstances. An attacker could potentially\nexploit this to conduct clickjacking attacks via UI redress.\n(CVE-2014-1748)\n\nAn integer underflow was discovered in Blink. If a user were tricked in to\nopening a specially crafter website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2014-3152)\n\nA use-after-free was discovered in Chromium. If a use were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash or execute arbitrary\ncode with the privileges of the sandboxed render process.\n(CVE-2014-3154)\n\nA security issue was discovered in the SPDY implementation. An attacker\ncould potentially exploit this to cause a denial of service via\napplication crash or execute arbitrary code with the privileges of the\nuser invoking the program. (CVE-2014-3155)\n\nA heap overflow was discovered in Chromium. If a use were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2014-3157)\n\nIt was discovered that Blink did not enforce security rules for\nsubresource loading in SVG images. If a user opened a site that embedded a\nspecially crafted image, an attacker could exploit this to log page views.\n(CVE-2014-3160)\n\nIt was discovered that the SpeechInput feature in Blink could be activated\nwithout consent or any visible indication. If a user were tricked in to\nopening a specially crafted website, an attacker could exploit this to\neavesdrop on the user. (CVE-2014-3803)\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68,70,72,74,76,78,80],{"_key":15},"CVE-2014-1730",{"_key":17},"CVE-2014-1731",{"_key":19},"CVE-2014-1735",{"_key":21},"CVE-2014-1740",{"_key":23},"CVE-2014-1741",{"_key":25},"CVE-2014-1742",{"_key":27},"CVE-2014-1743",{"_key":29},"CVE-2014-1744",{"_key":31},"CVE-2014-1746",{"_key":33},"CVE-2014-1748",{"_key":35},"CVE-2014-3152",{"_key":37},"CVE-2014-3154",{"_key":39},"CVE-2014-3155",{"_key":41},"CVE-2014-3157",{"_key":43},"CVE-2014-3160",{"_key":45},"CVE-2014-3162",{"_key":47},"CVE-2014-3803",{"_key":49},"UBUNTU-CVE-2014-1730",{"_key":51},"UBUNTU-CVE-2014-1731",{"_key":53},"UBUNTU-CVE-2014-1735",{"_key":55},"UBUNTU-CVE-2014-1740",{"_key":57},"UBUNTU-CVE-2014-1741",{"_key":59},"UBUNTU-CVE-2014-1742",{"_key":61},"UBUNTU-CVE-2014-1743",{"_key":63},"UBUNTU-CVE-2014-1744",{"_key":65},"UBUNTU-CVE-2014-1746",{"_key":67},"UBUNTU-CVE-2014-1748",{"_key":69},"UBUNTU-CVE-2014-3152",{"_key":71},"UBUNTU-CVE-2014-3154",{"_key":73},"UBUNTU-CVE-2014-3155",{"_key":75},"UBUNTU-CVE-2014-3157",{"_key":77},"UBUNTU-CVE-2014-3160",{"_key":79},"UBUNTU-CVE-2014-3162",{"_key":81},"UBUNTU-CVE-2014-3803",[],[],[85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101],{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},{"_key":63},{"_key":65},{"_key":67},{"_key":69},{"_key":71},{"_key":73},{"_key":75},{"_key":77},{"_key":79},{"_key":81},"2014-07-23T20:11:47.242599Z","2026-02-04T02:53:13.910877Z",{"cisa_kev":105,"cisa_ransomware":105,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[107,113,118,122,126,130,134,138,142,146,150,154,158,162,166,170,174,178,182],{"url":108,"sources":109,"tags":111},"https://ubuntu.com/security/notices/USN-2298-1",[110],"osv_ubuntu",[112],"Advisory",{"url":114,"sources":115,"tags":116},"https://ubuntu.com/security/CVE-2014-1730",[110],[117],"REPORT",{"url":119,"sources":120,"tags":121},"https://ubuntu.com/security/CVE-2014-1731",[110],[117],{"url":123,"sources":124,"tags":125},"https://ubuntu.com/security/CVE-2014-1735",[110],[117],{"url":127,"sources":128,"tags":129},"https://ubuntu.com/security/CVE-2014-1740",[110],[117],{"url":131,"sources":132,"tags":133},"https://ubuntu.com/security/CVE-2014-1741",[110],[117],{"url":135,"sources":136,"tags":137},"https://ubuntu.com/security/CVE-2014-1742",[110],[117],{"url":139,"sources":140,"tags":141},"https://ubuntu.com/security/CVE-2014-1743",[110],[117],{"url":143,"sources":144,"tags":145},"https://ubuntu.com/security/CVE-2014-1744",[110],[117],{"url":147,"sources":148,"tags":149},"https://ubuntu.com/security/CVE-2014-1746",[110],[117],{"url":151,"sources":152,"tags":153},"https://ubuntu.com/security/CVE-2014-1748",[110],[117],{"url":155,"sources":156,"tags":157},"https://ubuntu.com/security/CVE-2014-3152",[110],[117],{"url":159,"sources":160,"tags":161},"https://ubuntu.com/security/CVE-2014-3154",[110],[117],{"url":163,"sources":164,"tags":165},"https://ubuntu.com/security/CVE-2014-3155",[110],[117],{"url":167,"sources":168,"tags":169},"https://ubuntu.com/security/CVE-2014-3157",[110],[117],{"url":171,"sources":172,"tags":173},"https://ubuntu.com/security/CVE-2014-3160",[110],[117],{"url":175,"sources":176,"tags":177},"https://ubuntu.com/security/CVE-2014-3162",[110],[117],{"url":179,"sources":180,"tags":181},"https://ubuntu.com/security/CVE-2014-3803",[110],[117],{"url":183,"sources":184,"tags":185},"https://launchpad.net/bugs/1337301",[110],[117],[],[],[],[190],{"ecosystem":191,"name":192,"vendor":193,"product":192,"cpe_part":9,"purl_type":194,"purl_namespace":193,"purl_name":192,"source":9,"versions":195},"Ubuntu","oxide-qt","ubuntu","deb",[196],{"version":197,"is_range":198,"range_type":199,"version_start":9,"version_start_type":9,"version_end":200,"version_end_type":201,"fixed_in":9},"lt1_0_4_0ubuntu0_14_04_1",true,"ecosystem","1.0.4-0ubuntu0.14.04.1","excluding"]