Google V8, as used in Google Chrome before 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.