Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by inappropriate implementation in V8. By persuading a victim to visit a specially-crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Proof of concept
Note: This CVE number is reserved. When the candidate has been publicized, the details for this candidate will be provided.