Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-30561
Type Confusion in V8 in Google Chrome before 91.0.4472.164 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2014-1729
Multiple unspecified vulnerabilities in Google V8 prior to 3.24.35.22, as used in Google Chrome prior to 34.0.1847.116, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google Chrome
6.8
CVSSv2
CVE-2021-30563
Type Confusion in V8 in Google Chrome before 91.0.4472.164 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2011-2332
Google V8, as used in Google Chrome prior to 12.0.742.91, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-2856
Google V8, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
6.8
CVSSv2
CVE-2020-16013
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.198 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2018-17478
Incorrect array position calculations in V8 in Google Chrome before 70.0.3538.102 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2014-1736
Integer overflow in api.cc in Google V8, as used in Google Chrome prior to 34.0.1847.131 on Windows and OS X and prior to 34.0.1847.132 on Linux, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a large length value.
Google Chrome
6.8
CVSSv2
CVE-2020-6453
Inappropriate implementation in V8 in Google Chrome before 80.0.3987.162 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
4.3
CVSSv2
CVE-2017-5028
Insufficient data validation in V8 in Google Chrome before 56.0.2924.76 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »