Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
v8 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2011-2856
Google V8, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-2332
Google V8, as used in Google Chrome prior to 12.0.742.91, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
6.8
CVSSv2
CVE-2018-17478
Incorrect array position calculations in V8 in Google Chrome before 70.0.3538.102 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2020-16013
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.198 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2021-21230
Type confusion in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2021-21231
Insufficient data validation in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
6.8
CVSSv2
CVE-2021-21227
Insufficient data validation in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
7.2
CVSSv2
CVE-2021-4034
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle ...
Polkit Project Polkit
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.2
282 Github repositories
1 Article
7.8
CVSSv2
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.0.267.0
Google Chrome 4.0.248.0
Google Chrome 4.0.249.5
Google Chrome 4.0.249.46
Google Chrome 4.1.249.1017
Google Chrome 4.0.249.74
Google Chrome 2.0.172.8
Google Chrome 4.0.249.69
Google Chrome 4.0.249.25
Google Chrome 3.0.182.2
Google Chrome 4.0.222.5
Google Chrome 4.0.249.53
Google Chrome 4.1.249.1001
Google Chrome 4.0.249.40
Google Chrome 4.0.256.0
Google Chrome 4.0.245.0
Google Chrome 4.0.259.0
Google Chrome 4.0.249.14
Google Chrome 4.1.249.1011
Google Chrome 4.0.249.12
Google Chrome 4.1.249.1022
Google Chrome 4.0.249.1
7.5
CVSSv2
CVE-2014-1736
Integer overflow in api.cc in Google V8, as used in Google Chrome prior to 34.0.1847.131 on Windows and OS X and prior to 34.0.1847.132 on Linux, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a large length value.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »