Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
v8 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-1736
Integer overflow in api.cc in Google V8, as used in Google Chrome prior to 34.0.1847.131 on Windows and OS X and prior to 34.0.1847.132 on Linux, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a large length value.
Google Chrome
7.2
CVSSv2
CVE-2020-28055
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade,...
Tcl 32s330 Firmware
Tcl 40s330 Firmware
Tcl 43s434 Firmware
Tcl 50s434 Firmware
Tcl 55s434 Firmware
Tcl 65s434 Firmware
Tcl 75s434 Firmware
6.8
CVSSv2
CVE-2020-6453
Inappropriate implementation in V8 in Google Chrome before 80.0.3987.162 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
5
CVSSv2
CVE-2011-3111
Google V8, as used in Google Chrome prior to 19.0.1084.52, allows remote malicious users to cause a denial of service (invalid read operation) via unspecified vectors.
Google Chrome 19.0.1036.7
Google Chrome 19.0.1036.6
Google Chrome 19.0.1030.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1028.0
Google Chrome 19.0.1029.0
Google Chrome 19.0.1050.0
Google Chrome 19.0.1051.0
Google Chrome 19.0.1055.3
Google Chrome 19.0.1056.0
Google Chrome 19.0.1059.0
Google Chrome 19.0.1060.0
Google Chrome 19.0.1064.0
Google Chrome 19.0.1065.0
Google Chrome 19.0.1036.4
Google Chrome 19.0.1036.3
Google Chrome 19.0.1032.0
Google Chrome 19.0.1033.0
Google Chrome 19.0.1046.0
Google Chrome 19.0.1047.0
Google Chrome 19.0.1048.0
Google Chrome 19.0.1052.0
6.8
CVSSv2
CVE-2020-15994
Use after free in V8 in Google Chrome before 86.0.4240.99 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
4.3
CVSSv2
CVE-2017-5028
Insufficient data validation in V8 in Google Chrome before 56.0.2924.76 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2016-1668
The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome prior to 50.0.2661.102, uses an improper creation context, which allows remote malicious users to bypass the Same Origin Policy via a crafted web site...
Google Chrome
Opensuse Opensuse 13.1
Debian Debian Linux 8.0
6.8
CVSSv2
CVE-2020-6419
Out of bounds write in V8 in Google Chrome before 81.0.4044.92 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2011-2862
Google V8, as used in Google Chrome prior to 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.
Google Chrome
4.3
CVSSv2
CVE-2011-3057
Google V8, as used in Google Chrome prior to 17.0.963.83, allows remote malicious users to cause a denial of service via vectors that trigger an invalid read operation.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »