Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2014-1730
Google V8, as used in Google Chrome prior to 34.0.1847.131 on Windows and OS X and prior to 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote malicious users to bypass intended access restrictions by leveraging "type confusion...
Google Chrome
7.8
CVSSv2
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.1.249.1014
Google Chrome 4.1.249.1013
Google Chrome 4.1.249.1004
Google Chrome 4.1.249.1027
Google Chrome 4.1.249.1026
Google Chrome 4.1.249.1019
Google Chrome 4.1.249.1018
Google Chrome 4.1.249.1033
Google Chrome 4.1.249.1046
Google Chrome 4.1.249.1047
Google Chrome 4.1.249.1054
Google Chrome 4.1.249.1055
Google Chrome 4.0.303.0
Google Chrome 4.0.302.3
Google Chrome 4.0.302.2
Google Chrome 4.0.295.0
Google Chrome 4.0.294.0
Google Chrome 4.0.286.0
Google Chrome 4.0.278.0
Google Chrome 4.0.269.0
Google Chrome 4.0.268.0
Google Chrome 4.0.267.0
7.5
CVSSv2
CVE-2020-6831
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
Mozilla Firefox
Mozilla Firefox Esr
Mozilla Thunderbird
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
7.5
CVSSv2
CVE-2015-7834
Multiple unspecified vulnerabilities in Google V8 prior to 4.6.85.23, as used in Google Chrome prior to 46.0.2490.71, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
7.5
CVSSv2
CVE-2015-6580
Multiple unspecified vulnerabilities in Google V8 prior to 4.5.103.29, as used in Google Chrome prior to 45.0.2454.85, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
7.5
CVSSv2
CVE-2015-5380
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js prior to 0.12.6, io.js prior to 1.8.3 and 2.x prior to 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote ma...
Google V8 -
Iojs Io.js 2.0.0
Iojs Io.js 2.3.2
Iojs Io.js 2.0.2
Iojs Io.js 2.2.0
Iojs Io.js 2.0.1
Iojs Io.js 2.1.0
Iojs Io.js 2.3.1
Iojs Io.js 2.3.0
Iojs Io.js
Iojs Io.js 2.2.1
Nodejs Node.js
7.5
CVSSv2
CVE-2015-3910
Multiple unspecified vulnerabilities in Google V8 prior to 4.3.61.21, as used in Google Chrome prior to 43.0.2357.65, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
7.5
CVSSv2
CVE-2015-3333
Multiple unspecified vulnerabilities in Google V8 prior to 4.2.77.14, as used in Google Chrome prior to 42.0.2311.90, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Debian Debian Linux 8.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Google Chrome
7.5
CVSSv2
CVE-2015-2238
Multiple unspecified vulnerabilities in Google V8 prior to 4.1.0.21, as used in Google Chrome prior to 41.0.2272.76, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Google Chrome
Google V8
7.5
CVSSv2
CVE-2014-7967
Multiple unspecified vulnerabilities in Google V8 prior to 3.28.71.15, as used in Google Chrome prior to 38.0.2125.101, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google Chrome
Google V8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »