Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2015-5380
The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js prior to 0.12.6, io.js prior to 1.8.3 and 2.x prior to 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote ma...
Google V8 -
Iojs Io.js 2.0.0
Iojs Io.js 2.3.2
Iojs Io.js 2.0.2
Iojs Io.js 2.2.0
Iojs Io.js 2.0.1
Iojs Io.js 2.1.0
Iojs Io.js 2.3.1
Iojs Io.js 2.3.0
Iojs Io.js
Iojs Io.js 2.2.1
Nodejs Node.js
9.3
CVSSv2
CVE-2009-2555
Heap-based buffer overflow in src/jsregexp.cc in Google V8 prior to 1.1.10.14, as used in Google Chrome prior to 2.0.172.37, allows remote malicious users to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Google V8
Google Chrome 0.4.154.18
Google Chrome 0.2.149.30
Google Chrome 0.2.153.1
Google Chrome 1.0.154.42
Google Chrome 1.0.154.59
Google Chrome 2.0.156.1
Google Chrome 2.0.158.0
Google Chrome 0.4.154.31
Google Chrome 0.4.154.22
Google Chrome 1.0.154.39
Google Chrome 1.0.154.48
Google Chrome 1.0.154.52
Google Chrome 1.0.154.43
Google Chrome
Google Chrome 2.0.172.31
Google Chrome 0.3.154.3
Google Chrome 0.2.149.29
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
Google Chrome 2.0.157.0
Google Chrome 2.0.157.2
7.5
CVSSv2
CVE-2011-1285
The regular-expression functionality in Google Chrome prior to 10.0.648.127 does not properly implement reentrancy, which allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-1286
Google V8, as used in Google Chrome prior to 10.0.648.127, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger incorrect access to memory.
Google Chrome
7.5
CVSSv2
CVE-2011-1193
Google V8, as used in Google Chrome prior to 10.0.648.127, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
4.3
CVSSv2
CVE-2020-16040
Insufficient data validation in V8 in Google Chrome before 87.0.4280.88 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7 Github repositories
NA
CVE-2023-2936
Type Confusion in V8 in Google Chrome before 114.0.5735.90 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
6.8
CVSSv2
CVE-2020-6507
Out of bounds write in V8 in Google Chrome before 83.0.4103.106 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
2 Github repositories
5
CVSSv2
CVE-2013-2838
Google V8, as used in Google Chrome prior to 27.0.1453.93, allows remote malicious users to cause a denial of service (out-of-bounds read) via unspecified vectors.
Google Chrome 27.0.1453.77
Google Chrome 27.0.1453.74
Google Chrome 27.0.1453.61
Google Chrome 27.0.1453.62
Google Chrome 27.0.1453.34
Google Chrome 27.0.1453.11
Google Chrome 27.0.1453.47
Google Chrome 27.0.1453.81
Google Chrome 27.0.1453.54
Google Chrome 27.0.1453.41
Google Chrome 27.0.1453.10
Google Chrome 27.0.1453.42
Google Chrome 27.0.1453.59
Google Chrome 27.0.1453.7
Google Chrome 27.0.1453.70
Google Chrome 27.0.1453.69
Google Chrome 27.0.1453.51
Google Chrome 27.0.1453.6
Google Chrome 27.0.1453.38
Google Chrome 27.0.1453.65
Google Chrome 27.0.1453.56
Google Chrome 27.0.1453.71
6.8
CVSSv2
CVE-2021-21220
Insufficient validation of untrusted input in V8 in Google Chrome before 89.0.4389.128 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
2 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »