Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
721
VMScore
CVE-2021-21220
Insufficient validation of untrusted input in V8 in Google Chrome before 89.0.4389.128 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
1 Metasploit module
2 Github repositories
1 Article
694
VMScore
CVE-2019-2208
In PromiseBuiltinsAssembler::NewPromiseCapability of builtins-promise.cc, there is a possible out of bounds read in v8 JIT code due to a bug in code generation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is no...
Google Android 9.0
694
VMScore
CVE-2014-1730
Google V8, as used in Google Chrome prior to 34.0.1847.131 on Windows and OS X and prior to 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote malicious users to bypass intended access restrictions by leveraging "type confusion...
Google Chrome
694
VMScore
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.0.267.0
Google Chrome 4.0.248.0
Google Chrome 4.0.249.5
Google Chrome 4.0.249.46
Google Chrome 4.1.249.1017
Google Chrome 4.0.249.74
Google Chrome 2.0.172.8
Google Chrome 4.0.249.69
Google Chrome 4.0.249.25
Google Chrome 3.0.182.2
Google Chrome 4.0.222.5
Google Chrome 4.0.249.53
Google Chrome 4.1.249.1001
Google Chrome 4.0.249.40
Google Chrome 4.0.256.0
Google Chrome 4.0.245.0
Google Chrome 4.0.259.0
Google Chrome 4.0.249.14
Google Chrome 4.1.249.1011
Google Chrome 4.0.249.12
Google Chrome 4.1.249.1022
Google Chrome 4.0.249.1
686
VMScore
CVE-2020-6418
Type confusion in V8 in Google Chrome before 80.0.3987.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
5 Github repositories
2 Articles
670
VMScore
CVE-2012-5120
Google V8 prior to 3.13.7.5, as used in Google Chrome prior to 23.0.1271.64, on 64-bit Linux platforms allows remote malicious users to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an arra...
Google Chrome
Google Chrome 23.0.1271.0
Google Chrome 23.0.1271.1
Google Chrome 23.0.1271.2
Google Chrome 23.0.1271.3
Google Chrome 23.0.1271.4
Google Chrome 23.0.1271.5
Google Chrome 23.0.1271.6
Google Chrome 23.0.1271.7
Google Chrome 23.0.1271.8
Google Chrome 23.0.1271.9
Google Chrome 23.0.1271.10
Google Chrome 23.0.1271.11
Google Chrome 23.0.1271.12
Google Chrome 23.0.1271.13
Google Chrome 23.0.1271.14
Google Chrome 23.0.1271.15
Google Chrome 23.0.1271.16
Google Chrome 23.0.1271.17
Google Chrome 23.0.1271.18
Google Chrome 23.0.1271.19
Google Chrome 23.0.1271.20
670
VMScore
CVE-2011-2830
Google V8, as used in Google Chrome prior to 14.0.835.163, does not properly implement script object wrappers, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
Google Chrome
670
VMScore
CVE-2011-2856
Google V8, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
668
VMScore
CVE-2020-6831
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
Mozilla Thunderbird
Mozilla Firefox
Mozilla Firefox Esr
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
668
VMScore
CVE-2015-7834
Multiple unspecified vulnerabilities in Google V8 prior to 4.6.85.23, as used in Google Chrome prior to 46.0.2490.71, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »