Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-2935
Type Confusion in V8 in Google Chrome before 114.0.5735.90 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
NA
CVE-2014-3171
Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome prior to 37.0.2062.94, allows remote malicious users to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap s...
Google Chrome 37.0.2062.49
Google Chrome 37.0.2062.60
Google Chrome 37.0.2062.44
Google Chrome 37.0.2062.31
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.51
Google Chrome 37.0.2062.76
Google Chrome 37.0.2062.28
Google Chrome 37.0.2062.48
Google Chrome 37.0.2062.78
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.35
Google Chrome 37.0.2062.69
Google Chrome 37.0.2062.25
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.36
Google Chrome 37.0.2062.59
Google Chrome 37.0.2062.81
Google Chrome 37.0.2062.73
Google Chrome 37.0.2062.67
Google Chrome 37.0.2062.77
NA
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.1.249.1014
Google Chrome 4.1.249.1013
Google Chrome 4.1.249.1004
Google Chrome 4.1.249.1027
Google Chrome 4.1.249.1026
Google Chrome 4.1.249.1019
Google Chrome 4.1.249.1018
Google Chrome 4.1.249.1033
Google Chrome 4.1.249.1046
Google Chrome 4.1.249.1047
Google Chrome 4.1.249.1054
Google Chrome 4.1.249.1055
Google Chrome 4.0.303.0
Google Chrome 4.0.302.3
Google Chrome 4.0.302.2
Google Chrome 4.0.295.0
Google Chrome 4.0.294.0
Google Chrome 4.0.286.0
Google Chrome 4.0.278.0
Google Chrome 4.0.269.0
Google Chrome 4.0.268.0
Google Chrome 4.0.267.0
NA
CVE-2011-3111
Google V8, as used in Google Chrome prior to 19.0.1084.52, allows remote malicious users to cause a denial of service (invalid read operation) via unspecified vectors.
Google Chrome 19.0.1036.7
Google Chrome 19.0.1036.6
Google Chrome 19.0.1030.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1028.0
Google Chrome 19.0.1029.0
Google Chrome 19.0.1050.0
Google Chrome 19.0.1051.0
Google Chrome 19.0.1055.3
Google Chrome 19.0.1056.0
Google Chrome 19.0.1059.0
Google Chrome 19.0.1060.0
Google Chrome 19.0.1064.0
Google Chrome 19.0.1065.0
Google Chrome 19.0.1036.4
Google Chrome 19.0.1036.3
Google Chrome 19.0.1032.0
Google Chrome 19.0.1033.0
Google Chrome 19.0.1046.0
Google Chrome 19.0.1047.0
Google Chrome 19.0.1048.0
Google Chrome 19.0.1052.0
NA
CVE-2011-3115
Google V8, as used in Google Chrome prior to 19.0.1084.52, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption."
Google Chrome 19.0.1036.7
Google Chrome 19.0.1036.6
Google Chrome 19.0.1030.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1028.0
Google Chrome 19.0.1029.0
Google Chrome 19.0.1050.0
Google Chrome 19.0.1051.0
Google Chrome 19.0.1055.3
Google Chrome 19.0.1056.0
Google Chrome 19.0.1059.0
Google Chrome 19.0.1060.0
Google Chrome 19.0.1060.1
Google Chrome 19.0.1064.0
Google Chrome 19.0.1065.0
Google Chrome 19.0.1071.0
Google Chrome 19.0.1072.0
Google Chrome 19.0.1077.1
Google Chrome 19.0.1077.2
Google Chrome 19.0.1077.3
Google Chrome 19.0.1082.1
Google Chrome 19.0.1083.0
NA
CVE-2012-2886
Cross-site scripting (XSS) vulnerability in Google Chrome prior to 22.0.1229.79 allows remote malicious users to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka "Universal XSS (UXSS)."
Google Chrome 22.0.1229.23
Google Chrome 22.0.1229.63
Google Chrome 22.0.1229.18
Google Chrome 22.0.1229.33
Google Chrome 22.0.1229.9
Google Chrome 22.0.1229.57
Google Chrome 22.0.1229.32
Google Chrome 22.0.1229.54
Google Chrome 22.0.1229.16
Google Chrome 22.0.1229.4
Google Chrome 22.0.1229.21
Google Chrome 22.0.1229.12
Google Chrome 22.0.1229.31
Google Chrome 22.0.1229.10
Google Chrome 22.0.1229.2
Google Chrome 22.0.1229.22
Google Chrome 22.0.1229.35
Google Chrome 22.0.1229.50
Google Chrome 22.0.1229.36
Google Chrome 22.0.1229.60
Google Chrome 22.0.1229.62
Google Chrome 22.0.1229.25
NA
CVE-2010-0661
WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome prior to 4.0.249.78, allows remote malicious users to bypass the Same Origin Policy via vectors involving the window.open method.
Apple Webkit 52400
Google Chrome 3.0.193.2
Google Chrome 3.0.195.33
Google Chrome 4.0.244.0
Google Chrome 3.0.195.32
Google Chrome 2.0.156.1
Google Chrome 2.0.172.27
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 2.0.158.0
Google Chrome 2.0.159.0
Google Chrome 1.0.154.42
Google Chrome 1.0.154.65
Google Chrome 2.0.172.28
Google Chrome 1.0.154.36
Google Chrome 2.0.172.38
Google Chrome 2.0.157.2
Google Chrome 3.0.190.2
Google Chrome 0.3.154.3
Google Chrome 2.0.169.1
Google Chrome 2.0.172
Google Chrome 0.4.154.22
NA
CVE-2011-3103
Google V8, as used in Google Chrome prior to 19.0.1084.52, does not properly perform garbage collection, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Google Chrome 19.0.1044.0
Google Chrome 19.0.1043.0
Google Chrome 19.0.1040.0
Google Chrome 19.0.1039.0
Google Chrome 19.0.1034.0
Google Chrome 19.0.1035.0
Google Chrome 19.0.1048.0
Google Chrome 19.0.1049.0
Google Chrome 19.0.1054.0
Google Chrome 19.0.1055.0
Google Chrome 19.0.1057.1
Google Chrome 19.0.1057.3
Google Chrome 19.0.1061.1
Google Chrome 19.0.1062.0
Google Chrome 19.0.1062.1
Google Chrome 19.0.1045.0
Google Chrome 19.0.1036.7
Google Chrome 19.0.1036.6
Google Chrome 19.0.1030.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1028.0
Google Chrome 19.0.1029.0
NA
CVE-2010-0645
Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome prior to 4.0.249.89, allow remote malicious users to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.
Google Chrome 0.4.154.22
Google Chrome 1.0.154.39
Google Chrome 3.0.193.2
Google Chrome 2.0.172.37
Google Chrome 2.0.172.38
Google Chrome 2.0.157.2
Google Chrome 0.3.154.3
Google Chrome 2.0.172.31
Google Chrome 0.4.154.18
Google Chrome 2.0.169.1
Google Chrome 2.0.172
Google Chrome
Google Chrome 3.0.195.24
Google Chrome 0.4.154.33
Google Chrome 0.2.149.27
Google Chrome 1.0.154.42
Google Chrome 1.0.154.53
Google Chrome 0.2.149.29
Google Chrome 2.0.172.8
Google Chrome 2.0.172.2
Google Chrome 2.0.172.30
Google Chrome 0.2.153.1
NA
CVE-2014-3176
Google Chrome prior to 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.
Google Chrome 37.0.2062.49
Google Chrome 37.0.2062.60
Google Chrome 37.0.2062.44
Google Chrome 37.0.2062.31
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.51
Google Chrome 37.0.2062.76
Google Chrome 37.0.2062.28
Google Chrome 37.0.2062.48
Google Chrome 37.0.2062.78
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.35
Google Chrome 37.0.2062.69
Google Chrome 37.0.2062.25
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.36
Google Chrome 37.0.2062.59
Google Chrome 37.0.2062.81
Google Chrome 37.0.2062.73
Google Chrome 37.0.2062.67
Google Chrome 37.0.2062.77
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »