Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-2935
Type Confusion in V8 in Google Chrome before 114.0.5735.90 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
668
VMScore
CVE-2014-3171
Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome prior to 37.0.2062.94, allows remote malicious users to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap s...
Google Chrome 37.0.2062.49
Google Chrome 37.0.2062.60
Google Chrome 37.0.2062.44
Google Chrome 37.0.2062.31
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.51
Google Chrome 37.0.2062.76
Google Chrome 37.0.2062.28
Google Chrome 37.0.2062.48
Google Chrome 37.0.2062.78
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.35
Google Chrome 37.0.2062.69
Google Chrome 37.0.2062.25
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.36
Google Chrome 37.0.2062.59
Google Chrome 37.0.2062.81
Google Chrome 37.0.2062.73
Google Chrome 37.0.2062.67
Google Chrome 37.0.2062.77
694
VMScore
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.0.267.0
Google Chrome 4.0.248.0
Google Chrome 4.0.249.5
Google Chrome 4.0.249.46
Google Chrome 4.1.249.1017
Google Chrome 4.0.249.74
Google Chrome 2.0.172.8
Google Chrome 4.0.249.69
Google Chrome 4.0.249.25
Google Chrome 3.0.182.2
Google Chrome 4.0.222.5
Google Chrome 4.0.249.53
Google Chrome 4.1.249.1001
Google Chrome 4.0.249.40
Google Chrome 4.0.256.0
Google Chrome 4.0.245.0
Google Chrome 4.0.259.0
Google Chrome 4.0.249.14
Google Chrome 4.1.249.1011
Google Chrome 4.0.249.12
Google Chrome 4.1.249.1022
Google Chrome 4.0.249.1
445
VMScore
CVE-2011-3111
Google V8, as used in Google Chrome prior to 19.0.1084.52, allows remote malicious users to cause a denial of service (invalid read operation) via unspecified vectors.
Google Chrome 19.0.1082.1
Google Chrome 19.0.1045.0
Google Chrome
Google Chrome 19.0.1057.1
Google Chrome 19.0.1077.0
Google Chrome 19.0.1047.0
Google Chrome 19.0.1060.1
Google Chrome 19.0.1038.0
Google Chrome 19.0.1036.7
Google Chrome 19.0.1084.25
Google Chrome 19.0.1084.43
Google Chrome 19.0.1077.1
Google Chrome 19.0.1084.18
Google Chrome 19.0.1051.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1084.42
Google Chrome 19.0.1081.2
Google Chrome 19.0.1053.0
Google Chrome 19.0.1055.2
Google Chrome 19.0.1084.15
Google Chrome 19.0.1084.7
Google Chrome 19.0.1084.44
668
VMScore
CVE-2011-3115
Google V8, as used in Google Chrome prior to 19.0.1084.52, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption."
Google Chrome 19.0.1082.1
Google Chrome 19.0.1045.0
Google Chrome
Google Chrome 19.0.1057.1
Google Chrome 19.0.1077.0
Google Chrome 19.0.1047.0
Google Chrome 19.0.1060.1
Google Chrome 19.0.1038.0
Google Chrome 19.0.1036.7
Google Chrome 19.0.1084.25
Google Chrome 19.0.1084.43
Google Chrome 19.0.1077.1
Google Chrome 19.0.1084.18
Google Chrome 19.0.1051.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1084.42
Google Chrome 19.0.1081.2
Google Chrome 19.0.1053.0
Google Chrome 19.0.1055.2
Google Chrome 19.0.1084.15
Google Chrome 19.0.1084.7
Google Chrome 19.0.1084.44
383
VMScore
CVE-2012-2886
Cross-site scripting (XSS) vulnerability in Google Chrome prior to 22.0.1229.79 allows remote malicious users to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka "Universal XSS (UXSS)."
Google Chrome 22.0.1229.23
Google Chrome 22.0.1229.63
Google Chrome 22.0.1229.18
Google Chrome 22.0.1229.33
Google Chrome 22.0.1229.9
Google Chrome 22.0.1229.57
Google Chrome 22.0.1229.32
Google Chrome 22.0.1229.54
Google Chrome 22.0.1229.16
Google Chrome 22.0.1229.4
Google Chrome 22.0.1229.21
Google Chrome 22.0.1229.12
Google Chrome 22.0.1229.31
Google Chrome 22.0.1229.10
Google Chrome 22.0.1229.2
Google Chrome 22.0.1229.22
Google Chrome 22.0.1229.35
Google Chrome 22.0.1229.50
Google Chrome 22.0.1229.36
Google Chrome 22.0.1229.60
Google Chrome 22.0.1229.62
Google Chrome 22.0.1229.25
605
VMScore
CVE-2010-0661
WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome prior to 4.0.249.78, allows remote malicious users to bypass the Same Origin Policy via vectors involving the window.open method.
Apple Webkit 52400
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
Google Chrome 1.0.154.39
Google Chrome 1.0.154.42
Google Chrome 1.0.154.43
Google Chrome 1.0.154.46
Google Chrome 1.0.154.48
Google Chrome 1.0.154.52
Google Chrome 1.0.154.53
Google Chrome 1.0.154.59
668
VMScore
CVE-2011-3103
Google V8, as used in Google Chrome prior to 19.0.1084.52, does not properly perform garbage collection, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Google Chrome 19.0.1082.1
Google Chrome 19.0.1045.0
Google Chrome
Google Chrome 19.0.1057.1
Google Chrome 19.0.1077.0
Google Chrome 19.0.1047.0
Google Chrome 19.0.1060.1
Google Chrome 19.0.1038.0
Google Chrome 19.0.1036.7
Google Chrome 19.0.1084.25
Google Chrome 19.0.1084.43
Google Chrome 19.0.1077.1
Google Chrome 19.0.1084.18
Google Chrome 19.0.1051.0
Google Chrome 19.0.1031.0
Google Chrome 19.0.1084.42
Google Chrome 19.0.1081.2
Google Chrome 19.0.1053.0
Google Chrome 19.0.1055.2
Google Chrome 19.0.1084.15
Google Chrome 19.0.1084.7
Google Chrome 19.0.1084.44
828
VMScore
CVE-2010-0645
Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome prior to 4.0.249.89, allow remote malicious users to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.
Google Chrome 2.0.172.8
Google Chrome 0.3.154.3
Google Chrome 3.0.182.2
Google Chrome 0.2.149.30
Google Chrome 0.4.154.31
Google Chrome 1.0.154.39
Google Chrome 2.0.172.38
Google Chrome 1.0.154.59
Google Chrome 0.2.149.27
Google Chrome 1.0.154.53
Google Chrome 0.4.154.33
Google Chrome 2.0.170.0
Google Chrome 1.0.154.43
Google Chrome 1.0.154.42
Google Chrome 2.0.169.1
Google Chrome 2.0.172.33
Google Chrome 3.0.195.24
Google Chrome 3.0.195.33
Google Chrome 1.0.154.52
Google Chrome 2.0.172.27
Google Chrome 1.0.154.65
Google Chrome 2.0.157.2
892
VMScore
CVE-2014-3176
Google Chrome prior to 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.
Google Chrome 37.0.2062.49
Google Chrome 37.0.2062.60
Google Chrome 37.0.2062.44
Google Chrome 37.0.2062.31
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.51
Google Chrome 37.0.2062.76
Google Chrome 37.0.2062.28
Google Chrome 37.0.2062.48
Google Chrome 37.0.2062.78
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.35
Google Chrome 37.0.2062.69
Google Chrome 37.0.2062.25
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.36
Google Chrome 37.0.2062.59
Google Chrome 37.0.2062.81
Google Chrome 37.0.2062.73
Google Chrome 37.0.2062.67
Google Chrome 37.0.2062.77
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »