Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
v8 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2011-1285
The regular-expression functionality in Google Chrome prior to 10.0.648.127 does not properly implement reentrancy, which allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-1193
Google V8, as used in Google Chrome prior to 10.0.648.127, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-1286
Google V8, as used in Google Chrome prior to 10.0.648.127, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger incorrect access to memory.
Google Chrome
9.3
CVSSv2
CVE-2009-2555
Heap-based buffer overflow in src/jsregexp.cc in Google V8 prior to 1.1.10.14, as used in Google Chrome prior to 2.0.172.37, allows remote malicious users to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
Google V8
Google Chrome
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
Google Chrome 1.0.154.39
Google Chrome 1.0.154.42
Google Chrome 1.0.154.43
Google Chrome 1.0.154.46
Google Chrome 1.0.154.48
Google Chrome 1.0.154.52
Google Chrome 1.0.154.53
Google Chrome 1.0.154.59
Google Chrome 2.0.156.1
4.3
CVSSv2
CVE-2020-16040
Insufficient data validation in V8 in Google Chrome before 87.0.4280.88 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7 Github repositories
6.8
CVSSv2
CVE-2021-21220
Insufficient validation of untrusted input in V8 in Google Chrome before 89.0.4389.128 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
1 Metasploit module
2 Github repositories
1 Article
6.8
CVSSv2
CVE-2021-38415
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable a heap-based buffer overflow when parsing a specially crafted project file, which may allow an malicious user to execute arbitrary code.
Fujielectric V-server
Fujielectric V-simulator
4.3
CVSSv2
CVE-2012-2011
Multiple cross-site scripting (XSS) vulnerabilities in HP Web Jetadmin 8.x allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Hp Web Jetadmin 8.1
Hp Web Jetadmin 8.0
NA
CVE-2023-2936
Type Confusion in V8 in Google Chrome before 114.0.5735.90 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
6.8
CVSSv2
CVE-2020-6507
Out of bounds write in V8 in Google Chrome before 83.0.4103.106 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »