Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
v8 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2017-5071
Insufficient validation of untrusted input in V8 in Google Chrome before 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote malicious user to perform an out of bounds memory read via a crafted HTML page.
Google Chrome
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2021-30551
Type confusion in V8 in Google Chrome before 91.0.4472.101 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 33
Fedoraproject Fedora 34
2 Github repositories
1 Article
7.5
CVSSv2
CVE-2014-3171
Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome prior to 37.0.2062.94, allows remote malicious users to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap s...
Google Chrome 37.0.2062.49
Google Chrome 37.0.2062.60
Google Chrome 37.0.2062.44
Google Chrome 37.0.2062.31
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.51
Google Chrome 37.0.2062.76
Google Chrome 37.0.2062.28
Google Chrome 37.0.2062.48
Google Chrome 37.0.2062.78
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.35
Google Chrome 37.0.2062.69
Google Chrome 37.0.2062.25
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.36
Google Chrome 37.0.2062.59
Google Chrome 37.0.2062.81
Google Chrome 37.0.2062.73
Google Chrome 37.0.2062.67
Google Chrome 37.0.2062.77
6.8
CVSSv2
CVE-2021-30563
Type Confusion in V8 in Google Chrome before 91.0.4472.164 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2014-1729
Multiple unspecified vulnerabilities in Google V8 prior to 3.24.35.22, as used in Google Chrome prior to 34.0.1847.116, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google Chrome
NA
CVE-2022-39266
isolated-vm is a library for nodejs which gives the user access to v8's Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs proce...
Isolated-vm Project Isolated-vm
4.6
CVSSv2
CVE-2022-23731
V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models.
Lg Webos
2 Github repositories
6.8
CVSSv2
CVE-2017-5122
Inappropriate use of table size handling in V8 in Google Chrome before 61.0.3163.100 for Windows allowed a remote malicious user to trigger out-of-bounds access via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
6.8
CVSSv2
CVE-2017-5121
Inappropriate use of JIT optimisation in V8 in Google Chrome before 61.0.3163.100 for Linux, Windows, and Mac allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 Github repository
NA
CVE-2021-31314
File upload vulnerability in ejinshan v8+ terminal security system allows malicious users to upload arbitrary files to arbitrary locations on the server.
Ejinshan Terminal Security System 8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »