Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
v8 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2017-5121
Inappropriate use of JIT optimisation in V8 in Google Chrome before 61.0.3163.100 for Linux, Windows, and Mac allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 Github repository
NA
CVE-2021-31314
File upload vulnerability in ejinshan v8+ terminal security system allows malicious users to upload arbitrary files to arbitrary locations on the server.
Ejinshan Terminal Security System 8.0
7.5
CVSSv2
CVE-2011-2332
Google V8, as used in Google Chrome prior to 12.0.742.91, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
7.5
CVSSv2
CVE-2011-2856
Google V8, as used in Google Chrome prior to 14.0.835.163, allows remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Google Chrome
6.8
CVSSv2
CVE-2020-16013
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.198 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2018-17478
Incorrect array position calculations in V8 in Google Chrome before 70.0.3538.102 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page.
Google Chrome
6.8
CVSSv2
CVE-2021-21230
Type confusion in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2021-21231
Insufficient data validation in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
6.8
CVSSv2
CVE-2021-21227
Insufficient data validation in V8 in Google Chrome before 90.0.4430.93 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
7.8
CVSSv2
CVE-2010-1506
The Google V8 bindings in Google Chrome prior to 4.1.249.1059 allow malicious users to cause a denial of service (memory corruption) via unknown vectors.
Google Chrome 4.1.249.1014
Google Chrome 4.1.249.1013
Google Chrome 4.1.249.1004
Google Chrome 4.1.249.1027
Google Chrome 4.1.249.1026
Google Chrome 4.1.249.1019
Google Chrome 4.1.249.1018
Google Chrome 4.1.249.1033
Google Chrome 4.1.249.1046
Google Chrome 4.1.249.1047
Google Chrome 4.1.249.1054
Google Chrome 4.1.249.1055
Google Chrome 4.0.303.0
Google Chrome 4.0.302.3
Google Chrome 4.0.302.2
Google Chrome 4.0.295.0
Google Chrome 4.0.294.0
Google Chrome 4.0.286.0
Google Chrome 4.0.278.0
Google Chrome 4.0.269.0
Google Chrome 4.0.268.0
Google Chrome 4.0.267.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »