Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2012-5120
Google V8 prior to 3.13.7.5, as used in Google Chrome prior to 23.0.1271.64, on 64-bit Linux platforms allows remote malicious users to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an arra...
Google Chrome
Google Chrome 23.0.1271.0
Google Chrome 23.0.1271.1
Google Chrome 23.0.1271.2
Google Chrome 23.0.1271.3
Google Chrome 23.0.1271.4
Google Chrome 23.0.1271.5
Google Chrome 23.0.1271.6
Google Chrome 23.0.1271.7
Google Chrome 23.0.1271.8
Google Chrome 23.0.1271.9
Google Chrome 23.0.1271.10
6.8
CVSSv2
CVE-2013-2632
Google V8 prior to 3.17.13, as used in Google Chrome prior to 27.0.1444.3, allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Google Chrome
Google V8
Google V8 3.17.0
Google V8 3.17.1
Google V8 3.17.2
Google V8 3.17.3
Google V8 3.17.4
Google V8 3.17.5
Google V8 3.17.6
Google V8 3.17.7
Google V8 3.17.8
Google V8 3.17.9
6.8
CVSSv2
CVE-2013-0836
Google V8 prior to 3.14.5.3, as used in Google Chrome prior to 24.0.1312.52, does not properly implement garbage collection, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Google Chrome
Google Chrome 24.0.1272.0
Google Chrome 24.0.1272.1
Google Chrome 24.0.1273.0
Google Chrome 24.0.1274.0
Google Chrome 24.0.1275.0
Google Chrome 24.0.1276.0
Google Chrome 24.0.1276.1
Google Chrome 24.0.1277.0
Google Chrome 24.0.1278.0
Google Chrome 24.0.1279.0
Google Chrome 24.0.1280.0
7.5
CVSSv2
CVE-2012-5128
Google V8 prior to 3.13.7.5, as used in Google Chrome prior to 23.0.1271.64, does not properly perform write operations, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Google Chrome
Google Chrome 23.0.1271.0
Google Chrome 23.0.1271.1
Google Chrome 23.0.1271.2
Google Chrome 23.0.1271.3
Google Chrome 23.0.1271.4
Google Chrome 23.0.1271.5
Google Chrome 23.0.1271.6
Google Chrome 23.0.1271.7
Google Chrome 23.0.1271.8
Google Chrome 23.0.1271.9
Google Chrome 23.0.1271.10
7.5
CVSSv2
CVE-2013-6638
Multiple buffer overflows in runtime.cc in Google V8 prior to 3.22.24.7, as used in Google Chrome prior to 31.0.1650.63, allow remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to th...
Google Chrome
Google Chrome 31.0.1650.0
Google Chrome 31.0.1650.2
Google Chrome 31.0.1650.3
Google Chrome 31.0.1650.4
Google Chrome 31.0.1650.5
Google Chrome 31.0.1650.6
Google Chrome 31.0.1650.7
Google Chrome 31.0.1650.8
Google Chrome 31.0.1650.9
Google Chrome 31.0.1650.10
Google Chrome 31.0.1650.11
7.5
CVSSv2
CVE-2014-3152
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 prior to 3.25.28.16, as used in Google Chrome prior to 35.0.1916.114, allows remote malicious users to cause a denial of service or possibly have unspecified other impact vi...
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Google V8
Google V8 3.25.0
Google V8 3.25.1
Google V8 3.25.2
Google V8 3.25.3
Google V8 3.25.4
Google V8 3.25.5
Google V8 3.25.6
Google V8 3.25.7
7.5
CVSSv2
CVE-2014-7967
Multiple unspecified vulnerabilities in Google V8 prior to 3.28.71.15, as used in Google Chrome prior to 38.0.2125.101, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google Chrome
Google V8
7.5
CVSSv2
CVE-2015-6580
Multiple unspecified vulnerabilities in Google V8 prior to 4.5.103.29, as used in Google Chrome prior to 45.0.2454.85, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
7.5
CVSSv2
CVE-2015-7834
Multiple unspecified vulnerabilities in Google V8 prior to 4.6.85.23, as used in Google Chrome prior to 46.0.2490.71, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
10
CVSSv2
CVE-2015-8548
Multiple unspecified vulnerabilities in Google V8 prior to 4.7.80.23, as used in Google Chrome prior to 47.0.2526.80, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.
Google V8
Google Chrome
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-21298
jenkins project
CVE-2025-23811
server-side request forgery
jenkins bitbucket server integration plugin
CVE-2025-21210
CVE-2025-23882
bypass
muzaara google ads report
wordpress file search
CVE-2025-24397
mass assignment
CVE-2024-12477
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »