Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google v8 vulnerabilities and exploits
(subscribe to this query)
850
VMScore
CVE-2012-5120
Google V8 prior to 3.13.7.5, as used in Google Chrome prior to 23.0.1271.64, on 64-bit Linux platforms allows remote malicious users to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an arra...
Google Chrome
Google Chrome 23.0.1271.0
Google Chrome 23.0.1271.1
Google Chrome 23.0.1271.2
Google Chrome 23.0.1271.3
Google Chrome 23.0.1271.4
Google Chrome 23.0.1271.5
Google Chrome 23.0.1271.6
Google Chrome 23.0.1271.7
Google Chrome 23.0.1271.8
Google Chrome 23.0.1271.9
Google Chrome 23.0.1271.10
780
VMScore
CVE-2013-2632
Google V8 prior to 3.17.13, as used in Google Chrome prior to 27.0.1444.3, allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
Google Chrome
Google V8
Google V8 3.17.0
Google V8 3.17.1
Google V8 3.17.2
Google V8 3.17.3
Google V8 3.17.4
Google V8 3.17.5
Google V8 3.17.6
Google V8 3.17.7
Google V8 3.17.8
Google V8 3.17.9
780
VMScore
CVE-2013-0836
Google V8 prior to 3.14.5.3, as used in Google Chrome prior to 24.0.1312.52, does not properly implement garbage collection, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
Google Chrome
Google Chrome 24.0.1272.0
Google Chrome 24.0.1272.1
Google Chrome 24.0.1273.0
Google Chrome 24.0.1274.0
Google Chrome 24.0.1275.0
Google Chrome 24.0.1276.0
Google Chrome 24.0.1276.1
Google Chrome 24.0.1277.0
Google Chrome 24.0.1278.0
Google Chrome 24.0.1279.0
Google Chrome 24.0.1280.0
850
VMScore
CVE-2012-5128
Google V8 prior to 3.13.7.5, as used in Google Chrome prior to 23.0.1271.64, does not properly perform write operations, which allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Google Chrome
Google Chrome 23.0.1271.0
Google Chrome 23.0.1271.1
Google Chrome 23.0.1271.2
Google Chrome 23.0.1271.3
Google Chrome 23.0.1271.4
Google Chrome 23.0.1271.5
Google Chrome 23.0.1271.6
Google Chrome 23.0.1271.7
Google Chrome 23.0.1271.8
Google Chrome 23.0.1271.9
Google Chrome 23.0.1271.10
850
VMScore
CVE-2013-6638
Multiple buffer overflows in runtime.cc in Google V8 prior to 3.22.24.7, as used in Google Chrome prior to 31.0.1650.63, allow remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to th...
Google Chrome
Google Chrome 31.0.1650.0
Google Chrome 31.0.1650.2
Google Chrome 31.0.1650.3
Google Chrome 31.0.1650.4
Google Chrome 31.0.1650.5
Google Chrome 31.0.1650.6
Google Chrome 31.0.1650.7
Google Chrome 31.0.1650.8
Google Chrome 31.0.1650.9
Google Chrome 31.0.1650.10
Google Chrome 31.0.1650.11
850
VMScore
CVE-2014-3152
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 prior to 3.25.28.16, as used in Google Chrome prior to 35.0.1916.114, allows remote malicious users to cause a denial of service or possibly have unspecified other impact vi...
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Fedoraproject Fedora 22
Google V8
Google V8 3.25.0
Google V8 3.25.1
Google V8 3.25.2
Google V8 3.25.3
Google V8 3.25.4
Google V8 3.25.5
Google V8 3.25.6
Google V8 3.25.7
780
VMScore
CVE-2011-3886
Google V8, as used in Google Chrome prior to 15.0.874.102, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
Google V8
600
VMScore
CVE-2011-5037
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Nod...
Google V8
850
VMScore
CVE-2015-3910
Multiple unspecified vulnerabilities in Google V8 prior to 4.3.61.21, as used in Google Chrome prior to 43.0.2357.65, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google V8
Google Chrome
1000
VMScore
CVE-2016-2843
Multiple unspecified vulnerabilities in Google V8 prior to 4.9.385.26, as used in Google Chrome prior to 49.0.2623.75, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Google Chrome
Google V8
Preferred Score:
VMScore
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-0998
CVE-2025-26779
unknown
CVE-2025-1094
CVE-2025-1336
enituretechnology
unauthorized
CVE-2024-57970
s2member pro
oliver pos – a woocommerce point of sale (pos)
CVE-2024-40591
race condition
deserialization
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »