Vulnerabilities
Vulnerable Software
Google:  >> V8  >> 3.23.15  Security Vulnerabilities
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
CVSS Score
5.0
EPSS Score
0.008
Published
2011-12-30
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
CVSS Score
6.8
EPSS Score
0.009
Published
2011-10-25


Contact Us

Shodan ® - All rights reserved