Vulnerabilities
Vulnerable Software
Google:  >> V8  Security Vulnerabilities
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
CVSS Score
5.0
EPSS Score
0.008
Published
2011-12-30
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
CVSS Score
6.8
EPSS Score
0.009
Published
2011-10-25
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
CVSS Score
9.3
EPSS Score
0.272
Published
2009-07-21


Contact Us

Shodan ® - All rights reserved