Vulnerabilities
Vulnerable Software
Google:  >> V8  >> 5.2.360  Security Vulnerabilities
Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
CVSS Score
8.8
EPSS Score
0.013
Published
2016-07-23
objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
CVSS Score
8.8
EPSS Score
0.007
Published
2016-07-23
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
CVSS Score
5.0
EPSS Score
0.008
Published
2011-12-30
Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.
CVSS Score
6.8
EPSS Score
0.009
Published
2011-10-25


Contact Us

Shodan ® - All rights reserved