cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2016-5129,https://securityvulnerability.io/vulnerability/CVE-2016-5129,,"Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.",Google,"Chrome,V8",8.8,HIGH,0.025299999862909317,false,false,false,false,,false,false,2016-07-23T19:00:00.000Z,0 CVE-2016-5128,https://securityvulnerability.io/vulnerability/CVE-2016-5128,,"objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.",Google,"Chrome,V8",8.8,HIGH,0.011119999922811985,false,false,false,false,,false,false,2016-07-23T19:00:00.000Z,0 CVE-2016-1678,https://securityvulnerability.io/vulnerability/CVE-2016-1678,,"objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.",Google,V8,8.8,HIGH,0.018969999626278877,false,false,false,false,,false,false,2016-06-05T23:59:00.000Z,0 CVE-2016-3679,https://securityvulnerability.io/vulnerability/CVE-2016-3679,,"Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,V8,8.8,HIGH,0.005450000055134296,false,false,false,false,,false,false,2016-03-29T10:00:00.000Z,0 CVE-2015-8548,https://securityvulnerability.io/vulnerability/CVE-2015-8548,,"Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.",Google,"V8,Chrome",,,0.0016599999507889152,false,false,false,false,,false,false,2015-12-14T11:00:00.000Z,0 CVE-2015-8478,https://securityvulnerability.io/vulnerability/CVE-2015-8478,,"Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,"Chrome,V8",,,0.001230000052601099,false,false,false,false,,false,false,2015-12-06T01:00:00.000Z,0 CVE-2015-7834,https://securityvulnerability.io/vulnerability/CVE-2015-7834,,"Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,V8,,,0.0016599999507889152,false,false,false,false,,false,false,2015-10-15T10:00:00.000Z,0 CVE-2015-6580,https://securityvulnerability.io/vulnerability/CVE-2015-6580,,"Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,V8,,,0.001230000052601099,false,false,false,false,,false,false,2015-09-03T22:00:00.000Z,0 CVE-2015-5380,https://securityvulnerability.io/vulnerability/CVE-2015-5380,,"The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.",Google,V8,,,0.007530000060796738,false,false,false,false,,false,false,2015-07-09T10:00:00.000Z,0 CVE-2015-3910,https://securityvulnerability.io/vulnerability/CVE-2015-3910,,"Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,"V8,Chrome",,,0.0016599999507889152,false,false,false,false,,false,false,2015-05-20T10:00:00.000Z,0 CVE-2015-3333,https://securityvulnerability.io/vulnerability/CVE-2015-3333,,"Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,V8,,,0.0032099999953061342,false,false,false,false,,false,false,2015-04-19T10:00:00.000Z,0 CVE-2014-7967,https://securityvulnerability.io/vulnerability/CVE-2014-7967,,"Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,"Chrome,V8",,,0.0012400000123307109,false,false,false,false,,false,false,2014-10-08T10:00:00.000Z,0 CVE-2014-1704,https://securityvulnerability.io/vulnerability/CVE-2014-1704,,"Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,"Chrome,V8",,,0.00547999981790781,false,false,false,false,,false,false,2014-03-16T10:00:00.000Z,0 CVE-2013-6668,https://securityvulnerability.io/vulnerability/CVE-2013-6668,,"Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",Google,"Chrome,V8",,,0.010209999978542328,false,false,false,true,true,false,false,2014-03-05T02:00:00.000Z,0 CVE-2013-6638,https://securityvulnerability.io/vulnerability/CVE-2013-6638,,"Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.",Google,"Chrome,V8",,,0.022120000794529915,false,false,false,false,,false,false,2013-12-07T00:00:00.000Z,0 CVE-2013-6639,https://securityvulnerability.io/vulnerability/CVE-2013-6639,,"The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.",Google,"Chrome,V8",,,0.021239999681711197,false,false,false,false,,false,false,2013-12-07T00:00:00.000Z,0 CVE-2013-6640,https://securityvulnerability.io/vulnerability/CVE-2013-6640,,"The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.",Google,"Chrome,V8",,,0.021239999681711197,false,false,false,false,,false,false,2013-12-07T00:00:00.000Z,0 CVE-2013-2838,https://securityvulnerability.io/vulnerability/CVE-2013-2838,,"Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.",Google,"Chrome,V8",,,0.0044200001284480095,false,false,false,false,,false,false,2013-05-22T10:00:00.000Z,0 CVE-2013-2632,https://securityvulnerability.io/vulnerability/CVE-2013-2632,,"Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.",Google,"V8,Chrome",,,0.0065299998968839645,false,false,false,false,,false,false,2013-03-21T21:55:00.000Z,0 CVE-2013-0836,https://securityvulnerability.io/vulnerability/CVE-2013-0836,,"Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.",Google,"Chrome,V8",,,0.004550000187009573,false,false,false,false,,false,false,2013-01-15T21:00:00.000Z,0 CVE-2012-5128,https://securityvulnerability.io/vulnerability/CVE-2012-5128,,"Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.",Google,"Chrome,V8",,,0.008009999990463257,false,false,false,false,,false,false,2012-11-07T11:00:00.000Z,0 CVE-2012-5120,https://securityvulnerability.io/vulnerability/CVE-2012-5120,,"Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.",Google,"Chrome,V8",,,0.008009999990463257,false,false,false,false,,false,false,2012-11-07T11:00:00.000Z,0 CVE-2011-5037,https://securityvulnerability.io/vulnerability/CVE-2011-5037,,"Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.",Google,V8,,,0.004629999864846468,false,false,false,false,,false,false,2011-12-30T01:00:00.000Z,0 CVE-2011-3886,https://securityvulnerability.io/vulnerability/CVE-2011-3886,,"Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.",Google,V8,,,0.009890000335872173,false,false,false,false,,false,false,2011-10-25T19:00:00.000Z,0 CVE-2009-2555,https://securityvulnerability.io/vulnerability/CVE-2009-2555,,"Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.",Google,"V8,Chrome",,,0.07180000096559525,false,false,false,false,,false,false,2009-07-21T16:00:00.000Z,0