Vulnerabilities > Google > V8 > Medium

DATE CVE VULNERABILITY TITLE RISK
2016-06-05 CVE-2016-1688 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
network
low complexity
debian canonical redhat suse opensuse google CWE-119
6.5
2016-06-05 CVE-2016-1677 Information Exposure vulnerability in multiple products
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
network
low complexity
google debian canonical redhat suse opensuse CWE-200
6.5
2013-03-21 CVE-2013-2632 Unspecified vulnerability in Google Chrome
Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.
network
google
6.8
2011-12-30 CVE-2011-5037 Improper Input Validation vulnerability in Google V8
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
network
low complexity
google CWE-20
5.0