v8/v8 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|v8/v8 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Type Confusion

[,13.1.132)
  • C
Type Confusion

[,13.1.96)
  • H
Use of Uninitialized Resource

[0,)
  • M
Improper Input Validation

[0,)
  • H
Type Confusion

[,13.0.198)
  • H
Heap-based Buffer Overflow

[,13.0.45)
  • H
Type Confusion

[,13.0.119)
  • C
Out-of-Bounds Write

[,13.0.86)
  • H
Type Confusion

[,13.0.16)
  • M
Heap-based Buffer Overflow

[,12.9.130)
  • M
Out-of-bounds Read

[,12.8.144)
  • H
Out-of-bounds Write

[,12.8.24)
  • H
Type Confusion

[,13.0.22)
  • H
Type Confusion

[,13.0.16)
  • M
Heap-based Buffer Overflow

[,12.9.68)
  • M
Type Confusion

[,12.9.56)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

(,)
  • H
Out-of-bounds Read

[,12.8.127)
  • H
Heap-based Buffer Overflow

[,12.8.102)
  • C
Out-of-bounds Read

[,12.8.295)
  • C
Type Confusion

[,12.7.10-pgo)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,12.7.93)
  • H
Type Confusion

[,12.6.219-pgo)
  • H
Heap-based Buffer Overflow

[,12.4.38)
  • H
Denial of Service (DoS)

[,12.4.31)
  • H
NULL Pointer Dereference

[,12.4.192)
  • C
Type Confusion

[,12.5.37)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,12.5.6)
  • H
Out-of-Bounds

[,12.5.62)
  • C
Denial of Service (DoS)

[,5.0.71)
  • H
Denial of Service (DoS)

[,3.30.33.14)
  • H
Out-of-Bounds

[,3.22.24.7)
  • H
Out-of-Bounds

[0,52.0.2743.82)
  • M
Improper Input Validation

[0,)
  • H
Denial of Service (DoS)

[,4.6.85.23)
  • C
Denial of Service (DoS)

[,3.23.18)
  • H
Denial of Service (DoS)

[,3.30.33.14)
  • H
Denial of Service (DoS)

[,4.6.85.23)
  • M
Improper Input Validation

[0,)
  • H
Out-of-Bounds

[,5.1.281)
  • H
Denial of Service (DoS)

[,4.7.80)
  • H
Out-of-Bounds

[,3.13.7.5)
  • H
Denial of Service (DoS)

[,3.24.36)
  • M
Information Exposure

[,5.2.360)
  • H
Out-of-Bounds

[,3.13.7.5)
  • H
Denial of Service (DoS)

[,4.6.85.23)
  • M
Resource Management Errors

[,3.17.0)
  • C
Denial of Service (DoS)

[,4.9.385)
  • H
Denial of Service (DoS)

[,5.0.71)
  • H
Denial of Service (DoS)

[,4.6.85.23)
  • H
Out-of-Bounds

[,3.22.24.7)
  • H
Denial of Service (DoS)

[,4.6.85.23)
  • M
Denial of Service (DoS)

[,3.22.0)
  • H
Denial of Service (DoS)

[,4.2.77.7)
  • H
Denial of Service (DoS)

[,4.2.77.7)
  • M
Out-of-Bounds

[,5.1.281)
  • H
Security Features

[0,52.0.2743.82)
  • H
Out-of-Bounds

[,5.1.281)
  • H
Out-of-Bounds

[,3.22.24.7)