Loading...
Loading...
Google V8, as used in Google Chrome before 2.0.172.43, allows remote attackers to bypass intended restrictions on reading memory, and possibly obtain sensitive information or execute arbitrary code in the Chrome sandbox, via crafted JavaScript.
August 27, 2009
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2009-2935
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.