Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse leap 15.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-6564
Inappropriate implementation in permissions in Google Chrome before 85.0.4183.83 allowed a remote malicious user to spoof the contents of a permission dialog via a crafted HTML page.
Debian Debian Linux 10.0
Opensuse Backports Sle 15.0
Google Chrome
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
4.3
CVSSv2
CVE-2020-6568
Insufficient policy enforcement in intent handling in Google Chrome on Android before 85.0.4183.83 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
4.3
CVSSv2
CVE-2020-6570
Information leakage in WebRTC in Google Chrome before 85.0.4183.83 allowed a remote malicious user to obtain potentially sensitive information via a crafted WebRTC interaction.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
Debian Debian Linux 10.0
4.3
CVSSv2
CVE-2020-6571
Insufficient data validation in Omnibox in Google Chrome before 85.0.4183.83 allowed a remote malicious user to perform domain spoofing via IDN homographs via a crafted domain name.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15960
Heap buffer overflow in storage in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15961
Insufficient policy validation in extensions in Google Chrome before 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15962
Insufficient policy validation in serial in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15963
Insufficient policy enforcement in extensions in Google Chrome before 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15964
Insufficient data validation in media in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15965
Type confusion in V8 in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »