Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse linux enterprise 15.0 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-6426
Inappropriate implementation in V8 in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-6427
Use after free in audio in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
6.8
CVSSv2
CVE-2020-6428
Use after free in audio in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-6429
Use after free in audio in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
6.8
CVSSv2
CVE-2020-6449
Use after free in audio in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
1 Github repository
6.8
CVSSv2
CVE-2020-6424
Use after free in media in Google Chrome before 80.0.3987.149 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Suse Suse Linux Enterprise Server 12
Opensuse Backports Sle 15.0
Suse Suse Linux Enterprise Desktop 12
6.9
CVSSv2
CVE-2019-3698
UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local malicious users to cause cause DoS or potentially escalate privileges by winning a race. This...
Nagios Nagios
Opensuse Backports Sle 15.0
Opensuse Leap 15.1
6.8
CVSSv2
CVE-2020-6390
Out of bounds memory access in streams in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
4.3
CVSSv2
CVE-2020-6391
Insufficient validation of untrusted input in Blink in Google Chrome before 80.0.3987.87 allowed a local malicious user to bypass content security policy via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
4.3
CVSSv2
CVE-2020-6392
Insufficient policy enforcement in extensions in Google Chrome before 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »