Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
leap vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2021-26675
A stack-based buffer overflow in dnsproxy in ConnMan prior to 1.39 could be used by network adjacent malicious users to execute code.
Intel Connman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
3.3
CVSSv2
CVE-2021-26676
gdhcp in ConnMan prior to 1.39 could be used by network-adjacent malicious users to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
Intel Connman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
2.7
CVSSv2
CVE-2020-0569
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel 7265 Firmware
Intel Ac 3165 Firmware
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.1
Qt Qt
3.3
CVSSv2
CVE-2020-28049
An issue exists in SDDM prior to 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display ...
Sddm Project Sddm
Opensuse Leap 15.1
Opensuse Leap 15.2
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
6.8
CVSSv2
CVE-2020-16009
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
Microsoft Edge
Cefsharp Cefsharp
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
2 Articles
6.8
CVSSv2
CVE-2020-16004
Use after free in user interface in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-16005
Insufficient policy enforcement in ANGLE in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
6.8
CVSSv2
CVE-2020-16006
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
4.6
CVSSv2
CVE-2020-16007
Insufficient data validation in installer in Google Chrome before 86.0.4240.183 allowed a local malicious user to potentially elevate privilege via a crafted filesystem.
Google Chrome
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
6.8
CVSSv2
CVE-2020-16008
Stack buffer overflow in WebRTC in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit stack corruption via a crafted WebRTC packet.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »