Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
leap vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2021-26675
A stack-based buffer overflow in dnsproxy in ConnMan prior to 1.39 could be used by network adjacent malicious users to execute code.
Intel Connman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
6.5
CVSSv3
CVE-2021-26676
gdhcp in ConnMan prior to 1.39 could be used by network-adjacent malicious users to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
Intel Connman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.2
5.7
CVSSv3
CVE-2020-0569
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel 7265 Firmware
Intel Ac 3165 Firmware
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.1
Qt Qt
6.3
CVSSv3
CVE-2020-28049
An issue exists in SDDM prior to 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display ...
Sddm Project Sddm
Opensuse Leap 15.1
Opensuse Leap 15.2
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2020-16009
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
Microsoft Edge
Cefsharp Cefsharp
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
2 Articles
8.8
CVSSv3
CVE-2020-16004
Use after free in user interface in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-16005
Insufficient policy enforcement in ANGLE in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2020-16006
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
7.8
CVSSv3
CVE-2020-16007
Insufficient data validation in installer in Google Chrome before 86.0.4240.183 allowed a local malicious user to potentially elevate privilege via a crafted filesystem.
Google Chrome
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
8.8
CVSSv3
CVE-2020-16008
Stack buffer overflow in WebRTC in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit stack corruption via a crafted WebRTC packet.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »