Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
backports vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2020-15972
Use after free in audio in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-15974
Integer overflow in Blink in Google Chrome before 86.0.4240.75 allowed a remote malicious user to bypass site isolation via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Fedoraproject Fedora 33
6.8
CVSSv2
CVE-2020-15975
Integer overflow in SwiftShader in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15976
Use after free in WebXR in Google Chrome on Android before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Fedoraproject Fedora 33
4.3
CVSSv2
CVE-2020-15977
Insufficient data validation in dialogs in Google Chrome on OS X before 86.0.4240.75 allowed a remote malicious user to obtain potentially sensitive information from disk via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
4.3
CVSSv2
CVE-2020-15981
Out of bounds read in audio in Google Chrome before 86.0.4240.75 allowed a remote malicious user to obtain potentially sensitive information from process memory via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
4.4
CVSSv2
CVE-2020-15983
Insufficient data validation in webUI in Google Chrome on ChromeOS before 86.0.4240.75 allowed a local malicious user to bypass content security policy via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
Opensuse Backports Sle 15.0
4.3
CVSSv2
CVE-2020-15986
Integer overflow in media in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15987
Use after free in WebRTC in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted WebRTC stream.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15988
Insufficient policy enforcement in downloads in Google Chrome on Windows before 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
Opensuse Backports Sle 15.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6280
CVE-2024-5346
CVE-2024-30078
CVE-2022-45803
CVE-2024-36886
SQL
CVE-2024-24553
IMAP
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »