Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clement lecigne vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2020-6402
Insufficient policy enforcement in downloads in Google Chrome on OS X before 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6410
Insufficient policy enforcement in navigation in Google Chrome before 80.0.3987.87 allowed a remote malicious user to confuse the user via a crafted domain name.
Google Chrome
5.8
CVSSv2
CVE-2020-6411
Insufficient validation of untrusted input in Omnibox in Google Chrome before 80.0.3987.87 allowed a remote malicious user to perform domain spoofing via IDN homographs via a crafted domain name.
Google Chrome
5.8
CVSSv2
CVE-2020-6412
Insufficient validation of untrusted input in Omnibox in Google Chrome before 80.0.3987.87 allowed a remote malicious user to perform domain spoofing via IDN homographs via a crafted domain name.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6413
Inappropriate implementation in Blink in Google Chrome before 80.0.3987.87 allowed a remote malicious user to bypass HTML validators via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6414
Insufficient policy enforcement in Safe Browsing in Google Chrome before 80.0.3987.87 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6415
Inappropriate implementation in JavaScript in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6416
Insufficient data validation in streams in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6420
Insufficient policy enforcement in media in Google Chrome before 80.0.3987.132 allowed a remote malicious user to bypass same origin policy via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
6.8
CVSSv2
CVE-2020-6383
Type confusion in V8 in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »