Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sqlite sqlite vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-6384
Use after free in WebAudio in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6386
Use after free in speech in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6418
Type confusion in V8 in Google Chrome before 80.0.3987.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
4 Github repositories
2 Articles
8.8
CVSSv3
CVE-2020-6389
Out of bounds write in WebRTC in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted video stream.
Google Chrome
8.8
CVSSv3
CVE-2020-6390
Out of bounds memory access in streams in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
8.8
CVSSv3
CVE-2020-6398
Use of uninitialized data in PDFium in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
8.8
CVSSv3
CVE-2020-6409
Inappropriate implementation in Omnibox in Google Chrome before 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.
Google Chrome
8.8
CVSSv3
CVE-2020-6410
Insufficient policy enforcement in navigation in Google Chrome before 80.0.3987.87 allowed a remote malicious user to confuse the user via a crafted domain name.
Google Chrome
8.8
CVSSv3
CVE-2020-6378
Use after free in speech in Google Chrome before 79.0.3945.130 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
8.8
CVSSv3
CVE-2020-6379
Use after free in V8 in Google Chrome before 79.0.3945.130 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »