Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
backports sle vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2020-15959
Insufficient policy enforcement in networking in Google Chrome before 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 33
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-15960
Heap buffer overflow in storage in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
9.6
CVSSv3
CVE-2020-15961
Insufficient policy validation in extensions in Google Chrome before 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-15962
Insufficient policy validation in serial in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6567
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows before 85.0.4183.83 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
4.3
CVSSv3
CVE-2020-6570
Information leakage in WebRTC in Google Chrome before 85.0.4183.83 allowed a remote malicious user to obtain potentially sensitive information via a crafted WebRTC interaction.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
Debian Debian Linux 10.0
9.6
CVSSv3
CVE-2020-6573
Use after free in video in Google Chrome on Android before 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
7.8
CVSSv3
CVE-2020-6574
Insufficient policy enforcement in installer in Google Chrome on OS X before 85.0.4183.102 allowed a local malicious user to potentially achieve privilege escalation via a crafted binary.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2020-6576
Use after free in offscreen canvas in Google Chrome before 85.0.4183.102 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
6.5
CVSSv3
CVE-2020-6560
Insufficient policy enforcement in autofill in Google Chrome before 85.0.4183.83 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »