Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse leap 15.2 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2020-15963
Insufficient policy enforcement in extensions in Google Chrome before 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15964
Insufficient data validation in media in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-15965
Type confusion in V8 in Google Chrome before 85.0.4183.121 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
6.8
CVSSv2
CVE-2020-6510
Heap buffer overflow in background fetch in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
6.8
CVSSv2
CVE-2020-6513
Heap buffer overflow in PDFium in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-6522
Inappropriate implementation in external protocol handlers in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
6.8
CVSSv2
CVE-2020-6525
Heap buffer overflow in Skia in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
6.8
CVSSv2
CVE-2020-6530
Out of bounds memory access in developer tools in Google Chrome before 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-6533
Type Confusion in V8 in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.2
6.8
CVSSv2
CVE-2020-6534
Heap buffer overflow in WebRTC in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »