Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
CVE-2020-6507 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-6483
Insufficient policy enforcement in payments in Google Chrome before 83.0.4103.61 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6484
Insufficient data validation in ChromeDriver in Google Chrome before 83.0.4103.61 allowed a remote malicious user to bypass navigation restrictions via a crafted request.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6485
Insufficient data validation in media router in Google Chrome before 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6486
Insufficient policy enforcement in navigations in Google Chrome before 83.0.4103.61 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6487
Insufficient policy enforcement in downloads in Google Chrome before 83.0.4103.61 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
4.3
CVSSv3
CVE-2020-6488
Insufficient policy enforcement in downloads in Google Chrome before 83.0.4103.61 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
4.3
CVSSv3
CVE-2020-6489
Inappropriate implementation in developer tools in Google Chrome before 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
4.3
CVSSv3
CVE-2020-6490
Insufficient data validation in loader in Google Chrome before 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6491
Insufficient data validation in site information in Google Chrome before 83.0.4103.61 allowed a remote malicious user to spoof security UI via a crafted domain name.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
9.6
CVSSv3
CVE-2020-6493
Use after free in WebAuthentication in Google Chrome before 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »