Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
backports sle vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-16000
Inappropriate implementation in Blink in Google Chrome before 86.0.4240.111 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-16002
Use after free in PDFium in Google Chrome before 86.0.4240.111 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
1 Github repository
8.8
CVSSv3
CVE-2020-16003
Use after free in printing in Google Chrome before 86.0.4240.111 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
8.8
CVSSv3
CVE-2020-16008
Stack buffer overflow in WebRTC in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit stack corruption via a crafted WebRTC packet.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2020-16009
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
Microsoft Edge
Cefsharp Cefsharp
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
2 Articles
7.5
CVSSv3
CVE-2020-25829
An issue has been found in PowerDNS Recursor prior to 4.1.18, 4.2.x prior to 4.2.5, and 4.3.x prior to 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS...
Powerdns Recursor
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
9.3
CVSSv3
CVE-2020-15229
Singularity (an open source container platform) from version 3.1.1 up to and including 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem ...
Sylabs Singularity
Opensuse Leap 15.1
Opensuse Leap 15.2
Opensuse Backports Sle 15.0
6.1
CVSSv3
CVE-2020-26934
phpMyAdmin prior to 4.9.6 and 5.x prior to 5.0.3 allows XSS through the transformation feature via a crafted link.
Phpmyadmin Phpmyadmin
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
9.8
CVSSv3
CVE-2020-26935
An issue exists in SearchController in phpMyAdmin prior to 4.9.6 and 5.x prior to 5.0.3. A SQL injection vulnerability exists in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
Phpmyadmin Phpmyadmin
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
5.5
CVSSv3
CVE-2020-26164
In kdeconnect-kde (aka KDE Connect) prior to 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
Kde Kdeconnect
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »