Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
CVE-2020-6418 vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2020-6411
Insufficient validation of untrusted input in Omnibox in Google Chrome before 80.0.3987.87 allowed a remote malicious user to perform domain spoofing via IDN homographs via a crafted domain name.
Google Chrome
5.8
CVSSv2
CVE-2020-6412
Insufficient validation of untrusted input in Omnibox in Google Chrome before 80.0.3987.87 allowed a remote malicious user to perform domain spoofing via IDN homographs via a crafted domain name.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6413
Inappropriate implementation in Blink in Google Chrome before 80.0.3987.87 allowed a remote malicious user to bypass HTML validators via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6414
Insufficient policy enforcement in Safe Browsing in Google Chrome before 80.0.3987.87 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
6.8
CVSSv2
CVE-2020-6415
Inappropriate implementation in JavaScript in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6416
Insufficient data validation in streams in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6381
Integer overflow in JavaScript in Google Chrome on ChromeOS and Android before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6382
Type confusion in JavaScript in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
6.8
CVSSv2
CVE-2020-6383
Type confusion in V8 in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.8
CVSSv2
CVE-2020-6384
Use after free in WebAudio in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »