Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
CVE-2020-6507 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-6472
Insufficient policy enforcement in developer tools in Google Chrome before 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6473
Insufficient policy enforcement in Blink in Google Chrome before 83.0.4103.61 allowed a remote malicious user to obtain potentially sensitive information from process memory via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6474
Use after free in Blink in Google Chrome before 83.0.4103.61 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6475
Incorrect implementation in full screen in Google Chrome before 83.0.4103.61 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6476
Insufficient policy enforcement in tab strip in Google Chrome before 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6478
Inappropriate implementation in full screen in Google Chrome before 83.0.4103.61 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6479
Inappropriate implementation in sharing in Google Chrome before 83.0.4103.61 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
6.5
CVSSv3
CVE-2020-6480
Insufficient policy enforcement in enterprise in Google Chrome before 83.0.4103.61 allowed a local malicious user to bypass navigation restrictions via UI actions.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6481
Insufficient policy enforcement in URL formatting in Google Chrome before 83.0.4103.61 allowed a remote malicious user to perform domain spoofing via a crafted domain name.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.5
CVSSv3
CVE-2020-6482
Insufficient policy enforcement in developer tools in Google Chrome before 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »