Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sqlite vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-6386
Use after free in speech in Google Chrome before 80.0.3987.116 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6418
Type confusion in V8 in Google Chrome before 80.0.3987.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
4 Github repositories
2 Articles
8.8
CVSSv3
CVE-2020-6407
Out of bounds memory access in streams in Google Chrome before 80.0.3987.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
1 Article
8.8
CVSSv3
CVE-2020-6378
Use after free in speech in Google Chrome before 79.0.3945.130 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
8.8
CVSSv3
CVE-2020-6379
Use after free in V8 in Google Chrome before 79.0.3945.130 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
8.8
CVSSv3
CVE-2020-6380
Insufficient policy enforcement in extensions in Google Chrome before 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 30
8.8
CVSSv3
CVE-2020-6381
Integer overflow in JavaScript in Google Chrome on ChromeOS and Android before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
8.8
CVSSv3
CVE-2020-6382
Type confusion in JavaScript in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Opensuse Backports Sle 15.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
8.8
CVSSv3
CVE-2020-6385
Insufficient policy enforcement in storage in Google Chrome before 80.0.3987.87 allowed a remote malicious user to bypass site isolation via a crafted HTML page.
Google Chrome
Opensuse Backports Sle 15.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Package Hub -
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
8.8
CVSSv3
CVE-2020-6387
Out of bounds write in WebRTC in Google Chrome before 80.0.3987.87 allowed a remote malicious user to potentially exploit heap corruption via a crafted video stream.
Google Chrome
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »