Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
CVE-2020-6507 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-6455
Out of bounds read in WebSQL in Google Chrome before 81.0.4044.92 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle-15
6.5
CVSSv3
CVE-2020-6456
Insufficient validation of untrusted input in clipboard in Google Chrome before 81.0.4044.92 allowed a local malicious user to bypass site isolation via crafted clipboard contents.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle-15
9.6
CVSSv3
CVE-2020-6457
Use after free in speech recognizer in Google Chrome before 81.0.4044.113 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6458
Out of bounds read and write in PDFium in Google Chrome before 81.0.4044.122 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8.8
CVSSv3
CVE-2020-6448
Use after free in V8 in Google Chrome before 81.0.4044.92 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
8.8
CVSSv3
CVE-2020-6454
Use after free in extensions in Google Chrome before 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
4.3
CVSSv3
CVE-2020-6431
Insufficient policy enforcement in full screen in Google Chrome before 81.0.4044.92 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle-15
4.3
CVSSv3
CVE-2020-6432
Insufficient policy enforcement in navigations in Google Chrome before 81.0.4044.92 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle-15
4.3
CVSSv3
CVE-2020-6433
Insufficient policy enforcement in extensions in Google Chrome before 81.0.4044.92 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 30
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle-15
8.8
CVSSv3
CVE-2020-6434
Use after free in devtools in Google Chrome before 81.0.4044.92 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »