4.3
CVSSv2

CVE-2020-6516

Published: 22/07/2020 Updated: 12/03/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Policy bypass in CORS in Google Chrome before 84.0.4147.89 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

opensuse backports sle 15.0

debian debian linux 10.0

fedoraproject fedora 31

fedoraproject fedora 32

opensuse leap 15.1

opensuse leap 15.2

Vendor Advisories

Severity Unknown Remote Unknown Type Unknown Description AVG-1206 chromium 8304103116-3 840414789-1 Unknown Fixed ...
Synopsis Critical: chromium-browser security update Type/Severity Security Advisory: Critical Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
The Chrome team is delighted to announce the promotion of Chrome 84 to the stable channel for Windows, Mac and Linux This will roll out over the coming days/weeks Chrome 840414789 contains a number of fixes and improvements -- a list of changes is available in the log Watch out for upcoming Chrome and Chromium blog posts about new feature ...
Multiple security issues were discovered in the Chromium web browser, which could result in the execution of arbitrary code, denial of service or information disclosure For the stable distribution (buster), these problems have been fixed in version 870428088-04~deb10u1 We recommend that you upgrade your chromium packages For the detailed sec ...

Github Repositories

WhatsApp MitD & MitM Introduction This repository contains PoC code and tools that were developed as part of our research [01] on remotely exploiting Man-in-the-Disk (MitD) vulnerabilities on WhatsApp for Android As discussed in our blog post, the code and accompanying scripts found here, were used to exploit CVE-2020-6516 (Chrome) [02] and CVE-2021-24027 (WhatsApp) [0