A vulnerability was found in Google Chrome. It has been rated as critical. This issue affects some unknown processing of the component ANGLE. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2020-16005. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Google Chrome. Affected is an unknown function of the component v8. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2020-16006. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome on Windows and classified as critical. This issue affects some unknown processing of the component UI. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2020-16011. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Google Chrome on Android and classified as critical. This vulnerability affects unknown code of the component UI. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2020-16010. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Google Chrome. This affects an unknown part of the component v8. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2020-16009. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Google Chrome. Affected by this issue is some unknown functionality of the component WebRTC. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2020-16008. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome up to 86.0.4240.74. It has been classified as problematic. Affected is an unknown function of the component Networking Handler. The manipulation leads to clickjacking.
This vulnerability is traded as CVE-2020-6557. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Google 被裁决涉嫌搜索垄断,美国司法部希望分拆 Chrome 以及终止 Google 与浏览器开发商如 Mozilla 的默认搜索引擎交易。Mozilla CFO Eric Muhlheim 在法庭上作证称,如果终止默认搜索交易,Firefox 可能会倒闭。Firefox 约占 Mozilla 收入的 90%,其中 85% 来自与 Google 的默认交易。如果 Mozilla 失去这笔收入,它将不得不大幅削减公司开支,缩减对 Firefox 的产品投资,此举可能会导致 Firefox 降低对用户的吸引力,引发恶性循环,最后可能导致 Mozilla 倒闭。
A vulnerability was found in Apple iOS and iPadOS up to 14.1. It has been rated as critical. This issue affects some unknown processing of the component FontParser. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2020-27930. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mitel ShoreTel 19.46.1802.0 and classified as problematic. This issue affects some unknown processing of the file index.php of the component Home Meeting Page. The manipulation of the argument PATH_INFO leads to cross site scripting.
The identification of this vulnerability is CVE-2020-28351. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Apple macOS up to 10.15.7 and classified as critical. Affected by this issue is some unknown functionality of the component FontParser. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2020-27930. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple watchOS up to 5.3.8/6.2.8/7.0.3 and classified as critical. This vulnerability affects unknown code of the component FontParser. The manipulation leads to memory corruption.
This vulnerability was named CVE-2020-27930. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Joplin 1.2.6. Affected by this vulnerability is an unknown functionality of the component Note Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2020-28249. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in touchbase.ai up to 1.x. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2020-26218. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Reddoxx MailDepot 2033. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2020-26554. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Kaa IoT Platform 1.2.0. It has been declared as problematic. This vulnerability affects unknown code of the component Dashboard. The manipulation of the argument Description leads to cross site scripting.
This vulnerability was named CVE-2020-26701. The attack can be initiated remotely. Furthermore, there is an exploit available.