Search for vulnerabilities
Vulnerability details: VCID-4wu8-w2vh-aaaa
Vulnerability ID VCID-4wu8-w2vh-aaaa
Aliases CVE-2020-6458
Summary Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6458.html
rhas Important https://access.redhat.com/errata/RHSA-2020:1970
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6458.json
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.00805 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
epss 0.01999 https://api.first.org/data/v1/epss?cve=CVE-2020-6458
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1827381
generic_textual Medium https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6458
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6458
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6458
archlinux High https://security.archlinux.org/AVG-1140
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6458.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6458.json
https://api.first.org/data/v1/epss?cve=CVE-2020-6458
https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
https://crbug.com/1067270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831
https://www.debian.org/security/2020/dsa-4714
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044
1827381 https://bugzilla.redhat.com/show_bug.cgi?id=1827381
ASA-202004-20 https://security.archlinux.org/ASA-202004-20
AVG-1140 https://security.archlinux.org/AVG-1140
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2020-6458 https://nvd.nist.gov/vuln/detail/CVE-2020-6458
GLSA-202004-12 https://security.gentoo.org/glsa/202004-12
RHSA-2020:1970 https://access.redhat.com/errata/RHSA-2020:1970
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6458.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6458
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6458
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6458
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.59961
EPSS Score 0.00222
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.