Search for vulnerabilities
Vulnerability details: VCID-met3-dhk3-aaae
Vulnerability ID VCID-met3-dhk3-aaae
Aliases CVE-2020-6463
Summary Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6463.html
rhas Important https://access.redhat.com/errata/RHSA-2020:1970
rhas Important https://access.redhat.com/errata/RHSA-2020:3229
rhas Important https://access.redhat.com/errata/RHSA-2020:3233
rhas Important https://access.redhat.com/errata/RHSA-2020:3241
rhas Important https://access.redhat.com/errata/RHSA-2020:3253
rhas Important https://access.redhat.com/errata/RHSA-2020:3254
rhas Important https://access.redhat.com/errata/RHSA-2020:3341
rhas Important https://access.redhat.com/errata/RHSA-2020:3342
rhas Important https://access.redhat.com/errata/RHSA-2020:3343
rhas Important https://access.redhat.com/errata/RHSA-2020:3344
rhas Important https://access.redhat.com/errata/RHSA-2020:3345
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6463.json
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00577 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03243 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.03285 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.06756 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
epss 0.11112 https://api.first.org/data/v1/epss?cve=CVE-2020-6463
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1840893
generic_textual Medium https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
generic_textual Medium https://crbug.com/1065186
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6463
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6463
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-6463
archlinux High https://security.archlinux.org/AVG-1213
archlinux High https://security.archlinux.org/AVG-1214
generic_textual Medium https://ubuntu.com/security/notices/USN-4443-1
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
generic_textual Medium https://www.mozilla.org/en-US/security/advisories/mfsa2020-30/#CVE-2020-6463
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2020-31
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2020-35
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6463.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6463.json
https://api.first.org/data/v1/epss?cve=CVE-2020-6463
https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
https://crbug.com/1065186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/
https://security.gentoo.org/glsa/202007-60
https://security.gentoo.org/glsa/202007-64
https://ubuntu.com/security/notices/USN-4443-1
https://usn.ubuntu.com/4443-1/
https://www.debian.org/security/2020/dsa-4714
https://www.debian.org/security/2020/dsa-4736
https://www.debian.org/security/2020/dsa-4740
https://www.mozilla.org/en-US/security/advisories/mfsa2020-30/#CVE-2020-6463
1840893 https://bugzilla.redhat.com/show_bug.cgi?id=1840893
AVG-1213 https://security.archlinux.org/AVG-1213
AVG-1214 https://security.archlinux.org/AVG-1214
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
CVE-2020-6463 https://nvd.nist.gov/vuln/detail/CVE-2020-6463
mfsa2020-30 https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
mfsa2020-31 https://www.mozilla.org/en-US/security/advisories/mfsa2020-31
mfsa2020-32 https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
mfsa2020-33 https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
mfsa2020-35 https://www.mozilla.org/en-US/security/advisories/mfsa2020-35
RHSA-2020:1970 https://access.redhat.com/errata/RHSA-2020:1970
RHSA-2020:3229 https://access.redhat.com/errata/RHSA-2020:3229
RHSA-2020:3233 https://access.redhat.com/errata/RHSA-2020:3233
RHSA-2020:3241 https://access.redhat.com/errata/RHSA-2020:3241
RHSA-2020:3253 https://access.redhat.com/errata/RHSA-2020:3253
RHSA-2020:3254 https://access.redhat.com/errata/RHSA-2020:3254
RHSA-2020:3341 https://access.redhat.com/errata/RHSA-2020:3341
RHSA-2020:3342 https://access.redhat.com/errata/RHSA-2020:3342
RHSA-2020:3343 https://access.redhat.com/errata/RHSA-2020:3343
RHSA-2020:3344 https://access.redhat.com/errata/RHSA-2020:3344
RHSA-2020:3345 https://access.redhat.com/errata/RHSA-2020:3345
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6463.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6463
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6463
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-6463
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.78450
EPSS Score 0.00577
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.