Search for vulnerabilities
Vulnerability details: VCID-qer4-6csd-ykh3
Vulnerability ID VCID-qer4-6csd-ykh3
Aliases CVE-2018-6078
Summary Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6078.json
https://api.first.org/data/v1/epss?cve=CVE-2018-6078
https://crbug.com/793628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6117
1552495 https://bugzilla.redhat.com/show_bug.cgi?id=1552495
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
CVE-2018-6078 https://nvd.nist.gov/vuln/detail/CVE-2018-6078
RHSA-2018:0484 https://access.redhat.com/errata/RHSA-2018:0484
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6078.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6078
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6078
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.71058
EPSS Score 0.00699
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:58:40.726933+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2018-6078 37.0.0