Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
05 Feb 2025, 14:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 9.6 |
First Time |
Netapp
Netapp ontap Select Deploy Administration Utility |
|
CPE | cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* | |
References | () https://security.netapp.com/advisory/ntap-20240812-0001/ - Third Party Advisory |
04 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 |
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html - Broken Link, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2020/Nov/33 - Mailing List, Not Applicable, Third Party Advisory | |
References | () https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html - Third Party Advisory | |
References | () https://crbug.com/1139963 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/ - Release Notes | |
References | () https://security.gentoo.org/glsa/202011-12 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202012-04 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202401-19 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4824 - Mailing List, Third Party Advisory |
25 Jul 2024, 17:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html - Broken Link, Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/ - Release Notes | |
References | () https://security.gentoo.org/glsa/202401-19 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4824 - Mailing List, Third Party Advisory |
15 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
28 Jan 2022, 17:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* | |
References | (MISC) https://crbug.com/1139963 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2020-11-03 03:15
Updated : 2025-02-05 14:37
NVD link : CVE-2020-15999
Mitre link : CVE-2020-15999
CVE.ORG link : CVE-2020-15999
JSON object : View
Products Affected
- chrome
opensuse
- backports_sle
fedoraproject
- fedora
netapp
- ontap_select_deploy_administration_utility
freetype
- freetype
debian
- debian_linux