语言:
https://security-tracker.debian.org/tracker/CVE-2019-19880
https://security-tracker.debian.org/tracker/CVE-2019-19923
https://security-tracker.debian.org/tracker/CVE-2019-19925
https://security-tracker.debian.org/tracker/CVE-2019-19926
https://security-tracker.debian.org/tracker/CVE-2020-6381
https://security-tracker.debian.org/tracker/CVE-2020-6382
https://security-tracker.debian.org/tracker/CVE-2020-6383
https://security-tracker.debian.org/tracker/CVE-2020-6384
https://security-tracker.debian.org/tracker/CVE-2020-6385
https://security-tracker.debian.org/tracker/CVE-2020-6386
https://security-tracker.debian.org/tracker/CVE-2020-6387
https://security-tracker.debian.org/tracker/CVE-2020-6388
https://security-tracker.debian.org/tracker/CVE-2020-6389
https://security-tracker.debian.org/tracker/CVE-2020-6390
https://security-tracker.debian.org/tracker/CVE-2020-6391
https://security-tracker.debian.org/tracker/CVE-2020-6392
https://security-tracker.debian.org/tracker/CVE-2020-6393
https://security-tracker.debian.org/tracker/CVE-2020-6394
https://security-tracker.debian.org/tracker/CVE-2020-6395
https://security-tracker.debian.org/tracker/CVE-2020-6396
https://security-tracker.debian.org/tracker/CVE-2020-6397
https://security-tracker.debian.org/tracker/CVE-2020-6398
https://security-tracker.debian.org/tracker/CVE-2020-6399
https://security-tracker.debian.org/tracker/CVE-2020-6400
https://security-tracker.debian.org/tracker/CVE-2020-6401
https://security-tracker.debian.org/tracker/CVE-2020-6402
https://security-tracker.debian.org/tracker/CVE-2020-6403
https://security-tracker.debian.org/tracker/CVE-2020-6404
https://security-tracker.debian.org/tracker/CVE-2020-6405
https://security-tracker.debian.org/tracker/CVE-2020-6406
https://security-tracker.debian.org/tracker/CVE-2020-6407
https://security-tracker.debian.org/tracker/CVE-2020-6408
https://security-tracker.debian.org/tracker/CVE-2020-6409
https://security-tracker.debian.org/tracker/CVE-2020-6410
https://security-tracker.debian.org/tracker/CVE-2020-6411
https://security-tracker.debian.org/tracker/CVE-2020-6412
https://security-tracker.debian.org/tracker/CVE-2020-6413
https://security-tracker.debian.org/tracker/CVE-2020-6414
https://security-tracker.debian.org/tracker/CVE-2020-6415
https://security-tracker.debian.org/tracker/CVE-2020-6416
https://security-tracker.debian.org/tracker/CVE-2020-6418
https://security-tracker.debian.org/tracker/CVE-2020-6420
https://security-tracker.debian.org/tracker/source-package/chromium
严重性: High
ID: 134433
文件名: debian_DSA-4638.nasl
版本: 1.9
类型: local
代理: unix
发布时间: 2020/3/12
最近更新时间: 2022/12/7
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
风险因素: Critical
分数: 9.5
风险因素: Medium
基本分数: 6.8
时间分数: 5.9
矢量: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 分数来源: CVE-2020-6420
风险因素: High
基本分数: 8.8
时间分数: 8.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:chromium, cpe:/o:debian:debian_linux:10.0
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2020/3/10
漏洞发布日期: 2019/12/18
CISA 已知可遭利用的漏洞到期日期: 2022/5/3
Metasploit (Google Chrome 80 JSCreate side-effect type confusion exploit)
CVE: CVE-2019-19880, CVE-2019-19923, CVE-2019-19925, CVE-2019-19926, CVE-2020-6381, CVE-2020-6382, CVE-2020-6383, CVE-2020-6384, CVE-2020-6385, CVE-2020-6386, CVE-2020-6387, CVE-2020-6388, CVE-2020-6389, CVE-2020-6390, CVE-2020-6391, CVE-2020-6392, CVE-2020-6393, CVE-2020-6394, CVE-2020-6395, CVE-2020-6396, CVE-2020-6397, CVE-2020-6398, CVE-2020-6399, CVE-2020-6400, CVE-2020-6401, CVE-2020-6402, CVE-2020-6403, CVE-2020-6404, CVE-2020-6405, CVE-2020-6406, CVE-2020-6407, CVE-2020-6408, CVE-2020-6409, CVE-2020-6410, CVE-2020-6411, CVE-2020-6412, CVE-2020-6413, CVE-2020-6414, CVE-2020-6415, CVE-2020-6416, CVE-2020-6418, CVE-2020-6420
DSA: 4638