語系:
https://security-tracker.debian.org/tracker/CVE-2019-19880
https://security-tracker.debian.org/tracker/CVE-2019-19923
https://security-tracker.debian.org/tracker/CVE-2019-19925
https://security-tracker.debian.org/tracker/CVE-2019-19926
https://security-tracker.debian.org/tracker/CVE-2020-6381
https://security-tracker.debian.org/tracker/CVE-2020-6382
https://security-tracker.debian.org/tracker/CVE-2020-6383
https://security-tracker.debian.org/tracker/CVE-2020-6384
https://security-tracker.debian.org/tracker/CVE-2020-6385
https://security-tracker.debian.org/tracker/CVE-2020-6386
https://security-tracker.debian.org/tracker/CVE-2020-6387
https://security-tracker.debian.org/tracker/CVE-2020-6388
https://security-tracker.debian.org/tracker/CVE-2020-6389
https://security-tracker.debian.org/tracker/CVE-2020-6390
https://security-tracker.debian.org/tracker/CVE-2020-6391
https://security-tracker.debian.org/tracker/CVE-2020-6392
https://security-tracker.debian.org/tracker/CVE-2020-6393
https://security-tracker.debian.org/tracker/CVE-2020-6394
https://security-tracker.debian.org/tracker/CVE-2020-6395
https://security-tracker.debian.org/tracker/CVE-2020-6396
https://security-tracker.debian.org/tracker/CVE-2020-6397
https://security-tracker.debian.org/tracker/CVE-2020-6398
https://security-tracker.debian.org/tracker/CVE-2020-6399
https://security-tracker.debian.org/tracker/CVE-2020-6400
https://security-tracker.debian.org/tracker/CVE-2020-6401
https://security-tracker.debian.org/tracker/CVE-2020-6402
https://security-tracker.debian.org/tracker/CVE-2020-6403
https://security-tracker.debian.org/tracker/CVE-2020-6404
https://security-tracker.debian.org/tracker/CVE-2020-6405
https://security-tracker.debian.org/tracker/CVE-2020-6406
https://security-tracker.debian.org/tracker/CVE-2020-6407
https://security-tracker.debian.org/tracker/CVE-2020-6408
https://security-tracker.debian.org/tracker/CVE-2020-6409
https://security-tracker.debian.org/tracker/CVE-2020-6410
https://security-tracker.debian.org/tracker/CVE-2020-6411
https://security-tracker.debian.org/tracker/CVE-2020-6412
https://security-tracker.debian.org/tracker/CVE-2020-6413
https://security-tracker.debian.org/tracker/CVE-2020-6414
https://security-tracker.debian.org/tracker/CVE-2020-6415
https://security-tracker.debian.org/tracker/CVE-2020-6416
https://security-tracker.debian.org/tracker/CVE-2020-6418
https://security-tracker.debian.org/tracker/CVE-2020-6420
https://security-tracker.debian.org/tracker/source-package/chromium
嚴重性: High
ID: 134433
檔案名稱: debian_DSA-4638.nasl
版本: 1.9
類型: local
代理程式: unix
已發布: 2020/3/12
已更新: 2022/12/7
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
風險因素: Critical
分數: 9.5
風險因素: Medium
基本分數: 6.8
時間分數: 5.9
媒介: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 評分資料來源: CVE-2020-6420
風險因素: High
基本分數: 8.8
時間分數: 8.4
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:chromium, cpe:/o:debian:debian_linux:10.0
必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2020/3/10
弱點發布日期: 2019/12/18
CISA 已知遭惡意利用弱點到期日: 2022/5/3
Metasploit (Google Chrome 80 JSCreate side-effect type confusion exploit)
CVE: CVE-2019-19880, CVE-2019-19923, CVE-2019-19925, CVE-2019-19926, CVE-2020-6381, CVE-2020-6382, CVE-2020-6383, CVE-2020-6384, CVE-2020-6385, CVE-2020-6386, CVE-2020-6387, CVE-2020-6388, CVE-2020-6389, CVE-2020-6390, CVE-2020-6391, CVE-2020-6392, CVE-2020-6393, CVE-2020-6394, CVE-2020-6395, CVE-2020-6396, CVE-2020-6397, CVE-2020-6398, CVE-2020-6399, CVE-2020-6400, CVE-2020-6401, CVE-2020-6402, CVE-2020-6403, CVE-2020-6404, CVE-2020-6405, CVE-2020-6406, CVE-2020-6407, CVE-2020-6408, CVE-2020-6409, CVE-2020-6410, CVE-2020-6411, CVE-2020-6412, CVE-2020-6413, CVE-2020-6414, CVE-2020-6415, CVE-2020-6416, CVE-2020-6418, CVE-2020-6420
DSA: 4638