9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
60.3%
Severity: High
Date : 2020-04-28
CVE-ID : CVE-2020-6461 CVE-2020-6462
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1143
The package chromium before version 81.0.4044.129-1 is vulnerable to
arbitrary code execution.
Upgrade to 81.0.4044.129-1.
The problems have been fixed upstream in version 81.0.4044.129.
None.
A use-after-free vulnerability has been found in the storage component
of the chromium browser before 81.0.4044.129.
A use-after-free vulnerability has been found in the task scheduling
component of the chromium browser before 81.0.4044.129.
A remote attacker might be able to execute arbitrary code on the
affected host.
https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.html
https://crbug.com/1072983
https://crbug.com/1064891
https://security.archlinux.org/CVE-2020-6461
https://security.archlinux.org/CVE-2020-6462
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
60.3%