ALT-BU-2020-4086-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-05623
Уязвимость компонента Networking веб-браузера Google Chrome, позволяющая нарушителю осуществить подмену домена
BDU:2020-05624
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05625
Уязвимость компонента Networking веб-браузера Google Chrome, позволяющая нарушителю повысить свои привилегии
BDU:2021-01458
Уязвимость хранилища браузера Google Chrome, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01476
Уязвимость компонента autofill браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01477
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01478
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01485
Уязвимость компонента audio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01486
Уязвимость реализации технологии WebRTC программных средств Google Chrome, Firefox, Firefox-ESR и Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01487
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01488
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01489
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01490
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01491
Уязвимость компонента networking браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01516
Уязвимость менеджера паролей браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01517
Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01518
Уязвимость компонента cache браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01519
Уязвимость программы 3D рендера SwiftShader браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01520
Уязвимость расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01521
Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01522
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01523
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01524
Уязвимость компонента SerialPort браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01704
Уязвимость функции OffscreenCanvas браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01755
Уязвимость библиотеки передачи сообщений Mojo браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-06059
Уязвимость компонента video браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-06061
Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2021-06062
Уязвимость компонента NFC браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-06064
Уязвимость компонента Payments браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2021-06065
Уязвимость реализации диалоговых окон браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06066
Уязвимость API для доступа к устройствам виртуальной реальности WebVR браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2021-06067
Уязвимость компонента Audio браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06068
Уязвимость функции Downloads веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06071
Уязвимость компонента Media браузера Google Chrome, вызванная целочисленным переполнением, позволяющая нарушителю вызвать переполнение буфера с помощью специально созданной HTML страницы
BDU:2021-06072
Уязвимость функции Intents браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2021-06073
Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения
BDU:2021-06076
Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданного URL
BDU:2021-06077
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-11-21
CVE-2020-15959
Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1122684
- https://crbug.com/1122684
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15960
Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1100136
- https://crbug.com/1100136
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15961
Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1114636
- https://crbug.com/1114636
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15962
Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1121836
- https://crbug.com/1121836
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15963
Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1113558
- https://crbug.com/1113558
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15964
Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1121414
- https://crbug.com/1121414
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15965
Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1126249
- https://crbug.com/1126249
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15966
Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1113565
- https://crbug.com/1113565
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15967
Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127322
- https://crbug.com/1127322
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15968
Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1126424
- https://crbug.com/1126424
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15969
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1124659
- https://crbug.com/1124659
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212011
- https://support.apple.com/kb/HT212011
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15970
Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1108299
- https://crbug.com/1108299
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15971
Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1114062
- https://crbug.com/1114062
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15972
Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1115901
- https://crbug.com/1115901
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15973
Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1106890
- https://crbug.com/1106890
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15974
Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1104103
- https://crbug.com/1104103
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15975
Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1110800
- https://crbug.com/1110800
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15976
Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1123522
- https://crbug.com/1123522
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15977
Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1097724
- https://crbug.com/1097724
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15978
Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1116280
- https://crbug.com/1116280
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15979
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127319
- https://crbug.com/1127319
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15980
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092453
- https://crbug.com/1092453
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15981
Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1123023
- https://crbug.com/1123023
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15982
Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1039882
- https://crbug.com/1039882
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15983
Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1076786
- https://crbug.com/1076786
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15984
Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1080395
- https://crbug.com/1080395
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15985
Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1099276
- https://crbug.com/1099276
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15986
Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1100247
- https://crbug.com/1100247
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15987
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127774
- https://crbug.com/1127774
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15988
Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092518
- https://crbug.com/1092518
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15989
Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1108351
- https://crbug.com/1108351
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15990
Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1133671
- https://crbug.com/1133671
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15991
Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1133688
- https://crbug.com/1133688
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15992
Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1110195
- https://crbug.com/1110195
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6557
Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1083278
- https://crbug.com/1083278
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6573
Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1116304
- https://crbug.com/1116304
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6575
Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1081874
- https://crbug.com/1081874
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6576
Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1111737
- https://crbug.com/1111737
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Package matrix-synapse updated to version 1.21.0-alt1 for branch sisyphus in task 259805.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-26891
AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /_matrix/client/r0/auth/*/fallback/web or /_matrix/client/unstable/auth/*/fallback/web Synapse endpoints.
- https://github.com/matrix-org/synapse/pull/8444
- https://github.com/matrix-org/synapse/pull/8444
- https://github.com/matrix-org/synapse/releases/tag/v1.21.2
- https://github.com/matrix-org/synapse/releases/tag/v1.21.2
- https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq
- https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq
- https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory
- https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory
Package phpMyAdmin updated to version 5.0.3-alt1 for branch sisyphus in task 259829.
Closed vulnerabilities
BDU:2021-01804
Уязвимость функции «Export» веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю выполнить произвольный код
BDU:2021-01859
Уязвимость реализации класса SearchController веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01860
Уязвимость реализации функции преобразования веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2020-11441
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
Modified: 2024-11-21
CVE-2020-22278
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents.
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
Modified: 2024-11-21
CVE-2020-26934
phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.
- openSUSE-SU-2020:1675
- openSUSE-SU-2020:1675
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:1806
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- FEDORA-2020-43d8624421
- FEDORA-2020-43d8624421
- FEDORA-2020-eadda524a8
- FEDORA-2020-eadda524a8
- FEDORA-2020-4e78c86902
- FEDORA-2020-4e78c86902
- GLSA-202101-35
- GLSA-202101-35
- https://www.phpmyadmin.net/security/PMASA-2020-5/
- https://www.phpmyadmin.net/security/PMASA-2020-5/
Modified: 2024-11-21
CVE-2020-26935
An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
- openSUSE-SU-2020:1675
- openSUSE-SU-2020:1675
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:1806
- https://advisory.checkmarx.net/advisory/CX-2020-4281
- https://advisory.checkmarx.net/advisory/CX-2020-4281
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- FEDORA-2020-43d8624421
- FEDORA-2020-43d8624421
- FEDORA-2020-eadda524a8
- FEDORA-2020-eadda524a8
- FEDORA-2020-4e78c86902
- FEDORA-2020-4e78c86902
- GLSA-202101-35
- GLSA-202101-35
- https://www.phpmyadmin.net/security/PMASA-2020-6/
- https://www.phpmyadmin.net/security/PMASA-2020-6/