2024-05-25 21:48:12 +02:00
|
|
|
### [CVE-2020-6418](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418)
|
|
|
|

|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
### Description
|
|
|
|
|
|
|
|
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
|
|
|
|
|
|
|
### POC
|
|
|
|
|
|
|
|
#### Reference
|
|
|
|
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
|
2024-06-09 00:33:16 +00:00
|
|
|
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
|
2024-05-25 21:48:12 +02:00
|
|
|
|
|
|
|
#### Github
|
|
|
|
- https://github.com/0x2l/0x2l_v8_exp
|
|
|
|
- https://github.com/0xT11/CVE-POC
|
|
|
|
- https://github.com/7o8v/Browser
|
|
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
|
|
- https://github.com/ChoKyuWon/CVE-2020-6418
|
|
|
|
- https://github.com/DarkFunct/CVE_Exploits
|
|
|
|
- https://github.com/Goyotan/CVE-2020-6418-PoC
|
|
|
|
- https://github.com/Ostorlab/KEV
|
|
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
|
|
- https://github.com/SivaPriyaRanganatha/CVE-2020-6418
|
|
|
|
- https://github.com/anvbis/chrome_v8_ndays
|
|
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
|
|
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
|
|
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
|
|
- https://github.com/hwiwonl/dayone
|
|
|
|
- https://github.com/lnick2023/nicenice
|
|
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
|
|
- https://github.com/rycbar77/V8Exploits
|
|
|
|
- https://github.com/soosmile/POC
|
|
|
|
- https://github.com/sploitem/v8-writeups
|
|
|
|
- https://github.com/star-sg/CVE
|
|
|
|
- https://github.com/tianstcht/v8-exploit
|
|
|
|
- https://github.com/trhacknon/CVE2
|
|
|
|
- https://github.com/ulexec/ChromeSHELFLoader
|
|
|
|
- https://github.com/ulexec/Exploits
|
|
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|
|
|