cve/2020/CVE-2020-6418.md

46 lines
1.9 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-6418](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418)
![](https://img.shields.io/static/v1?label=Product&message=Chrome&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2080.0.3987.122%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Type%20confusion&color=brighgreen)
### Description
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### POC
#### Reference
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/0x2l/0x2l_v8_exp
- https://github.com/0xT11/CVE-POC
- https://github.com/7o8v/Browser
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ChoKyuWon/CVE-2020-6418
- https://github.com/DarkFunct/CVE_Exploits
- https://github.com/Goyotan/CVE-2020-6418-PoC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SivaPriyaRanganatha/CVE-2020-6418
- https://github.com/anvbis/chrome_v8_ndays
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hwiwonl/dayone
- https://github.com/lnick2023/nicenice
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rycbar77/V8Exploits
- https://github.com/soosmile/POC
- https://github.com/sploitem/v8-writeups
- https://github.com/star-sg/CVE
- https://github.com/tianstcht/v8-exploit
- https://github.com/trhacknon/CVE2
- https://github.com/ulexec/ChromeSHELFLoader
- https://github.com/ulexec/Exploits
- https://github.com/xbl3/awesome-cve-poc_qazbnm456