{"id":"CVE-2020-6496","details":"Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.","modified":"2026-03-15T22:36:23.586725Z","published":"2020-06-03T23:15:11.997Z","related":["openSUSE-SU-2020:0823-1","openSUSE-SU-2020:0832-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202006-02"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4714"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html"},{"type":"REPORT","url":"https://crbug.com/1085990"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6496.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"83.0.4103.97"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}