Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2020-15999 is a critical severity vulnerability with a CVSS score of 9.6. Exploits are available; patches have been released and should be applied urgently. This is classified as a zero-day vulnerability.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
A memory corruption bug(Heap overflow) in the FreeType font rendering library.
This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .
As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.
Upgrade to 85.3.130 or higher
To review the CEF/Chromium patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
| Vendor | Product |
|---|---|
| Opensuse | Backports Sle |
| Debian | Debian Linux |
| Chrome | |
| Fedoraproject | Fedora |
| Freetype | Freetype |
| Netapp | Ontap Select Deploy Administration Utility |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.