Popis
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Base internals can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Blink can be exploited to bypass security restrictions.
- Use after free vulnerability in Web Share can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extenstions API can be exploited to cause denial of service or execute arbitrary code.
- Data leak vulnerability in Navigation can be exploited to obtain sensitive information.
- Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in DevTools can be exploited to cause denial of service.
- Security UI vulnerability in Autofill can be exploited to spoof user interface.
- Heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
- Use after free vulnerability in Permissions can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Sign-Incan be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Autofill can be exploited to cause denial of service or execute arbitrary code.
- Policy bypass vulnerability in Blink can be exploited to bypass security restrictions.
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Související produkty
seznam CVE
- CVE-2021-30622 critical
- CVE-2021-30624 critical
- CVE-2021-30620 critical
- CVE-2021-30621 high
- CVE-2021-30613 critical
- CVE-2021-30607 critical
- CVE-2021-30618 critical
- CVE-2021-30609 critical
- CVE-2021-30611 critical
- CVE-2021-30610 critical
- CVE-2021-30616 critical
- CVE-2021-30606 critical
- CVE-2021-30619 high
- CVE-2021-30608 critical
- CVE-2021-30612 critical
- CVE-2021-30615 high
- CVE-2021-30623 critical
- CVE-2021-30617 high
- CVE-2021-30614 critical
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!