Kaspersky ID:
KLA11967
Erkennungsdatum:
09/29/2020
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in permissions can be exploited to spoof user interface.
  2. Policy enforcement vulnerability in intent handling component can be exploited to bypass security restrictions and gain privileges.
  3. Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  4. Out of bounds read vulnerability in storage component can be exploited to cause denial of service.
  5. Security UI vulnerability in Omnibox can be exploited to spoof user interface.
  6. Policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions and gain privileges.
  7. Data validation vulnerability in media component can be exploited to security bypass restrictions.
  8. Use after free vulnerability in presentation API can be exploited to execute arbitrary code or cause denial of service.
  9. Out of bounds write vulnerability in V8 can be exploited to cause denial of service.
  10. Policy enforcement vulnerability in Blink can be exploited to bypass security restrictions and gain privileges.
  11. Implementation vulnerability in Content Security Policy can be exploited to bypass security restrictions.
  12. Policy enforcement vulnerability in iOS can be exploited to bypass security restrictions.
  13. Policy enforcement in media component can be exploited to bypass security restrictions and gain privileges.
  14. Validation of untrusted input vulnerability in command line handling can be exploited to bypass security restrictions.
  15. Policy enforcement vulnerability in serial component can be exploited to bypass security restrictions.
  16. Side-channel information leakage vulnerability in WebRTC can be exploited to obtain sensitive information.
  17. Integer overflow vulnerability in WebUSB can be exploited to cause denial of service.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2020-6561
    high
  • CVE-2020-6559
    critical
  • CVE-2020-6566
    high
  • CVE-2020-6558
    high
  • CVE-2020-6562
    high
  • CVE-2020-6560
    high
  • CVE-2020-6565
    high
  • CVE-2020-6564
    high
  • CVE-2020-6563
    high
  • CVE-2020-6570
    warning
  • CVE-2020-6571
    warning
  • CVE-2020-6569
    high
  • CVE-2020-6568
    high
  • CVE-2020-6567
    high
  • CVE-2020-15961
    critical
  • CVE-2020-15960
    critical
  • CVE-2020-15962
    critical
  • CVE-2020-15965
    critical
  • CVE-2020-15964
    critical
  • CVE-2020-15966
    warning
  • CVE-2020-15963
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.