Description
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, bypass security restrictions, perform cross-site scripting attack, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Memory access vulnerability in WebRTC component can be exploited remotely via special crafted webpage to potentially cause to denial of service.
- Text entry mode vulnerability in Views component can be exploited locally to potentially obtain sensitive information.
- Memory vulnerability in WebRTC component can be exploited remotely to potentially sensitive information.
- Mutability protection vulnerability in WebAssembly component can be exploited remotely via special crafted webpage to potentially cause denial of service.
- Policy vulnerability in WebUSB component can be exploited to bypass origin policy.
- uXSS vulnerability in WebKit component on iOS can be exploited remotely via special crafted webpage to perform domain spoofing.
- Use after free vulnerability in IndexDB component can be exploited remotely to potentially execute arbitrary code.
- Memory access vulnerability in WebRTC component can be exploited remotely via special crafted webpage to potentially cause denial of service.
- Memory access vulnerability in PDFium component can be exploited remotely to cause denial of service.
- Memory access vulnerability in V8 component can be exploited remotely via special crafted webpage to cause denial of service.
- URL spoof vulnerability in Omnibox component can be exploited remotely to perform domain spoofing.
- Memory access vulnerability in V8 component can be explooited remotely to cause denial of service.
- Heap buffer overflow vulnerability in Skia component can be exploited remotely via special crafted webpage to cause denial of service.
- Security bypass vulnerability in the debugger extension API in DevTools can be exploited to execute arbitrary code and bypass security restrictions.
- UI spoofing vulnerability in Blink component can be exploited remotely via special crafted webpage to perform domain spoofing.
- Type confusion vulnerability in Blink component can be exploited remotely via special crafted webpage to potentially cause denial of service.
- Information leak vulnerability in Blink component can be exploited remotely via special crafted webpage to obtain sensitive information and bypass security restrictions.
- Data validation vulnerability in Blink component can be exploited remotely via special crafted webpage to bypass same origin policy.
- Policy enforcement vulnerability in Extensions API component can be exploited remotely to bypass security restrictions.
- Use after free vulnerability in Blink component can be exploited remote;lly via special crafted webpage to cause denial of service.
- Security bypass in the debugger extension API component can be exploited to execute arbitrary code and bypass security restrictions.
- Information leak vulnerability in Blink component can be exploited remotely via special crafted webpage to obtain sensitive information and perform domain spoofing.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2018-6123 high
- CVE-2018-6124 critical
- CVE-2018-6125 high
- CVE-2018-6126 critical
- CVE-2018-6127 critical
- CVE-2018-6128 high
- CVE-2018-6129 high
- CVE-2018-6130 high
- CVE-2018-6131 critical
- CVE-2018-6132 warning
- CVE-2018-6133 high
- CVE-2018-6134 high
- CVE-2018-6135 high
- CVE-2018-6136 high
- CVE-2018-6137 high
- CVE-2018-6138 critical
- CVE-2018-6139 critical
- CVE-2018-6140 critical
- CVE-2018-6141 critical
- CVE-2018-6142 high
- CVE-2018-6143 high
- CVE-2018-6144 critical
- CVE-2018-6145 high
- CVE-2018-6147 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!