Описание
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in permissions can be exploited to spoof user interface.
- Policy enforcement vulnerability in intent handling component can be exploited to bypass security restrictions and gain privileges.
- Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
- Out of bounds read vulnerability in storage component can be exploited to cause denial of service.
- Security UI vulnerability in Omnibox can be exploited to spoof user interface.
- Policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions and gain privileges.
- Data validation vulnerability in media component can be exploited to security bypass restrictions.
- Use after free vulnerability in presentation API can be exploited to execute arbitrary code or cause denial of service.
- Out of bounds write vulnerability in V8 can be exploited to cause denial of service.
- Policy enforcement vulnerability in Blink can be exploited to bypass security restrictions and gain privileges.
- Implementation vulnerability in Content Security Policy can be exploited to bypass security restrictions.
- Policy enforcement vulnerability in iOS can be exploited to bypass security restrictions.
- Policy enforcement in media component can be exploited to bypass security restrictions and gain privileges.
- Validation of untrusted input vulnerability in command line handling can be exploited to bypass security restrictions.
- Policy enforcement vulnerability in serial component can be exploited to bypass security restrictions.
- Side-channel information leakage vulnerability in WebRTC can be exploited to obtain sensitive information.
- Integer overflow vulnerability in WebUSB can be exploited to cause denial of service.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2020-6561 high
- CVE-2020-6559 critical
- CVE-2020-6566 high
- CVE-2020-6558 high
- CVE-2020-6562 high
- CVE-2020-6560 high
- CVE-2020-6565 high
- CVE-2020-6564 high
- CVE-2020-6563 high
- CVE-2020-6570 warning
- CVE-2020-6571 warning
- CVE-2020-6569 high
- CVE-2020-6568 high
- CVE-2020-6567 high
- CVE-2020-15961 critical
- CVE-2020-15960 critical
- CVE-2020-15962 critical
- CVE-2020-15965 critical
- CVE-2020-15964 critical
- CVE-2020-15966 warning
- CVE-2020-15963 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!