Описание
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Base internals can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Blink can be exploited to bypass security restrictions.
- Use after free vulnerability in Web Share can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extenstions API can be exploited to cause denial of service or execute arbitrary code.
- Data leak vulnerability in Navigation can be exploited to obtain sensitive information.
- Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in DevTools can be exploited to cause denial of service.
- Security UI vulnerability in Autofill can be exploited to spoof user interface.
- Heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
- Use after free vulnerability in Permissions can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Sign-Incan be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Autofill can be exploited to cause denial of service or execute arbitrary code.
- Policy bypass vulnerability in Blink can be exploited to bypass security restrictions.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2021-30622 unknown
- CVE-2021-30624 unknown
- CVE-2021-30620 unknown
- CVE-2021-30621 unknown
- CVE-2021-30613 unknown
- CVE-2021-30607 unknown
- CVE-2021-30618 unknown
- CVE-2021-30609 unknown
- CVE-2021-30611 unknown
- CVE-2021-30610 unknown
- CVE-2021-30616 unknown
- CVE-2021-30606 unknown
- CVE-2021-30619 unknown
- CVE-2021-30608 unknown
- CVE-2021-30612 unknown
- CVE-2021-30615 unknown
- CVE-2021-30623 unknown
- CVE-2021-30617 unknown
- CVE-2021-30614 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!