CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
98.1%
Severity: High
Date : 2021-04-29
CVE-ID : CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21207
CVE-2021-21209 CVE-2021-21210 CVE-2021-21213 CVE-2021-21214
CVE-2021-21215 CVE-2021-21216 CVE-2021-21217 CVE-2021-21218
CVE-2021-21219 CVE-2021-21221 CVE-2021-21222 CVE-2021-21223
CVE-2021-21224 CVE-2021-21225 CVE-2021-21226
Package : opera
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1840
The package opera before version 76.0.4017.94-1 is vulnerable to
multiple issues including arbitrary code execution, information
disclosure, sandbox escape and content spoofing.
Upgrade to 76.0.4017.94-1.
The problems have been fixed upstream in version 76.0.4017.94.
None.
Use after free in permissions in Google Chrome prior to 90.0.4430.72
allowed a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
Use after free in extensions in Google Chrome prior to 90.0.4430.72
allowed an attacker who convinced a user to install a malicious
extension to potentially perform a sandbox escape via a crafted Chrome
Extension.
Use after free in Blink in Google Chrome prior to 90.0.4430.72 allowed
a remote attacker to potentially exploit heap corruption via a crafted
HTML page.
Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72
allowed an attacker who convinced a user to install a malicious
extension to potentially perform a sandbox escape via a crafted Chrome
Extension.
Inappropriate implementation in storage in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to leak cross-origin data via a
crafted HTML page.
Inappropriate implementation in Network in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to potentially access local UDP
ports via a crafted HTML page.
Use after free in WebMIDI in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to potentially exploit heap corruption via a
crafted HTML page.
Use after free in Network API in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to potentially exploit heap corruption via a
crafted Chrome Extension.
Inappropriate implementation in Autofill in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to spoof security UI via a
crafted HTML page.
Inappropriate implementation in Autofill in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to spoof security UI via a
crafted HTML page.
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
Insufficient validation of untrusted input in Mojo in Google Chrome
prior to 90.0.4430.72 allowed a remote attacker who had compromised the
renderer process to leak cross-origin data via a crafted HTML page.
Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
bypass site isolation via a crafted HTML page.
Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed
a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a
remote attacker to execute arbitrary code inside a sandbox via a
crafted HTML page. Google is aware of reports that exploits for this
issue exist in the wild.
Out of bounds memory access in V8 in Google Chrome prior to
90.0.4430.85 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.
Use after free in navigation in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
An attacker is able to break out of the sandbox, execute arbitrary
code, spoof content, read sensitive data, and bypass extension security
policies through various means.
https://blogs.opera.com/desktop/changelog-for-75/
https://blogs.opera.com/desktop/changelog-for-76/
https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html
https://crbug.com/1025683
https://crbug.com/1188889
https://crbug.com/1192054
https://crbug.com/1185732
https://crbug.com/1143526
https://crbug.com/1184562
https://crbug.com/1161806
https://crbug.com/1170148
https://crbug.com/1172533
https://crbug.com/1173297
https://crbug.com/1166462
https://crbug.com/1166478
https://crbug.com/1166972
https://crbug.com/1195333
https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html
https://crbug.com/1194046
https://crbug.com/1195308
https://crbug.com/1195777
https://crbug.com/1195977
https://crbug.com/1197904
https://security.archlinux.org/CVE-2021-21201
https://security.archlinux.org/CVE-2021-21202
https://security.archlinux.org/CVE-2021-21203
https://security.archlinux.org/CVE-2021-21207
https://security.archlinux.org/CVE-2021-21209
https://security.archlinux.org/CVE-2021-21210
https://security.archlinux.org/CVE-2021-21213
https://security.archlinux.org/CVE-2021-21214
https://security.archlinux.org/CVE-2021-21215
https://security.archlinux.org/CVE-2021-21216
https://security.archlinux.org/CVE-2021-21217
https://security.archlinux.org/CVE-2021-21218
https://security.archlinux.org/CVE-2021-21219
https://security.archlinux.org/CVE-2021-21221
https://security.archlinux.org/CVE-2021-21222
https://security.archlinux.org/CVE-2021-21223
https://security.archlinux.org/CVE-2021-21224
https://security.archlinux.org/CVE-2021-21225
https://security.archlinux.org/CVE-2021-21226
blogs.opera.com/desktop/changelog-for-75/
blogs.opera.com/desktop/changelog-for-76/
chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html
chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html
crbug.com/1025683
crbug.com/1143526
crbug.com/1161806
crbug.com/1166462
crbug.com/1166478
crbug.com/1166972
crbug.com/1170148
crbug.com/1172533
crbug.com/1173297
crbug.com/1184562
crbug.com/1185732
crbug.com/1188889
crbug.com/1192054
crbug.com/1194046
crbug.com/1195308
crbug.com/1195333
crbug.com/1195777
crbug.com/1195977
crbug.com/1197904
security.archlinux.org/AVG-1840
security.archlinux.org/CVE-2021-21201
security.archlinux.org/CVE-2021-21202
security.archlinux.org/CVE-2021-21203
security.archlinux.org/CVE-2021-21207
security.archlinux.org/CVE-2021-21209
security.archlinux.org/CVE-2021-21210
security.archlinux.org/CVE-2021-21213
security.archlinux.org/CVE-2021-21214
security.archlinux.org/CVE-2021-21215
security.archlinux.org/CVE-2021-21216
security.archlinux.org/CVE-2021-21217
security.archlinux.org/CVE-2021-21218
security.archlinux.org/CVE-2021-21219
security.archlinux.org/CVE-2021-21221
security.archlinux.org/CVE-2021-21222
security.archlinux.org/CVE-2021-21223
security.archlinux.org/CVE-2021-21224
security.archlinux.org/CVE-2021-21225
security.archlinux.org/CVE-2021-21226
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
98.1%