Kaspersky ID:
KLA12467
Дата обнаружения:
24/02/2022
Обновлено:
28/01/2026

Описание

Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Heap buffer overflow vulnerability in Tab Groups can be exploited to cause denial of service.
  2. Use after free vulnerability in GPU can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Animation can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Webstore API can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Gamepad API can be exploited to bypass security restrictions.
  7. Integer overflow vulnerability in Mojo can be exploited to cause denial of service.
  8. Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-0603
    critical
  • CVE-2022-0605
    critical
  • CVE-2022-0608
    critical
  • CVE-2022-0604
    critical
  • CVE-2022-0606
    critical
  • CVE-2022-0610
    critical
  • CVE-2022-0607
    critical
  • CVE-2022-0609
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Do you want to save your changes?
Your message has been sent successfully.