Kaspersky ID:
KLA40222
Дата обнаружения:
22/02/2023
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  2. Implementation vulnerability in Full screen mode can be exploited to cause denial of service.
  3. Use after free vulnerability in GPU can be exploited to cause denial of service or execute arbitrary code.
  4. Out of bounds read vulnerability in WebRTC can be exploited to cause denial of service.
  5. Type confusion vulnerability in DevTools can be exploited to cause denial of service.
  6. Type confusion vulnerability in Data Transfer can be exploited to cause denial of service.
  7. Implementation vulnerability in Download can be exploited to cause denial of service.
  8. Integer overflow vulnerability in Core can be exploited to cause execute arbitrary code and denial of service.
  9. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  10. Heap buffer overflow vulnerability in WebUI can be exploited to cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2023-0697
    high
  • CVE-2023-0705
    critical
  • CVE-2023-0696
    critical
  • CVE-2023-0702
    critical
  • CVE-2023-0700
    high
  • CVE-2023-0698
    critical
  • CVE-2023-0701
    critical
  • CVE-2023-0703
    critical
  • CVE-2023-0704
    high
  • CVE-2023-0699
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.