The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Opera Web browser

V8: buffer overflow
An attacker can generate a buffer overflow of V8, in order to trigger a denial of service, and possibly to run code...
CVE-2017-15406, DSA-4020-1, FEDORA-2018-faff5f661e, openSUSE-SU-2017:2902-1, openSUSE-SU-2017:3245-1, RHSA-2017:3082-01, VIGILANCE-VUL-27100
V8: memory corruption
An attacker can generate a memory corruption of V8, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-282, CVE-2018-6149, DSA-4237-1, FEDORA-2018-499f2dbc96, openSUSE-SU-2018:2054-1, openSUSE-SU-2018:2055-1, RHSA-2018:1933-01, VIGILANCE-VUL-26413
Google Chrome: privilege escalation via CSP Header
An attacker can bypass restrictions via CSP Header of Google Chrome, in order to escalate his privileges...
CERTFR-2018-AVI-272, CVE-2018-6148, DSA-4237-1, FEDORA-2018-09b59b0227, FEDORA-2018-7c80aaef26, openSUSE-SU-2018:1859-1, openSUSE-SU-2018:2054-1, openSUSE-SU-2018:2055-1, RHSA-2018:1825-01, VIGILANCE-VUL-26337
Skia: buffer overflow via SVG Rasterizing
An attacker can generate a buffer overflow via SVG Rasterizing of Skia, in order to trigger a denial of service, and possibly to run code...
bulletinjul2018, CERTFR-2018-AVI-271, CVE-2018-6126, DSA-4220-1, DSA-4237-1, FEDORA-2018-09b59b0227, FEDORA-2018-7c80aaef26, FEDORA-2019-7f7489dc8c, MFSA-2018-14, openSUSE-SU-2018:1616-1, openSUSE-SU-2018:2054-1, openSUSE-SU-2018:2055-1, RHSA-2018:1815-01, RHSA-2018:2112-01, RHSA-2018:2113-01, SSA:2018-157-01, SSA:2019-247-01, SUSE-SU-2018:1783-1, SUSE-SU-2018:1820-1, SUSE-SU-2018:2298-1, USN-3682-1, VIGILANCE-VUL-26331
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
CERTFR-2018-AVI-261, CVE-2018-6123, CVE-2018-6124, CVE-2018-6125, CVE-2018-6127, CVE-2018-6128, CVE-2018-6129, CVE-2018-6130, CVE-2018-6131, CVE-2018-6132, CVE-2018-6133, CVE-2018-6134, CVE-2018-6135, CVE-2018-6136, CVE-2018-6137, CVE-2018-6138, CVE-2018-6139, CVE-2018-6140, CVE-2018-6141, CVE-2018-6142, CVE-2018-6143, CVE-2018-6144, CVE-2018-6145, CVE-2018-6147, DSA-4237-1, FEDORA-2018-09b59b0227, FEDORA-2018-7c80aaef26, openSUSE-SU-2018:1484-1, openSUSE-SU-2018:1485-1, openSUSE-SU-2018:2054-1, openSUSE-SU-2018:2055-1, RHSA-2018:1815-01, VIGILANCE-VUL-26263
Google Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
CERTFR-2018-AVI-231, CVE-2018-6120, CVE-2018-6121, CVE-2018-6122, DSA-4237-1, FEDORA-2018-812b5d5a71, FEDORA-2018-94e1bc8c23, openSUSE-SU-2018:1275-1, openSUSE-SU-2018:1437-1, RHSA-2018:1446-01, VIGILANCE-VUL-26113
Chrome: use after free via Media Cache
An attacker can force the usage of a freed memory area via Media Cache of Chrome, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-209, CVE-2018-6118, DSA-4237-1, openSUSE-SU-2018:1104-1, openSUSE-SU-2018:1175-1, openSUSE-SU-2018:1437-1, RHSA-2018:1321-01, VIGILANCE-VUL-26012
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
1546, CERTFR-2018-AVI-186, CVE-2018-6084, CVE-2018-6085, CVE-2018-6086, CVE-2018-6087, CVE-2018-6088, CVE-2018-6089, CVE-2018-6090, CVE-2018-6091, CVE-2018-6092, CVE-2018-6093, CVE-2018-6094, CVE-2018-6095, CVE-2018-6096, CVE-2018-6097, CVE-2018-6098, CVE-2018-6099, CVE-2018-6100, CVE-2018-6101, CVE-2018-6102, CVE-2018-6103, CVE-2018-6104, CVE-2018-6105, CVE-2018-6106, CVE-2018-6107, CVE-2018-6108, CVE-2018-6109, CVE-2018-6110, CVE-2018-6111, CVE-2018-6112, CVE-2018-6113, CVE-2018-6114, CVE-2018-6115, CVE-2018-6116, CVE-2018-6117, DSA-4182-1, openSUSE-SU-2018:1042-1, openSUSE-SU-2018:1175-1, openSUSE-SU-2018:1437-1, RHSA-2018:1195-01, VIGILANCE-VUL-25910
ICU: integer overflow
An attacker can generate an integer overflow of ICU, in order to trigger a denial of service, and possibly to run code...
CVE-2017-15422, DSA-4150-1, FEDORA-2018-1a85045c79, FEDORA-2018-faff5f661e, openSUSE-SU-2018:1422-1, SUSE-SU-2018:1401-1, SUSE-SU-2018:1602-1, USN-3610-1, VIGILANCE-VUL-25644
Chrome: memory corruption
An attacker can generate a memory corruption of Chrome, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-141, openSUSE-SU-2018:0773-1, VIGILANCE-VUL-25615
Our database contains other pages. You can request a free trial to read them.

Display information about Opera Web browser: