8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.194 Low
EPSS
Percentile
96.2%
02/14/2020
High
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Opera earlier than 67.0.3575.23
Update to the latest version
Download Opera
Changelog for Opera 67
Stable Channel Update for Desktop
ACE
CVE-2020-64096.8High
CVE-2020-63934.3Warning
CVE-2020-64066.8High
CVE-2020-64026.8High
CVE-2020-64014.3Warning
CVE-2020-63906.8High
CVE-2020-64136.8High
CVE-2019-199235.0Warning
CVE-2020-63994.3Warning
CVE-2020-63896.8High
CVE-2020-64084.3Warning
CVE-2020-64054.3Warning
CVE-2020-64146.8High
CVE-2020-64174.6Warning
CVE-2020-63945.8High
CVE-2020-63826.8High
CVE-2020-64166.8High
CVE-2020-63876.8High
CVE-2020-63856.8High
CVE-2020-63886.8High
CVE-2020-63964.3Warning
CVE-2020-63924.3Warning
CVE-2019-181975.1High
CVE-2020-64034.3Warning
CVE-2020-64115.8High
CVE-2020-63974.3Warning
CVE-2020-64046.8High
CVE-2020-64125.8High
CVE-2020-64004.3Warning
CVE-2020-63986.8High
CVE-2019-199265.0Warning
CVE-2020-63914.3Warning
CVE-2020-64106.8High
CVE-2020-63816.8High
CVE-2020-63954.3Warning
CVE-2020-64156.8High
CVE-2019-199255.0Warning
CVE-2019-198805.0Warning
CVE-2020-65024.3Warning
CVE-2020-65014.3Warning
CVE-2020-65004.3Warning
CVE-2020-64994.3Warning
blogs.opera.com/desktop/changelog-for-67/#b3575.23
chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Opera/
www.opera.com
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.194 Low
EPSS
Percentile
96.2%