9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.032 Low
EPSS
Percentile
91.1%
09/29/2020
Warning
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code, obtain sensitive information.
Opera earlier than 71.0.3770.198
Update to the latest version
Download Opera
Changelog for Opera 71
Stable Channel Update for Desktop
Stable Channel Update for Desktop
ACE
CVE-2020-65616.5High
CVE-2020-65598.8Critical
CVE-2020-65666.5High
CVE-2020-65586.5High
CVE-2020-65626.5High
CVE-2020-65606.5High
CVE-2020-65656.5High
CVE-2020-65646.5High
CVE-2020-65636.5High
CVE-2020-65704.3Warning
CVE-2020-65714.3Warning
CVE-2020-65696.3High
CVE-2020-65686.5High
CVE-2020-65676.5High
CVE-2020-159619.6Critical
CVE-2020-159608.8Critical
CVE-2020-159628.8Critical
CVE-2020-159658.8Critical
CVE-2020-159648.8Critical
CVE-2020-159664.3Warning
CVE-2020-159639.6Critical
blogs.opera.com/desktop/changelog-for-71/#b3770.198
chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Opera/
www.opera.com
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.032 Low
EPSS
Percentile
91.1%