9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.4%
03/23/2022
High
Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code.
Opera earlier than 85.0.4341.18
Update to the latest version
Download Opera
Changelog for 85
Stable Channel Update for Desktop
ACE
CVE-2022-07926.5High
CVE-2022-08076.5High
CVE-2022-07918.8Critical
CVE-2022-08088.8Critical
CVE-2022-08026.5High
CVE-2022-08058.8Critical
CVE-2022-08036.5High
CVE-2022-07998.8Critical
CVE-2022-08066.5High
CVE-2022-07988.8Critical
CVE-2022-07948.8Critical
CVE-2022-07958.8Critical
CVE-2022-07968.8Critical
CVE-2022-08008.8Critical
CVE-2022-08046.5High
CVE-2022-07909.6Critical
CVE-2022-07938.8Critical
CVE-2022-07898.8Critical
CVE-2022-08098.8Critical
CVE-2022-08016.1High
CVE-2022-07978.8Critical
blogs.opera.com/desktop/changelog-for-85/#b4341.18
chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0809
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Opera/
www.opera.com
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.4%