fkie_cve-2007-2022
Vulnerability from fkie_nvd
Published
2007-04-13 18:19
Modified
2025-04-09 00:30
Severity ?
Summary
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
cve@mitre.orghttp://secunia.com/advisories/24877Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25432Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25662Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25669Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25894Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25933Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26118Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26357Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28068Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
cve@mitre.orghttp://www.adobe.com/support/security/advisories/apsa07-03.html
cve@mitre.orghttp://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:138
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_12_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_28_opera.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
cve@mitre.orghttp://www.opera.com/support/search/view/858/
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0494.html
cve@mitre.orghttp://www.securityfocus.com/bid/23437
cve@mitre.orghttp://www.securitytracker.com/id?1017903
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1361Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2497Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4190Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33595
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1462
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24877Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25432Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25662Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25669Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25894Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25933Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26118Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26357Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28068Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/advisories/apsa07-03.html
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:138
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_12_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_28_opera.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/search/view/858/
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0494.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23437
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017903
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1361Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2497Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4190Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33595
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1462
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
Impacted products
Vendor Product Version
adobe flash_player 7.0.25
adobe flash_player 8.0
adobe flash_player 9.0.18d60
adobe flash_player 9.0.20
adobe flash_player 9.0.28
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.0
opera opera_browser 5.02
opera opera_browser 5.10
opera opera_browser 5.11
opera opera_browser 5.12
opera opera_browser 6.0
opera opera_browser 6.0
opera opera_browser 6.0
opera opera_browser 6.0
opera opera_browser 6.0
opera opera_browser 6.0
opera opera_browser 6.1
opera opera_browser 6.01
opera opera_browser 6.1
opera opera_browser 6.02
opera opera_browser 6.03
opera opera_browser 6.04
opera opera_browser 6.05
opera opera_browser 6.06
opera opera_browser 6.11
opera opera_browser 6.12
opera opera_browser 7.0
opera opera_browser 7.0
opera opera_browser 7.0
opera opera_browser 7.0
opera opera_browser 7.01
opera opera_browser 7.02
opera opera_browser 7.03
opera opera_browser 7.10
opera opera_browser 7.10
opera opera_browser 7.11
opera opera_browser 7.11
opera opera_browser 7.20
opera opera_browser 7.20
opera opera_browser 7.21
opera opera_browser 7.22
opera opera_browser 7.23
opera opera_browser 7.50
opera opera_browser 7.50
opera opera_browser 7.51
opera opera_browser 7.52
opera opera_browser 7.53
opera opera_browser 7.54
opera opera_browser 7.54
opera opera_browser 7.54
opera opera_browser 7.60
opera opera_browser 8.0
opera opera_browser 8.0
opera opera_browser 8.0
opera opera_browser 8.0
opera opera_browser 8.01
opera opera_browser 8.02
opera opera_browser 8.50
opera opera_browser 8.51
opera opera_browser 8.52
opera opera_browser 8.53
opera opera_browser 8.54
opera opera_browser 9.0
opera opera_browser 9.0
opera opera_browser 9.0
opera opera_browser 9.01
opera opera_browser 9.02
opera opera_browser 9.10
opera opera_browser 9.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
              "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
              "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
              "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
              "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
              "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
              "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
              "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet."
    },
    {
      "lang": "es",
      "value": "Adobe Macromedia Flash Player versiones 7 y 9, cuando es usado con Opera versiones anteriores a  9.20 o Konqueror anteriores a 20070613, permite a atacantes remotos obtener informaci\u00f3n confidencial (pulsaciones de teclas del navegador), que son filtradas en la applet de Flash Player."
    }
  ],
  "id": "CVE-2007-2022",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-04-13T18:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24877"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25027"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25432"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25662"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25669"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25933"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26027"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26118"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26357"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26860"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28068"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.adobe.com/support/security/advisories/apsa07-03.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-12.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_28_opera.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.opera.com/support/search/view/858/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0494.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23437"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017903"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-192A.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1361"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2497"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4190"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1462"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24877"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.adobe.com/support/security/advisories/apsa07-03.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-12.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_28_opera.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.opera.com/support/search/view/858/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0494.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-192A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2497"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1462"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…