CVE-2007-2022
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
13/04/2007
Last modified:
09/04/2025
Description
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:* | ||
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://secunia.com/advisories/24877
- http://secunia.com/advisories/25027
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25662
- http://secunia.com/advisories/25669
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/25933
- http://secunia.com/advisories/26027
- http://secunia.com/advisories/26118
- http://secunia.com/advisories/26357
- http://secunia.com/advisories/26860
- http://secunia.com/advisories/28068
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
- http://www.adobe.com/support/security/advisories/apsa07-03.html
- http://www.adobe.com/support/security/bulletins/apsb07-12.html
- http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A138
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
- http://www.opera.com/support/search/view/858/
- http://www.redhat.com/support/errata/RHSA-2007-0494.html
- http://www.securityfocus.com/bid/23437
- http://www.securitytracker.com/id?1017903=
- http://www.us-cert.gov/cas/techalerts/TA07-192A.html
- http://www.vupen.com/english/advisories/2007/1361
- http://www.vupen.com/english/advisories/2007/2497
- http://www.vupen.com/english/advisories/2007/4190
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33595
- https://issues.rpath.com/browse/RPL-1462
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://secunia.com/advisories/24877
- http://secunia.com/advisories/25027
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25662
- http://secunia.com/advisories/25669
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/25933
- http://secunia.com/advisories/26027
- http://secunia.com/advisories/26118
- http://secunia.com/advisories/26357
- http://secunia.com/advisories/26860
- http://secunia.com/advisories/28068
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
- http://www.adobe.com/support/security/advisories/apsa07-03.html
- http://www.adobe.com/support/security/bulletins/apsb07-12.html
- http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A138
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
- http://www.opera.com/support/search/view/858/
- http://www.redhat.com/support/errata/RHSA-2007-0494.html
- http://www.securityfocus.com/bid/23437
- http://www.securitytracker.com/id?1017903=
- http://www.us-cert.gov/cas/techalerts/TA07-192A.html
- http://www.vupen.com/english/advisories/2007/1361
- http://www.vupen.com/english/advisories/2007/2497
- http://www.vupen.com/english/advisories/2007/4190
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33595
- https://issues.rpath.com/browse/RPL-1462
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332