cve-2007-2022
Vulnerability from cvelistv5
Published
2007-04-13 18:00
Modified
2024-08-07 13:13
Severity ?
Summary
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
cve@mitre.orghttp://secunia.com/advisories/24877Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25432Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25662Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25669Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25894Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25933Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26118Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26357Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28068Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
cve@mitre.orghttp://www.adobe.com/support/security/advisories/apsa07-03.html
cve@mitre.orghttp://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:138
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_12_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_28_opera.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
cve@mitre.orghttp://www.opera.com/support/search/view/858/
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0494.html
cve@mitre.orghttp://www.securityfocus.com/bid/23437
cve@mitre.orghttp://www.securitytracker.com/id?1017903
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1361Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2497Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4190Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33595
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1462
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24877Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25432Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25662Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25669Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25894Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25933Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26118Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26357Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28068Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/advisories/apsa07-03.html
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:138
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_12_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_28_opera.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/search/view/858/
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0494.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23437
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017903
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1361Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2497Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4190Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33595
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1462
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:13:42.129Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28068",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28068"
          },
          {
            "name": "opera-flash-player-unspecified(33595)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595"
          },
          {
            "name": "25894",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25894"
          },
          {
            "name": "26357",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26357"
          },
          {
            "name": "SUSE-SA:2007:046",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html"
          },
          {
            "name": "26860",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26860"
          },
          {
            "name": "201506",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1"
          },
          {
            "name": "25669",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25669"
          },
          {
            "name": "ADV-2007-4190",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4190"
          },
          {
            "name": "MDKSA-2007:138",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1462"
          },
          {
            "name": "23437",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23437"
          },
          {
            "name": "GLSA-200708-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml"
          },
          {
            "name": "24877",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24877"
          },
          {
            "name": "26027",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26027"
          },
          {
            "name": "SUSE-SR:2007:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html"
          },
          {
            "name": "RHSA-2007:0494",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0494.html"
          },
          {
            "name": "TA07-192A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-192A.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9332",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332"
          },
          {
            "name": "ADV-2007-1361",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1361"
          },
          {
            "name": "26118",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26118"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/advisories/apsa07-03.html"
          },
          {
            "name": "25027",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25027"
          },
          {
            "name": "SUSE-SA:2007:028",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_28_opera.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/search/view/858/"
          },
          {
            "name": "25933",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25933"
          },
          {
            "name": "ADV-2007-2497",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2497"
          },
          {
            "name": "103167",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1"
          },
          {
            "name": "1017903",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017903"
          },
          {
            "name": "20070602-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
          },
          {
            "name": "25662",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25662"
          },
          {
            "name": "25432",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25432"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb07-12.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28068",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28068"
        },
        {
          "name": "opera-flash-player-unspecified(33595)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595"
        },
        {
          "name": "25894",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25894"
        },
        {
          "name": "26357",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26357"
        },
        {
          "name": "SUSE-SA:2007:046",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html"
        },
        {
          "name": "26860",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26860"
        },
        {
          "name": "201506",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1"
        },
        {
          "name": "25669",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25669"
        },
        {
          "name": "ADV-2007-4190",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4190"
        },
        {
          "name": "MDKSA-2007:138",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1462"
        },
        {
          "name": "23437",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23437"
        },
        {
          "name": "GLSA-200708-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml"
        },
        {
          "name": "24877",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24877"
        },
        {
          "name": "26027",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26027"
        },
        {
          "name": "SUSE-SR:2007:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html"
        },
        {
          "name": "RHSA-2007:0494",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0494.html"
        },
        {
          "name": "TA07-192A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-192A.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9332",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332"
        },
        {
          "name": "ADV-2007-1361",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1361"
        },
        {
          "name": "26118",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26118"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/advisories/apsa07-03.html"
        },
        {
          "name": "25027",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25027"
        },
        {
          "name": "SUSE-SA:2007:028",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_28_opera.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/search/view/858/"
        },
        {
          "name": "25933",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25933"
        },
        {
          "name": "ADV-2007-2497",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2497"
        },
        {
          "name": "103167",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1"
        },
        {
          "name": "1017903",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017903"
        },
        {
          "name": "20070602-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
        },
        {
          "name": "25662",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25662"
        },
        {
          "name": "25432",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25432"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb07-12.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2022",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28068",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28068"
            },
            {
              "name": "opera-flash-player-unspecified(33595)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595"
            },
            {
              "name": "25894",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25894"
            },
            {
              "name": "26357",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26357"
            },
            {
              "name": "SUSE-SA:2007:046",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html"
            },
            {
              "name": "26860",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26860"
            },
            {
              "name": "201506",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1"
            },
            {
              "name": "25669",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25669"
            },
            {
              "name": "ADV-2007-4190",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4190"
            },
            {
              "name": "MDKSA-2007:138",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1462",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1462"
            },
            {
              "name": "23437",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23437"
            },
            {
              "name": "GLSA-200708-01",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml"
            },
            {
              "name": "24877",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24877"
            },
            {
              "name": "26027",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26027"
            },
            {
              "name": "SUSE-SR:2007:012",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html"
            },
            {
              "name": "RHSA-2007:0494",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0494.html"
            },
            {
              "name": "TA07-192A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-192A.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9332",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332"
            },
            {
              "name": "ADV-2007-1361",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1361"
            },
            {
              "name": "26118",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26118"
            },
            {
              "name": "http://www.adobe.com/support/security/advisories/apsa07-03.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/advisories/apsa07-03.html"
            },
            {
              "name": "25027",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25027"
            },
            {
              "name": "SUSE-SA:2007:028",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_28_opera.html"
            },
            {
              "name": "http://www.opera.com/support/search/view/858/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/search/view/858/"
            },
            {
              "name": "25933",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25933"
            },
            {
              "name": "ADV-2007-2497",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2497"
            },
            {
              "name": "103167",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1"
            },
            {
              "name": "1017903",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017903"
            },
            {
              "name": "20070602-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
            },
            {
              "name": "25662",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25662"
            },
            {
              "name": "25432",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25432"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb07-12.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb07-12.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2022",
    "datePublished": "2007-04-13T18:00:00",
    "dateReserved": "2007-04-13T00:00:00",
    "dateUpdated": "2024-08-07T13:13:42.129Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0E93289-6EE0-401A-958D-F59D2CDAE2F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"600DDA9D-6440-48D1-8539-7127398A8678\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACFA6611-99DA-48B0-89F7-DD99B8E30334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CECFBC71-7814-4A24-A918-C593673727B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"57824075-E3F7-4B23-B4D6-8417C3147085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\", \"matchCriteriaId\": \"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C49DDEF-681C-4A34-9FF8-17249C42842D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF365891-F3FA-4740-94B2-01F85254A2F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42B4261-C511-4F3A-8596-6BD4E343DC31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63687D75-860D-4A36-B6BB-45BD4268B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9AC78A-CA47-476D-935E-67932BAB98A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E90912E-0CF8-404B-9E86-461497C65A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E19DD71-9447-4946-931F-4866537C8BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54075890-6E0C-4AB7-8BD5-2023419CC251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ABC3435-77CD-4591-8282-7ADA60225CF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFEC078C-A8F4-471B-A367-59A86B78590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10F658D-D2E4-4789-8172-F8842C3EEA05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81687D99-7444-4205-A7BE-992CC758675F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75C4301-68E9-4A10-B9C5-711252BF629B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC690371-3326-421E-8BAC-14F48840671B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE50982-8026-466C-9F51-867425C9986F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"97452A26-7231-43BE-B70E-B8D05365CAB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DBA733-467C-4505-8199-DD25A5FFBF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B332FF1C-731D-454C-AA9E-3534040F09E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7965089-8592-47F2-958B-7DBE669BCAC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76410AD4-78CA-48EA-83F0-099D0A49626F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9754B270-E01D-415E-9A91-09ECB9B82B28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4682E92-E5E7-4351-959E-25A79CA4271B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DF2B21F-7E97-416B-AF5C-35338A254552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5A5E5-3703-44AC-9963-A20A55002B48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC3E5BEF-3F29-4929-A37C-C49322B19047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A04906-7267-4A09-87BF-D639C7CF315B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEA17D3F-A17B-47A6-8066-583F63D11468\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC6E40C4-FA29-4D7A-9018-44154503A68F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E48C83-01AE-4A33-A004-14B99792674C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"623E4466-82CC-4BDD-BE25-3BB33B585547\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.\"}, {\"lang\": \"es\", \"value\": \"Adobe Macromedia Flash Player versiones 7 y 9, cuando es usado con Opera versiones anteriores a  9.20 o Konqueror anteriores a 20070613, permite a atacantes remotos obtener informaci\\u00f3n confidencial (pulsaciones de teclas del navegador), que son filtradas en la applet de Flash Player.\"}]",
      "id": "CVE-2007-2022",
      "lastModified": "2024-11-21T00:29:42.900",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2007-04-13T18:19:00.000",
      "references": "[{\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24877\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25027\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25432\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25662\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25669\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25894\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25933\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26027\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26118\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26357\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26860\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28068\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.adobe.com/support/security/advisories/apsa07-03.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb07-12.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_12_sr.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_28_opera.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/support/search/view/858/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0494.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/23437\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1017903\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1361\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2497\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4190\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1462\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\", \"source\": \"cve@mitre.org\"}, {\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24877\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25432\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25662\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25669\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25894\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25933\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26118\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26357\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/26860\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28068\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.adobe.com/support/security/advisories/apsa07-03.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb07-12.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_12_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_28_opera.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/support/search/view/858/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0494.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/23437\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1017903\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1361\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2497\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4190\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1462\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-2022\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-04-13T18:19:00.000\",\"lastModified\":\"2024-11-21T00:29:42.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.\"},{\"lang\":\"es\",\"value\":\"Adobe Macromedia Flash Player versiones 7 y 9, cuando es usado con Opera versiones anteriores a  9.20 o Konqueror anteriores a 20070613, permite a atacantes remotos obtener informaci\u00f3n confidencial (pulsaciones de teclas del navegador), que son filtradas en la applet de Flash Player.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E93289-6EE0-401A-958D-F59D2CDAE2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600DDA9D-6440-48D1-8539-7127398A8678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFA6611-99DA-48B0-89F7-DD99B8E30334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFBC71-7814-4A24-A918-C593673727B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"57824075-E3F7-4B23-B4D6-8417C3147085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DDEF-681C-4A34-9FF8-17249C42842D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF365891-F3FA-4740-94B2-01F85254A2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B4261-C511-4F3A-8596-6BD4E343DC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63687D75-860D-4A36-B6BB-45BD4268B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9AC78A-CA47-476D-935E-67932BAB98A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E90912E-0CF8-404B-9E86-461497C65A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19DD71-9447-4946-931F-4866537C8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54075890-6E0C-4AB7-8BD5-2023419CC251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC3435-77CD-4591-8282-7ADA60225CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEC078C-A8F4-471B-A367-59A86B78590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10F658D-D2E4-4789-8172-F8842C3EEA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81687D99-7444-4205-A7BE-992CC758675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C4301-68E9-4A10-B9C5-711252BF629B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC690371-3326-421E-8BAC-14F48840671B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE50982-8026-466C-9F51-867425C9986F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97452A26-7231-43BE-B70E-B8D05365CAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DBA733-467C-4505-8199-DD25A5FFBF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B332FF1C-731D-454C-AA9E-3534040F09E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7965089-8592-47F2-958B-7DBE669BCAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76410AD4-78CA-48EA-83F0-099D0A49626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9754B270-E01D-415E-9A91-09ECB9B82B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4682E92-E5E7-4351-959E-25A79CA4271B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF2B21F-7E97-416B-AF5C-35338A254552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5A5E5-3703-44AC-9963-A20A55002B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3E5BEF-3F29-4929-A37C-C49322B19047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A04906-7267-4A09-87BF-D639C7CF315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA17D3F-A17B-47A6-8066-583F63D11468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6E40C4-FA29-4D7A-9018-44154503A68F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E48C83-01AE-4A33-A004-14B99792674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623E4466-82CC-4BDD-BE25-3BB33B585547\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25027\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25432\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25662\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25669\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25933\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26027\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26118\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26357\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26860\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28068\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-03.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-12.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_12_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_28_opera.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/search/view/858/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0494.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/23437\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017903\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1361\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2497\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1462\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28068\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-03.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-12.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_12_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_28_opera.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/search/view/858/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0494.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/23437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1017903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.