6.8
CVSSv2

CVE-2007-2022

Published: 13/04/2007 Updated: 11/10/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Adobe Macromedia Flash Player 7 and 9, when used with Opera prior to 9.20 or Konqueror prior to 20070613, allows remote malicious users to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash player 9.0.28

opera opera browser 9.12

adobe flash player 9.0.20

opera opera browser 8.54

opera opera browser 8.01

opera opera browser 7.54

opera opera browser 7.52

opera opera browser 7.53

opera opera browser 7.03

opera opera browser 7.0

opera opera browser 6.0

opera opera browser 6.03

opera opera browser 6.02

opera opera browser 5.0

opera opera browser 5.12

opera opera browser 5.02

opera opera browser 9.0

opera opera browser 9.01

adobe flash player 7.0.25

opera opera browser 8.0

opera opera browser 8.02

opera opera browser 8.50

opera opera browser 8.52

opera opera browser 7.20

opera opera browser 7.21

opera opera browser 7.11

opera opera browser 6.05

opera opera browser 6.06

opera opera browser 6.1

opera opera browser 6.12

opera opera browser 9.10

opera opera browser 7.22

opera opera browser 7.50

opera opera browser 7.23

opera opera browser 7.10

opera opera browser 6.01

opera opera browser 6.11

opera opera browser 5.11

opera opera browser 5.10

opera opera browser 9.02

adobe flash player 9.0.18d60

adobe flash player 8.0

opera opera browser 8.51

opera opera browser 8.53

opera opera browser 7.51

opera opera browser 7.01

opera opera browser 7.60

opera opera browser 7.02

opera opera browser 6.04

References

CWE-200http://www.adobe.com/support/security/advisories/apsa07-03.htmlhttp://www.opera.com/support/search/view/858/http://www.securityfocus.com/bid/23437http://www.securitytracker.com/id?1017903http://secunia.com/advisories/24877http://www.novell.com/linux/security/advisories/2007_28_opera.htmlhttp://secunia.com/advisories/25027http://www.adobe.com/support/security/bulletins/apsb07-12.htmlhttps://issues.rpath.com/browse/RPL-1462http://www.gentoo.org/security/en/glsa/glsa-200708-01.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:138http://www.redhat.com/support/errata/RHSA-2007-0494.htmlftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.aschttp://www.novell.com/linux/security/advisories/2007_12_sr.htmlhttp://www.novell.com/linux/security/advisories/2007_46_flashplayer.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-192A.htmlhttp://secunia.com/advisories/25432http://secunia.com/advisories/25662http://secunia.com/advisories/25669http://secunia.com/advisories/25894http://secunia.com/advisories/25933http://secunia.com/advisories/26027http://secunia.com/advisories/26118http://secunia.com/advisories/26357http://secunia.com/advisories/26860http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1http://secunia.com/advisories/28068http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1http://www.vupen.com/english/advisories/2007/2497http://www.vupen.com/english/advisories/2007/1361http://www.vupen.com/english/advisories/2007/4190https://exchange.xforce.ibmcloud.com/vulnerabilities/33595https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/110297