CVE-2007-2022
Vulnerability from cvelistv5
Published
2007-04-13 18:00
Modified
2024-08-07 13:13
Severity ?
Summary
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
cve@mitre.orghttp://secunia.com/advisories/24877Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25432Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25662Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25669Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25894Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25933Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26027Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26118Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26357Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28068Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
cve@mitre.orghttp://www.adobe.com/support/security/advisories/apsa07-03.html
cve@mitre.orghttp://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:138
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_12_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_28_opera.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
cve@mitre.orghttp://www.opera.com/support/search/view/858/
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0494.html
cve@mitre.orghttp://www.securityfocus.com/bid/23437
cve@mitre.orghttp://www.securitytracker.com/id?1017903
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1361Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2497Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4190Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33595
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1462
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24877Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25432Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25662Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25669Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25894Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25933Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26118Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26357Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28068Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/advisories/apsa07-03.html
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb07-12.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:138
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_12_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_28_opera.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/search/view/858/
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0494.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23437
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1017903
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-192A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1361Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2497Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4190Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33595
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1462
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T13:13:42.129Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "28068",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28068",
               },
               {
                  name: "opera-flash-player-unspecified(33595)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595",
               },
               {
                  name: "25894",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25894",
               },
               {
                  name: "26357",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26357",
               },
               {
                  name: "SUSE-SA:2007:046",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html",
               },
               {
                  name: "26860",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26860",
               },
               {
                  name: "201506",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1",
               },
               {
                  name: "25669",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25669",
               },
               {
                  name: "ADV-2007-4190",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/4190",
               },
               {
                  name: "MDKSA-2007:138",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.rpath.com/browse/RPL-1462",
               },
               {
                  name: "23437",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23437",
               },
               {
                  name: "GLSA-200708-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml",
               },
               {
                  name: "24877",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24877",
               },
               {
                  name: "26027",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26027",
               },
               {
                  name: "SUSE-SR:2007:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_12_sr.html",
               },
               {
                  name: "RHSA-2007:0494",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0494.html",
               },
               {
                  name: "TA07-192A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA07-192A.html",
               },
               {
                  name: "oval:org.mitre.oval:def:9332",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332",
               },
               {
                  name: "ADV-2007-1361",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/1361",
               },
               {
                  name: "26118",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26118",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.adobe.com/support/security/advisories/apsa07-03.html",
               },
               {
                  name: "25027",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25027",
               },
               {
                  name: "SUSE-SA:2007:028",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_28_opera.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.opera.com/support/search/view/858/",
               },
               {
                  name: "25933",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25933",
               },
               {
                  name: "ADV-2007-2497",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2497",
               },
               {
                  name: "103167",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1",
               },
               {
                  name: "1017903",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1017903",
               },
               {
                  name: "20070602-01-P",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc",
               },
               {
                  name: "25662",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25662",
               },
               {
                  name: "25432",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25432",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.adobe.com/support/security/bulletins/apsb07-12.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-04-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "28068",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28068",
            },
            {
               name: "opera-flash-player-unspecified(33595)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595",
            },
            {
               name: "25894",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25894",
            },
            {
               name: "26357",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26357",
            },
            {
               name: "SUSE-SA:2007:046",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html",
            },
            {
               name: "26860",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26860",
            },
            {
               name: "201506",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1",
            },
            {
               name: "25669",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25669",
            },
            {
               name: "ADV-2007-4190",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/4190",
            },
            {
               name: "MDKSA-2007:138",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.rpath.com/browse/RPL-1462",
            },
            {
               name: "23437",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23437",
            },
            {
               name: "GLSA-200708-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml",
            },
            {
               name: "24877",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24877",
            },
            {
               name: "26027",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26027",
            },
            {
               name: "SUSE-SR:2007:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_12_sr.html",
            },
            {
               name: "RHSA-2007:0494",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0494.html",
            },
            {
               name: "TA07-192A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA07-192A.html",
            },
            {
               name: "oval:org.mitre.oval:def:9332",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332",
            },
            {
               name: "ADV-2007-1361",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/1361",
            },
            {
               name: "26118",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26118",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.adobe.com/support/security/advisories/apsa07-03.html",
            },
            {
               name: "25027",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25027",
            },
            {
               name: "SUSE-SA:2007:028",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_28_opera.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.opera.com/support/search/view/858/",
            },
            {
               name: "25933",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25933",
            },
            {
               name: "ADV-2007-2497",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2497",
            },
            {
               name: "103167",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1",
            },
            {
               name: "1017903",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1017903",
            },
            {
               name: "20070602-01-P",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc",
            },
            {
               name: "25662",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25662",
            },
            {
               name: "25432",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25432",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.adobe.com/support/security/bulletins/apsb07-12.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-2022",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "28068",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28068",
                  },
                  {
                     name: "opera-flash-player-unspecified(33595)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33595",
                  },
                  {
                     name: "25894",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25894",
                  },
                  {
                     name: "26357",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26357",
                  },
                  {
                     name: "SUSE-SA:2007:046",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html",
                  },
                  {
                     name: "26860",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26860",
                  },
                  {
                     name: "201506",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1",
                  },
                  {
                     name: "25669",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25669",
                  },
                  {
                     name: "ADV-2007-4190",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/4190",
                  },
                  {
                     name: "MDKSA-2007:138",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:138",
                  },
                  {
                     name: "https://issues.rpath.com/browse/RPL-1462",
                     refsource: "CONFIRM",
                     url: "https://issues.rpath.com/browse/RPL-1462",
                  },
                  {
                     name: "23437",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23437",
                  },
                  {
                     name: "GLSA-200708-01",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml",
                  },
                  {
                     name: "24877",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24877",
                  },
                  {
                     name: "26027",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26027",
                  },
                  {
                     name: "SUSE-SR:2007:012",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_12_sr.html",
                  },
                  {
                     name: "RHSA-2007:0494",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0494.html",
                  },
                  {
                     name: "TA07-192A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA07-192A.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9332",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332",
                  },
                  {
                     name: "ADV-2007-1361",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/1361",
                  },
                  {
                     name: "26118",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26118",
                  },
                  {
                     name: "http://www.adobe.com/support/security/advisories/apsa07-03.html",
                     refsource: "CONFIRM",
                     url: "http://www.adobe.com/support/security/advisories/apsa07-03.html",
                  },
                  {
                     name: "25027",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25027",
                  },
                  {
                     name: "SUSE-SA:2007:028",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_28_opera.html",
                  },
                  {
                     name: "http://www.opera.com/support/search/view/858/",
                     refsource: "CONFIRM",
                     url: "http://www.opera.com/support/search/view/858/",
                  },
                  {
                     name: "25933",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25933",
                  },
                  {
                     name: "ADV-2007-2497",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/2497",
                  },
                  {
                     name: "103167",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1",
                  },
                  {
                     name: "1017903",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1017903",
                  },
                  {
                     name: "20070602-01-P",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc",
                  },
                  {
                     name: "25662",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25662",
                  },
                  {
                     name: "25432",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25432",
                  },
                  {
                     name: "http://www.adobe.com/support/security/bulletins/apsb07-12.html",
                     refsource: "CONFIRM",
                     url: "http://www.adobe.com/support/security/bulletins/apsb07-12.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-2022",
      datePublished: "2007-04-13T18:00:00",
      dateReserved: "2007-04-13T00:00:00",
      dateUpdated: "2024-08-07T13:13:42.129Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2007-2022\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-04-13T18:19:00.000\",\"lastModified\":\"2024-11-21T00:29:42.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.\"},{\"lang\":\"es\",\"value\":\"Adobe Macromedia Flash Player versiones 7 y 9, cuando es usado con Opera versiones anteriores a  9.20 o Konqueror anteriores a 20070613, permite a atacantes remotos obtener información confidencial (pulsaciones de teclas del navegador), que son filtradas en la applet de Flash Player.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E93289-6EE0-401A-958D-F59D2CDAE2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12E3957-D7B2-4F3B-BB64-8B50B8958DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600DDA9D-6440-48D1-8539-7127398A8678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFA6611-99DA-48B0-89F7-DD99B8E30334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFBC71-7814-4A24-A918-C593673727B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"57824075-E3F7-4B23-B4D6-8417C3147085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DDEF-681C-4A34-9FF8-17249C42842D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF365891-F3FA-4740-94B2-01F85254A2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B4261-C511-4F3A-8596-6BD4E343DC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63687D75-860D-4A36-B6BB-45BD4268B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9AC78A-CA47-476D-935E-67932BAB98A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E90912E-0CF8-404B-9E86-461497C65A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19DD71-9447-4946-931F-4866537C8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54075890-6E0C-4AB7-8BD5-2023419CC251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC3435-77CD-4591-8282-7ADA60225CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEC078C-A8F4-471B-A367-59A86B78590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10F658D-D2E4-4789-8172-F8842C3EEA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81687D99-7444-4205-A7BE-992CC758675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C4301-68E9-4A10-B9C5-711252BF629B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC690371-3326-421E-8BAC-14F48840671B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE50982-8026-466C-9F51-867425C9986F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97452A26-7231-43BE-B70E-B8D05365CAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DBA733-467C-4505-8199-DD25A5FFBF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B332FF1C-731D-454C-AA9E-3534040F09E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7965089-8592-47F2-958B-7DBE669BCAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76410AD4-78CA-48EA-83F0-099D0A49626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9754B270-E01D-415E-9A91-09ECB9B82B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4682E92-E5E7-4351-959E-25A79CA4271B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF2B21F-7E97-416B-AF5C-35338A254552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5A5E5-3703-44AC-9963-A20A55002B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3E5BEF-3F29-4929-A37C-C49322B19047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A04906-7267-4A09-87BF-D639C7CF315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA17D3F-A17B-47A6-8066-583F63D11468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6E40C4-FA29-4D7A-9018-44154503A68F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E48C83-01AE-4A33-A004-14B99792674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623E4466-82CC-4BDD-BE25-3BB33B585547\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25027\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25432\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25662\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25669\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25933\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26027\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26118\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26357\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26860\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28068\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-03.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-12.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_12_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_28_opera.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/search/view/858/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0494.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/23437\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017903\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1361\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2497\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1462\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28068\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103167-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201506-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-03.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-12.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200708-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_12_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_28_opera.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_46_flashplayer.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/search/view/858/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0494.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/23437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1017903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-192A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/33595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.