Unrated severityNVD Advisory· Published Apr 13, 2007· Updated Apr 23, 2026
CVE-2007-2022
CVE-2007-2022
Description
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
Affected products
76cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*+ 70 more
- cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
33- secunia.com/advisories/24877nvdVendor Advisory
- secunia.com/advisories/25027nvdVendor Advisory
- secunia.com/advisories/25432nvdVendor Advisory
- secunia.com/advisories/25662nvdVendor Advisory
- secunia.com/advisories/25669nvdVendor Advisory
- secunia.com/advisories/25894nvdVendor Advisory
- secunia.com/advisories/25933nvdVendor Advisory
- secunia.com/advisories/26027nvdVendor Advisory
- secunia.com/advisories/26118nvdVendor Advisory
- secunia.com/advisories/26357nvdVendor Advisory
- secunia.com/advisories/26860nvdVendor Advisory
- secunia.com/advisories/28068nvdVendor Advisory
- www.adobe.com/support/security/bulletins/apsb07-12.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2007/1361nvdVendor Advisory
- www.vupen.com/english/advisories/2007/2497nvdVendor Advisory
- www.vupen.com/english/advisories/2007/4190nvdVendor Advisory
- www.us-cert.gov/cas/techalerts/TA07-192A.htmlnvdUS Government Resource
- patches.sgi.com/support/free/security/advisories/20070602-01-P.ascnvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- www.adobe.com/support/security/advisories/apsa07-03.htmlnvd
- www.gentoo.org/security/en/glsa/glsa-200708-01.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2007_12_sr.htmlnvd
- www.novell.com/linux/security/advisories/2007_28_opera.htmlnvd
- www.novell.com/linux/security/advisories/2007_46_flashplayer.htmlnvd
- www.opera.com/support/search/view/858/nvd
- www.redhat.com/support/errata/RHSA-2007-0494.htmlnvd
- www.securityfocus.com/bid/23437nvd
- www.securitytracker.com/idnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/33595nvd
- issues.rpath.com/browse/RPL-1462nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9332nvd
News mentions
0No linked articles in our index yet.