CVE-2007-6637

Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to "pre-generated SWF files" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect. NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.
References
Link Resource
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html
http://secunia.com/advisories/29763
http://secunia.com/advisories/29865
http://secunia.com/advisories/30430
http://secunia.com/advisories/30507
http://securitytracker.com/id?1019141
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
http://www.adobe.com/support/security/advisories/apsa07-06.html
http://www.adobe.com/support/security/bulletins/apsb08-11.html
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml
http://www.redhat.com/support/errata/RHSA-2008-0221.html
http://www.securityfocus.com/bid/27034
http://www.us-cert.gov/cas/techalerts/TA08-100A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-150A.html US Government Resource
http://www.vupen.com/english/advisories/2008/1697
http://www.vupen.com/english/advisories/2008/1724/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html
http://secunia.com/advisories/29763
http://secunia.com/advisories/29865
http://secunia.com/advisories/30430
http://secunia.com/advisories/30507
http://securitytracker.com/id?1019141
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
http://www.adobe.com/support/security/advisories/apsa07-06.html
http://www.adobe.com/support/security/bulletins/apsb08-11.html
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml
http://www.redhat.com/support/errata/RHSA-2008-0221.html
http://www.securityfocus.com/bid/27034
http://www.us-cert.gov/cas/techalerts/TA08-100A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-150A.html US Government Resource
http://www.vupen.com/english/advisories/2008/1697
http://www.vupen.com/english/advisories/2008/1724/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - () http://lists.apple.com/archives/security-announce/2008//May/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html -
References () http://secunia.com/advisories/29763 - () http://secunia.com/advisories/29763 -
References () http://secunia.com/advisories/29865 - () http://secunia.com/advisories/29865 -
References () http://secunia.com/advisories/30430 - () http://secunia.com/advisories/30430 -
References () http://secunia.com/advisories/30507 - () http://secunia.com/advisories/30507 -
References () http://securitytracker.com/id?1019141 - () http://securitytracker.com/id?1019141 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 -
References () http://www.adobe.com/support/security/advisories/apsa07-06.html - () http://www.adobe.com/support/security/advisories/apsa07-06.html -
References () http://www.adobe.com/support/security/bulletins/apsb08-11.html - () http://www.adobe.com/support/security/bulletins/apsb08-11.html -
References () http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml - () http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml -
References () http://www.redhat.com/support/errata/RHSA-2008-0221.html - () http://www.redhat.com/support/errata/RHSA-2008-0221.html -
References () http://www.securityfocus.com/bid/27034 - () http://www.securityfocus.com/bid/27034 -
References () http://www.us-cert.gov/cas/techalerts/TA08-100A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-100A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA08-150A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-150A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2008/1697 - () http://www.vupen.com/english/advisories/2008/1697 -
References () http://www.vupen.com/english/advisories/2008/1724/references - () http://www.vupen.com/english/advisories/2008/1724/references -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9828 -

Information

Published : 2008-01-04 00:46

Updated : 2024-11-21 00:40


NVD link : CVE-2007-6637

Mitre link : CVE-2007-6637

CVE.ORG link : CVE-2007-6637


JSON object : View

Products Affected

adobe

  • flash_player
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')