CVE-2007-0045 (GCVE-0-2007-0045)
Vulnerability from cvelistv5
Published
2007-01-03 20:00
Modified
2024-08-07 12:03
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
References
cve@mitre.org http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
cve@mitre.org http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
cve@mitre.org http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
cve@mitre.org http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
cve@mitre.org http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
cve@mitre.org http://secunia.com/advisories/23483 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/23691 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/23812 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/23877 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/23882 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/24457 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/24533 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/33754 Vendor Advisory
cve@mitre.org http://security.gentoo.org/glsa/glsa-200701-16.xml
cve@mitre.org http://securityreason.com/securityalert/2090
cve@mitre.org http://securitytracker.com/id?1017469
cve@mitre.org http://securitytracker.com/id?1023007
cve@mitre.org http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
cve@mitre.org http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
cve@mitre.org http://www.adobe.com/support/security/advisories/apsa07-01.html Vendor Advisory
cve@mitre.org http://www.adobe.com/support/security/advisories/apsa07-02.html
cve@mitre.org http://www.adobe.com/support/security/bulletins/apsb07-01.html
cve@mitre.org http://www.adobe.com/support/security/bulletins/apsb09-15.html
cve@mitre.org http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 Exploit
cve@mitre.org http://www.gnucitizen.org/blog/danger-danger-danger/ Exploit, Vendor Advisory
cve@mitre.org http://www.gnucitizen.org/blog/universal-pdf-xss-after-party
cve@mitre.org http://www.kb.cert.org/vuls/id/815960 Third Party Advisory, US Government Resource
cve@mitre.org http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2007-0021.html
cve@mitre.org http://www.securityfocus.com/archive/1/455790/100/0/threaded Exploit
cve@mitre.org http://www.securityfocus.com/archive/1/455800/100/0/threaded
cve@mitre.org http://www.securityfocus.com/archive/1/455801/100/0/threaded
cve@mitre.org http://www.securityfocus.com/archive/1/455831/100/0/threaded Exploit
cve@mitre.org http://www.securityfocus.com/archive/1/455836/100/0/threaded
cve@mitre.org http://www.securityfocus.com/archive/1/455906/100/0/threaded
cve@mitre.org http://www.securityfocus.com/bid/21858
cve@mitre.org http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
cve@mitre.org http://www.vupen.com/english/advisories/2007/0032 Vendor Advisory
cve@mitre.org http://www.vupen.com/english/advisories/2007/0957 Vendor Advisory
cve@mitre.org http://www.vupen.com/english/advisories/2009/2898 Vendor Advisory
cve@mitre.org http://www.wisec.it/vulns.php?page=9 Exploit, Patch
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/31271
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693
cve@mitre.org https://rhn.redhat.com/errata/RHSA-2007-0017.html
af854a3a-2127-422b-91ae-364da2661108 http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
af854a3a-2127-422b-91ae-364da2661108 http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
af854a3a-2127-422b-91ae-364da2661108 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
af854a3a-2127-422b-91ae-364da2661108 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
af854a3a-2127-422b-91ae-364da2661108 http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23483 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23691 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23812 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23877 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/23882 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/24457 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/24533 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/33754 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://security.gentoo.org/glsa/glsa-200701-16.xml
af854a3a-2127-422b-91ae-364da2661108 http://securityreason.com/securityalert/2090
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1017469
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1023007
af854a3a-2127-422b-91ae-364da2661108 http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
af854a3a-2127-422b-91ae-364da2661108 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
af854a3a-2127-422b-91ae-364da2661108 http://www.adobe.com/support/security/advisories/apsa07-01.html Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.adobe.com/support/security/advisories/apsa07-02.html
af854a3a-2127-422b-91ae-364da2661108 http://www.adobe.com/support/security/bulletins/apsb07-01.html
af854a3a-2127-422b-91ae-364da2661108 http://www.adobe.com/support/security/bulletins/apsb09-15.html
af854a3a-2127-422b-91ae-364da2661108 http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.gnucitizen.org/blog/danger-danger-danger/ Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.gnucitizen.org/blog/universal-pdf-xss-after-party
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/815960 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2007-0021.html
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455790/100/0/threaded Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455800/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455801/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455831/100/0/threaded Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455836/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/455906/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/21858
af854a3a-2127-422b-91ae-364da2661108 http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/0032 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/0957 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2009/2898 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.wisec.it/vulns.php?page=9 Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/31271
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693
af854a3a-2127-422b-91ae-364da2661108 https://rhn.redhat.com/errata/RHSA-2007-0017.html
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:37.062Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2007:0021",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0021.html"
          },
          {
            "name": "23691",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23691"
          },
          {
            "name": "TA09-286B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
          },
          {
            "name": "RHSA-2007:0017",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2007-0017.html"
          },
          {
            "name": "21858",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21858"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf"
          },
          {
            "name": "20070103 Universal XSS with PDF files: highly dangerous",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455790/100/0/threaded"
          },
          {
            "name": "1023007",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023007"
          },
          {
            "name": "23882",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23882"
          },
          {
            "name": "20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455801/100/0/threaded"
          },
          {
            "name": "ADV-2007-0032",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0032"
          },
          {
            "name": "24457",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24457"
          },
          {
            "name": "HPSBUX02153",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
          },
          {
            "name": "adobe-acrobat-pdf-xss(31271)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31271"
          },
          {
            "name": "20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455831/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"
          },
          {
            "name": "2090",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2090"
          },
          {
            "name": "SUSE-SA:2007:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html"
          },
          {
            "name": "102847",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1"
          },
          {
            "name": "33754",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33754"
          },
          {
            "name": "ADV-2007-0957",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0957"
          },
          {
            "name": "20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455836/100/0/threaded"
          },
          {
            "name": "23812",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23812"
          },
          {
            "name": "20070104 Universal PDF XSS After Party",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455906/100/0/threaded"
          },
          {
            "name": "1017469",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017469"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/advisories/apsa07-01.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/advisories/apsa07-02.html"
          },
          {
            "name": "23483",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23483"
          },
          {
            "name": "23877",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23877"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/universal-pdf-xss-after-party"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb07-01.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9693",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693"
          },
          {
            "name": "oval:org.mitre.oval:def:6487",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487"
          },
          {
            "name": "SSRT061181",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
          },
          {
            "name": "ADV-2009-2898",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2898"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/danger-danger-danger/"
          },
          {
            "name": "GLSA-200701-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200701-16.xml"
          },
          {
            "name": "24533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24533"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.disenchant.ch/blog/hacking-with-browser-plugins/34"
          },
          {
            "name": "SSA:2007-066-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131"
          },
          {
            "name": "VU#815960",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/815960"
          },
          {
            "name": "20070103 Re: Universal XSS with PDF files: highly dangerous",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455800/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.wisec.it/vulns.php?page=9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka \"Universal XSS (UXSS).\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2007:0021",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0021.html"
        },
        {
          "name": "23691",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23691"
        },
        {
          "name": "TA09-286B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
        },
        {
          "name": "RHSA-2007:0017",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2007-0017.html"
        },
        {
          "name": "21858",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21858"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf"
        },
        {
          "name": "20070103 Universal XSS with PDF files: highly dangerous",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455790/100/0/threaded"
        },
        {
          "name": "1023007",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023007"
        },
        {
          "name": "23882",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23882"
        },
        {
          "name": "20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455801/100/0/threaded"
        },
        {
          "name": "ADV-2007-0032",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0032"
        },
        {
          "name": "24457",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24457"
        },
        {
          "name": "HPSBUX02153",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
        },
        {
          "name": "adobe-acrobat-pdf-xss(31271)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31271"
        },
        {
          "name": "20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455831/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"
        },
        {
          "name": "2090",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2090"
        },
        {
          "name": "SUSE-SA:2007:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html"
        },
        {
          "name": "102847",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1"
        },
        {
          "name": "33754",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33754"
        },
        {
          "name": "ADV-2007-0957",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0957"
        },
        {
          "name": "20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455836/100/0/threaded"
        },
        {
          "name": "23812",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23812"
        },
        {
          "name": "20070104 Universal PDF XSS After Party",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455906/100/0/threaded"
        },
        {
          "name": "1017469",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017469"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/advisories/apsa07-01.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/advisories/apsa07-02.html"
        },
        {
          "name": "23483",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23483"
        },
        {
          "name": "23877",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23877"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/universal-pdf-xss-after-party"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb07-01.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9693",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693"
        },
        {
          "name": "oval:org.mitre.oval:def:6487",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487"
        },
        {
          "name": "SSRT061181",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
        },
        {
          "name": "ADV-2009-2898",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2898"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.gnucitizen.org/blog/danger-danger-danger/"
        },
        {
          "name": "GLSA-200701-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200701-16.xml"
        },
        {
          "name": "24533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24533"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.disenchant.ch/blog/hacking-with-browser-plugins/34"
        },
        {
          "name": "SSA:2007-066-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131"
        },
        {
          "name": "VU#815960",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/815960"
        },
        {
          "name": "20070103 Re: Universal XSS with PDF files: highly dangerous",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455800/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.wisec.it/vulns.php?page=9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0045",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka \"Universal XSS (UXSS).\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2007:0021",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0021.html"
            },
            {
              "name": "23691",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23691"
            },
            {
              "name": "TA09-286B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
            },
            {
              "name": "RHSA-2007:0017",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2007-0017.html"
            },
            {
              "name": "21858",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21858"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html"
            },
            {
              "name": "http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf",
              "refsource": "MISC",
              "url": "http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf"
            },
            {
              "name": "20070103 Universal XSS with PDF files: highly dangerous",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455790/100/0/threaded"
            },
            {
              "name": "1023007",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023007"
            },
            {
              "name": "23882",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23882"
            },
            {
              "name": "20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455801/100/0/threaded"
            },
            {
              "name": "ADV-2007-0032",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0032"
            },
            {
              "name": "24457",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24457"
            },
            {
              "name": "HPSBUX02153",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
            },
            {
              "name": "adobe-acrobat-pdf-xss(31271)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31271"
            },
            {
              "name": "20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455831/100/0/threaded"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb09-15.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
            },
            {
              "name": "http://www.mozilla.org/security/announce/2007/mfsa2007-02.html",
              "refsource": "CONFIRM",
              "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"
            },
            {
              "name": "2090",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2090"
            },
            {
              "name": "SUSE-SA:2007:011",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html"
            },
            {
              "name": "102847",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1"
            },
            {
              "name": "33754",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33754"
            },
            {
              "name": "ADV-2007-0957",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0957"
            },
            {
              "name": "20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455836/100/0/threaded"
            },
            {
              "name": "23812",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23812"
            },
            {
              "name": "20070104 Universal PDF XSS After Party",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455906/100/0/threaded"
            },
            {
              "name": "1017469",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017469"
            },
            {
              "name": "http://www.adobe.com/support/security/advisories/apsa07-01.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/advisories/apsa07-01.html"
            },
            {
              "name": "http://www.adobe.com/support/security/advisories/apsa07-02.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/advisories/apsa07-02.html"
            },
            {
              "name": "23483",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23483"
            },
            {
              "name": "23877",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23877"
            },
            {
              "name": "http://www.gnucitizen.org/blog/universal-pdf-xss-after-party",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/universal-pdf-xss-after-party"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb07-01.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb07-01.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9693",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693"
            },
            {
              "name": "oval:org.mitre.oval:def:6487",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487"
            },
            {
              "name": "SSRT061181",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
            },
            {
              "name": "ADV-2009-2898",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2898"
            },
            {
              "name": "http://www.gnucitizen.org/blog/danger-danger-danger/",
              "refsource": "CONFIRM",
              "url": "http://www.gnucitizen.org/blog/danger-danger-danger/"
            },
            {
              "name": "GLSA-200701-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200701-16.xml"
            },
            {
              "name": "24533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24533"
            },
            {
              "name": "http://www.disenchant.ch/blog/hacking-with-browser-plugins/34",
              "refsource": "MISC",
              "url": "http://www.disenchant.ch/blog/hacking-with-browser-plugins/34"
            },
            {
              "name": "SSA:2007-066-05",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131"
            },
            {
              "name": "VU#815960",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/815960"
            },
            {
              "name": "20070103 Re: Universal XSS with PDF files: highly dangerous",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455800/100/0/threaded"
            },
            {
              "name": "http://www.wisec.it/vulns.php?page=9",
              "refsource": "MISC",
              "url": "http://www.wisec.it/vulns.php?page=9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0045",
    "datePublished": "2007-01-03T20:00:00",
    "dateReserved": "2007-01-03T00:00:00",
    "dateUpdated": "2024-08-07T12:03:37.062Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-0045\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-01-03T21:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka \\\"Universal XSS (UXSS).\\\"\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de tipo cross-site-scripting (XSS) en Adobe Acrobat Reader Plugin anterior a versi\u00f3n 8.0.0, y posiblemente el plugin distribuido con Adobe Reader versi\u00f3n 7.x anterior a 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, para Mozilla Firefox, Microsoft Internet Explorer versi\u00f3n 6 SP1, Google Chrome, Opera versi\u00f3n 8.5.4 build 770 y Opera versi\u00f3n 9.10.8679 en Windows permiten a los atacantes remotos inyectar JavaScript arbitrario y conducir otros ataques por medio de una URL .pdf con un javascript: o  URI res: con los par\u00e1metros (1) FDF, (2) XML y (3) AJAX XFDF, o (4) un identificador de anclaje arbitrariamente llamado name=URI, tambi\u00e9n se conoce como \\\"Universal XSS (UXSS)\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*\",\"versionEndIncluding\":\"7.0.8\",\"matchCriteriaId\":\"70C786B9-7CEC-474E-B173-F2D9CD78E5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"AC8F85CD-8371-4B36-8D6A-8B2CA580631B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"C74ECCD2-4E9B-407B-9B14-8A6FB4F768F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"FE88C274-CC72-4341-9BF6-1924054A12FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"507C02CF-7E81-4131-99DE-63E4EEC45F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"3D68FF87-5DCE-4D52-B95A-8ADB6F8C0DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"47EBEF8E-3C53-41D5-B344-297ED7C432F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"DC0DF265-984D-462D-878E-612783BF0BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"0335D33B-20D8-483F-AB5E-E2517F2F900D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"4B066C6A-E3ED-4E7B-BE5E-45CDBF1E8959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"2341215F-97A7-40B6-B618-7FF022C7CFA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"D61F0564-59B9-4811-B7FD-BA044C6A94AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"9C9A3E43-7334-44B0-BF01-04BB19B6FE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"D3E43C1B-D76D-4486-AE7A-943D34D0A92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"9F7310F9-CF09-4B83-B6CA-3FE6DBAB6008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"F52F86E7-E845-48A5-9CC4-98E6DAA43C71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"32C79CBE-CE27-46B2-BD3C-D56DC62CBB46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"CC9D669B-7E9D-4F39-894A-D9438000F2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CA54D-9D60-4064-B6AC-8CED8D064465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA58F87E-2E6D-4837-85C9-0A94BB3D269A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.0.8\",\"matchCriteriaId\":\"FD055652-DA7A-4881-ACD3-9D491821DC73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9351C2-16ED-4766-B417-8DB3A8766C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74667860-0047-40AD-9468-860591BA9D17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9628AFF9-6EE1-4E85-858F-AE96EE64B7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2D0266-6954-4DBA-9EEE-8BF73B39DD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24262AFA-2EC8-479E-8922-36DB4243E404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E62096-08B2-4722-A492-11E9A441E85B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5370AC6-90EE-48EA-8DBD-54002B102F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36D10A8-D211-437D-98D8-9029D0A9CF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA55D00C-3629-48E4-8699-F62B8D703E02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623324C2-C8B5-4C3C-9C10-9677D5A6740A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F\"}]}]}],\"references\":[{\"url\":\"http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23483\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23691\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23812\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23882\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24457\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24533\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33754\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200701-16.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/2090\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1017469\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-01.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-02.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.disenchant.ch/blog/hacking-with-browser-plugins/34\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.gnucitizen.org/blog/danger-danger-danger/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.gnucitizen.org/blog/universal-pdf-xss-after-party\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/815960\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/455790/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/455800/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/455801/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/455831/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/455836/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/455906/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/21858\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0032\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0957\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.wisec.it/vulns.php?page=9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31271\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2007-0017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23812\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24533\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200701-16.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/2090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017469\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa07-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.disenchant.ch/blog/hacking-with-browser-plugins/34\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.gnucitizen.org/blog/danger-danger-danger/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.gnucitizen.org/blog/universal-pdf-xss-after-party\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/815960\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/455790/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/455800/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/455801/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/455831/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/455836/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/455906/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/21858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0957\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.wisec.it/vulns.php?page=9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/31271\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2007-0017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…