4.3
CVSSv2

CVE-2007-0045

Published: 03/01/2007 Updated: 16/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin prior to 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x prior to 7.1.4, 8.x prior to 8.1.7, and 9.x prior to 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote malicious users to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat 7.0.2

adobe acrobat 7.0.6

adobe acrobat 7.0.7

adobe acrobat reader 6.0

adobe acrobat reader 6.0.1

adobe acrobat reader 7.0.2

adobe acrobat reader 7.0.3

adobe acrobat 7.0.4

adobe acrobat 7.0.8

adobe acrobat 7.0

adobe acrobat reader 6.0.4

adobe acrobat reader 6.0.5

adobe acrobat reader 7.0.6

adobe acrobat reader 7.0.7

adobe acrobat 7.0.3

adobe acrobat reader 6.0.2

adobe acrobat reader 6.0.3

adobe acrobat reader 7.0.4

adobe acrobat reader 7.0.5

adobe acrobat 7.0.1

adobe acrobat 7.0.5

adobe acrobat 3d

adobe acrobat reader 7.0

adobe acrobat reader 7.0.1

adobe acrobat reader 7.0.8

adobe acrobat

adobe acrobat reader

Vendor Advisories

Several remote vulnerabilities have been discovered in Mozilla Firefox This will be the last security update of Mozilla-based products for the oldstable (sarge) distribution of Debian We recommend to upgrade to stable (etch) as soon as possible The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2007-1 ...
Mozilla Foundation Security Advisory 2007-02 Improvements to help protect against Cross-Site Scripting attacks Announced February 23, 2007 Reporter various Impact Low Products Firefox, SeaMonkey Fixed in ...

References

CWE-79http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdfhttp://www.wisec.it/vulns.php?page=9http://www.securityfocus.com/archive/1/455836/100/0/threadedhttp://www.securityfocus.com/archive/1/455800/100/0/threadedhttp://www.securityfocus.com/archive/1/455831/100/0/threadedhttp://www.securityfocus.com/archive/1/455790/100/0/threadedhttp://www.disenchant.ch/blog/hacking-with-browser-plugins/34http://www.gnucitizen.org/blog/danger-danger-danger/http://www.adobe.com/support/security/advisories/apsa07-01.htmlhttp://www.kb.cert.org/vuls/id/815960http://securitytracker.com/id?1017469http://secunia.com/advisories/23483http://www.adobe.com/support/security/advisories/apsa07-02.htmlhttps://rhn.redhat.com/errata/RHSA-2007-0017.htmlhttp://www.securityfocus.com/bid/21858http://secunia.com/advisories/23691http://www.gnucitizen.org/blog/universal-pdf-xss-after-partyhttp://www.adobe.com/support/security/bulletins/apsb07-01.htmlhttp://www.mozilla.org/security/announce/2007/mfsa2007-02.htmlhttp://security.gentoo.org/glsa/glsa-200701-16.xmlhttp://www.redhat.com/support/errata/RHSA-2007-0021.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.htmlhttp://secunia.com/advisories/23812http://secunia.com/advisories/23877http://secunia.com/advisories/23882http://secunia.com/advisories/24533http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131http://secunia.com/advisories/24457http://securityreason.com/securityalert/2090http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.htmlhttp://secunia.com/advisories/33754http://www.adobe.com/support/security/bulletins/apsb09-15.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-286B.htmlhttp://securitytracker.com/id?1023007http://www.vupen.com/english/advisories/2009/2898http://www.vupen.com/english/advisories/2007/0032http://www.vupen.com/english/advisories/2007/0957http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742https://exchange.xforce.ibmcloud.com/vulnerabilities/31271https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487http://www.securityfocus.com/archive/1/455906/100/0/threadedhttp://www.securityfocus.com/archive/1/455801/100/0/threadedhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-1336https://www.kb.cert.org/vuls/id/815960