Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin prior to 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x prior to 7.1.4, 8.x prior to 8.1.7, and 9.x prior to 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote malicious users to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
adobe acrobat 7.0.2 |
||
adobe acrobat 7.0.6 |
||
adobe acrobat 7.0.7 |
||
adobe acrobat reader 6.0 |
||
adobe acrobat reader 6.0.1 |
||
adobe acrobat reader 7.0.2 |
||
adobe acrobat reader 7.0.3 |
||
adobe acrobat 7.0.4 |
||
adobe acrobat 7.0.8 |
||
adobe acrobat 7.0 |
||
adobe acrobat reader 6.0.4 |
||
adobe acrobat reader 6.0.5 |
||
adobe acrobat reader 7.0.6 |
||
adobe acrobat reader 7.0.7 |
||
adobe acrobat 7.0.3 |
||
adobe acrobat reader 6.0.2 |
||
adobe acrobat reader 6.0.3 |
||
adobe acrobat reader 7.0.4 |
||
adobe acrobat reader 7.0.5 |
||
adobe acrobat 7.0.1 |
||
adobe acrobat 7.0.5 |
||
adobe acrobat 3d |
||
adobe acrobat reader 7.0 |
||
adobe acrobat reader 7.0.1 |
||
adobe acrobat reader 7.0.8 |
||
adobe acrobat |
||
adobe acrobat reader |