Adobe Acrobat Reader Plugin prior to 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x prior to 7.1.4, 8.x prior to 8.1.7, and 9.x prior to 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote malicious users to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
adobe acrobat 7.0.2 |
||
adobe acrobat 7.0.6 |
||
adobe acrobat 3d |
||
adobe acrobat reader 6.0 |
||
adobe acrobat reader 6.0.1 |
||
adobe acrobat reader 7.0.2 |
||
adobe acrobat reader 7.0.3 |
||
adobe acrobat reader |
||
adobe acrobat 7.0.4 |
||
adobe acrobat 7.0.8 |
||
adobe acrobat reader 6.0.4 |
||
adobe acrobat reader 6.0.5 |
||
adobe acrobat reader 7.0.6 |
||
adobe acrobat reader 7.0.7 |
||
adobe acrobat 7.0.3 |
||
adobe acrobat 7.0.7 |
||
adobe acrobat reader 6.0.2 |
||
adobe acrobat reader 6.0.3 |
||
adobe acrobat reader 7.0.4 |
||
adobe acrobat reader 7.0.5 |
||
adobe acrobat 7.0.1 |
||
adobe acrobat 7.0.5 |
||
adobe acrobat 7.0 |
||
adobe acrobat reader 7.0 |
||
adobe acrobat reader 7.0.1 |
||
adobe acrobat reader 7.0.8 |
||
adobe acrobat |