CVE-2007-0045
Summary
| CVE | CVE-2007-0045 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-01-03 21:28:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)." |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Adobe | Acrobat | 7.0 | All | professional | All |
| Application | Adobe | Acrobat | 7.0 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.1 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.1 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.2 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.2 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.3 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.3 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.4 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.4 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.5 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.5 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.6 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.6 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.7 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.7 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.8 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.8 | All | standard | All |
| Application | Adobe | Acrobat | All | All | elements | All |
| Application | Adobe | Acrobat 3d | All | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.1 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.2 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.3 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.4 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.5 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.1 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.2 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.3 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.4 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.5 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.6 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.7 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.8 | All | All | All |
| Application | Adobe | Acrobat Reader | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Adobe - Server-side workarounds to prevent potential cross-site scripting vulnerability in versions 7.0.8 and earlier of Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | |
| US-CERT Technical Cyber Security Alert TA09-286B -- Adobe Reader and Acrobat Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.us-cert.gov | US Government Resource |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| MFSA 2007-02: Improvements to help protect against Cross-Site Scripting attacks | af854a3a-2127-422b-91ae-364da2661108 | www.mozilla.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| Red Hat update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Gentoo update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Hacking with Browser Plugins at Disenchant’s Blog | af854a3a-2127-422b-91ae-364da2661108 | www.disenchant.ch | Exploit |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| SecurityTracker.com Archives - Adobe Acrobat Reader Plugin Bugs Let Remote Users Deny Service, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| Adobe - Cross-site scripting vulnerability in versions 7.0.8 and earlier of Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | Vendor Advisory |
| SecurityReason - Adobe Acrobat Reader Plugin - Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf | af854a3a-2127-422b-91ae-364da2661108 | events.ccc.de | |
| Adobe Acrobat Reader: Multiple vulnerabilities — Gentoo Linux Documentation | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Adobe Reader Plugin Open Parameters Cross-Site Scripting Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Universal PDF XSS After Party | GNUCITIZEN | af854a3a-2127-422b-91ae-364da2661108 | www.gnucitizen.org | |
| Adobe - Security Advisories : Update available for vulnerabilities in versions 7.0.8 and earlier of Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | |
| SecurityTracker.com Archives - Adobe Acrobat and Adobe Reader Flaws Lets Remote Users Execute Arbitrary Code and Deny Service | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| Sun Solaris Adobe Acrobat Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| DANGER, DANGER, DANGER | GNUCITIZEN | af854a3a-2127-422b-91ae-364da2661108 | www.gnucitizen.org | Exploit, Vendor Advisory |
| HPSBUX02153 SSRT061181 rev.7 - HP-UX Running Firefox, Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) - c00771742 - HP Business Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20000.www2.hp.com | |
| sunsolve.sun.com/search/document.do | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| SUSE update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: Acrobat Reader 7.0.9 (SUSE-SA:2007:011) | af854a3a-2127-422b-91ae-364da2661108 | lists.suse.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit |
| Adobe - Security Bulletin APSB09-15 Security Updates Available for Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Google Chrome Releases: Stable, Beta update: Yahoo! Mail and Security Fixes | af854a3a-2127-422b-91ae-364da2661108 | googlechromereleases.blogspot.com | |
| Red Hat update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Google Chrome Cross-Site Scripting and Information Disclosure - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| US-CERT Vulnerability Note VU#815960 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Third Party Advisory, US Government Resource |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Wisec - The WIse SECurity | af854a3a-2127-422b-91ae-364da2661108 | www.wisec.it | Exploit, Patch |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Slackware update for seamonkey - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.