Vulnerability Name: CVE-2007-0045 (CCN-31271) Assigned: 2007-01-03 Published: 2007-01-03 Updated: 2018-10-16 Summary: Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)." CVSS v3 Severity: 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )6.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-79 Vulnerability Consequences: Gain Access References: Source: CCN Type: Full-Disclosure Mailing List, Wed Jan 03 2007 - 11:22:49 CSTAdobe Acrobat Reader Plugin - Multiple Vulnerabilities Source: MITRE Type: CNACVE-2007-0045 Source: MISC Type: UNKNOWNhttp://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf Source: CCN Type: Google Chrome Releases Blog, Wednesday, January 28, 2009 | 00:37 Stable, Beta update: Yahoo! Mail and Security Fixes Source: CONFIRM Type: UNKNOWNhttp://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html Source: HP Type: UNKNOWNHPSBUX02153 Source: SUSE Type: UNKNOWNSUSE-SA:2007:011 Source: CCN Type: RHSA-2007-0017Critical: Adobe Acrobat Reader security update Source: CCN Type: RHSA-2007-0021Critical: Adobe Acrobat Reader security update Source: CCN Type: SA23483Adobe Reader / Acrobat Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory23483 Source: SECUNIA Type: Vendor Advisory23691 Source: SECUNIA Type: Vendor Advisory23812 Source: SECUNIA Type: Vendor Advisory23877 Source: SECUNIA Type: Vendor Advisory23882 Source: SECUNIA Type: Vendor Advisory24457 Source: CCN Type: SA24533Sun Solaris Adobe Acrobat Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory24533 Source: CCN Type: SA33754Google Chrome Cross-Site Scripting and Information Disclosure Source: SECUNIA Type: Vendor Advisory33754 Source: GENTOO Type: UNKNOWNGLSA-200701-16 Source: SREASON Type: UNKNOWN2090 Source: CCN Type: SECTRACK ID: 1017469Adobe Acrobat Reader Plugin Bugs Let Remote Users Deny Service, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1017469 Source: CCN Type: SECTRACK ID: 1023007Adobe Acrobat and Adobe Reader Flaws Lets Remote Users Execute Arbitrary Code and Deny Service Source: SECTRACK Type: UNKNOWN1023007 Source: SLACKWARE Type: UNKNOWNSSA:2007-066-05 Source: CCN Type: Sun Alert ID: 102847Multiple Security Vulnerabilities in Adobe Reader May Lead to Execution of Arbitrary Code Source: SUNALERT Type: UNKNOWN102847 Source: CCN Type: Sun Alert: 270669Multiple Security Vulnerabilities in Adobe Reader for Solaris 10 May Allow Execution of Arbitrary Code or Cause Denial of Service (DoS) - Adobe Security Bulletin APSB09-15 Source: CCN Type: ASA-2007-055Adobe Acrobat Reader security update (RHSA-2007-0017) Source: CCN Type: ASA-2007-134Multiple Security Vulnerabilities in Adobe Reader May Lead to Execution of Arbitrary Code (Sun 102847) Source: CCN Type: Adobe Acrobat Reader Plugin Web siteAdobe - Reader Source: CCN Type: Adobe Security Advisory APSA07-01Cross-site scripting vulnerability in versions 7.0.8 and earlier of Adobe Reader and Acrobat Source: CONFIRM Type: Vendor Advisoryhttp://www.adobe.com/support/security/advisories/apsa07-01.html Source: CONFIRM Type: UNKNOWNhttp://www.adobe.com/support/security/advisories/apsa07-02.html Source: CONFIRM Type: UNKNOWNhttp://www.adobe.com/support/security/bulletins/apsb07-01.html Source: CCN Type: Adobe Product Security Bulletin APSB09-15Security Advisory for Adobe Reader and Acrobat Source: CONFIRM Type: UNKNOWNhttp://www.adobe.com/support/security/bulletins/apsb09-15.html Source: DEBIAN Type: DSA-1336mozilla-firefox -- several vulnerabilities Source: MISC Type: Exploithttp://www.disenchant.ch/blog/hacking-with-browser-plugins/34 Source: CCN Type: GLSA-200701-16Adobe Acrobat Reader: Multiple vulnerabilities Source: CCN Type: GLSA-200910-03Adobe Reader: Multiple vulnerabilities Source: CONFIRM Type: Exploit, Vendor Advisoryhttp://www.gnucitizen.org/blog/danger-danger-danger/ Source: MISC Type: UNKNOWNhttp://www.gnucitizen.org/blog/universal-pdf-xss-after-party Source: CCN Type: US-CERT VU#815960Adobe Acrobat Plug-In cross domain violation Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#815960 Source: CONFIRM Type: UNKNOWNhttp://www.mozilla.org/security/announce/2007/mfsa2007-02.html Source: REDHAT Type: UNKNOWNRHSA-2007:0021 Source: BUGTRAQ Type: Exploit20070103 Universal XSS with PDF files: highly dangerous Source: BUGTRAQ Type: UNKNOWN20070103 Re: Universal XSS with PDF files: highly dangerous Source: BUGTRAQ Type: UNKNOWN20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities Source: BUGTRAQ Type: Exploit20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Source: BUGTRAQ Type: UNKNOWN20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Source: BUGTRAQ Type: UNKNOWN20070104 Universal PDF XSS After Party Source: BID Type: UNKNOWN21858 Source: CCN Type: BID-21858Adobe Reader Plugin Open Parameters Cross-Site Scripting Vulnerability Source: CCN Type: BID-33529Google Chrome Cross Site Scripting and Cross Domain Security Bypass Vulnerabilities Source: CCN Type: TLSA-2007-6Multiple vulnerabilities in AdobeReader Source: CERT Type: US Government ResourceTA09-286B Source: VUPEN Type: Vendor AdvisoryADV-2007-0032 Source: VUPEN Type: Vendor AdvisoryADV-2007-0957 Source: VUPEN Type: Vendor AdvisoryADV-2009-2898 Source: MISC Type: Exploit, Patchhttp://www.wisec.it/vulns.php?page=9 Source: XF Type: UNKNOWNadobe-acrobat-pdf-xss(31271) Source: XF Type: UNKNOWNadobe-acrobat-pdf-xss(31271) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:6487 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:9693 Source: REDHAT Type: UNKNOWNRHSA-2007:0017 Source: SUSE Type: SUSE-SA:2007:011Acrobat Reader 7.0.9 update Source: SUSE Type: SUSE-SA:2009:049Acrobat Reader Security update Vulnerable Configuration: Configuration 1 :cpe:/a:adobe:acrobat:7.0:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:*:*:elements:*:*:*:*:* (Version <= 7.0.8) OR cpe:/a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:3.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:3.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:4.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:5.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:5.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:9:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.8:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.0.9:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:8.1.1:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:9.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.1.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:8.1.2:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.1.1:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:8.1.4:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:9.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:9.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:9.0.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:9.1.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:3.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:4.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:4.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:4.0.5a:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:4.0.5c:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:4.5:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.10:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.11:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.1:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.9:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:5.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:7.1.3:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:9.1.3:*:*:*:*:*:*:* OR cpe:/a:adobe:reader:8.1.6:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/a:google:chrome:1.0.154.36:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20070045 V CVE-2007-0045 2015-11-16 oval:org.mitre.oval:def:6487 V Adobe Reader and Acrobat Multiple Vulnerabilities 2013-08-12 oval:org.mitre.oval:def:9693 V Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)." 2010-09-06 oval:org.debian:def:1336 V several vulnerabilities 2007-07-22
BACK
adobe acrobat 7.0
adobe acrobat 7.0
adobe acrobat 7.0.1
adobe acrobat 7.0.1
adobe acrobat 7.0.2
adobe acrobat 7.0.2
adobe acrobat 7.0.3
adobe acrobat 7.0.3
adobe acrobat 7.0.4
adobe acrobat 7.0.4
adobe acrobat 7.0.5
adobe acrobat 7.0.5
adobe acrobat 7.0.6
adobe acrobat 7.0.6
adobe acrobat 7.0.7
adobe acrobat 7.0.7
adobe acrobat *
adobe acrobat 7.0.8
adobe acrobat 7.0.8
adobe acrobat 3d *
adobe acrobat reader 6.0
adobe acrobat reader 6.0.1
adobe acrobat reader 6.0.2
adobe acrobat reader 6.0.3
adobe acrobat reader 6.0.4
adobe acrobat reader 6.0.5
adobe acrobat reader 7.0
adobe acrobat reader 7.0.1
adobe acrobat reader 7.0.2
adobe acrobat reader 7.0.3
adobe acrobat reader 7.0.4
adobe acrobat reader 7.0.5
adobe acrobat reader 7.0.6
adobe acrobat reader 7.0.7
adobe acrobat reader 7.0.8
adobe acrobat reader 6.0.1
adobe acrobat reader 6.0
adobe acrobat reader 6.0.2
adobe acrobat reader 7.0
adobe acrobat reader 7.0.1
adobe acrobat 7.0
adobe acrobat 7.0.1
adobe acrobat reader 7.0.2
adobe acrobat 3d *
adobe acrobat reader 6.0.3
adobe acrobat reader 6.0.4
adobe acrobat reader 6.0.5
adobe acrobat reader 7.0.3
adobe acrobat reader 7.0.4
adobe acrobat reader 7.0.5
adobe acrobat reader 7.0.6
adobe acrobat reader 7.0.7
adobe acrobat reader 7.0.8
adobe acrobat 3.0
adobe acrobat 3.1
adobe acrobat 4.0
adobe acrobat 4.0.5
adobe acrobat 4.0.5a
adobe acrobat 4.0.5c
adobe acrobat 5.0
adobe acrobat 5.0.10
adobe acrobat 5.0.5
adobe acrobat 5.0.6
adobe acrobat 6.0
adobe acrobat 6.0.1
adobe acrobat 6.0.2
adobe acrobat 6.0.3
adobe acrobat 6.0.4
adobe acrobat 6.0.5
adobe acrobat 7.0.2
adobe acrobat 7.0.3
adobe acrobat 7.0.4
adobe acrobat 7.0.5
adobe acrobat 7.0.6
adobe acrobat 7.0.7
adobe acrobat 7.0.8
adobe acrobat 7.0.9
adobe acrobat 8.1
adobe acrobat 8.1.1
adobe acrobat 7.0
adobe acrobat 7.0
adobe acrobat 7.0.1
adobe acrobat 7.0.1
adobe acrobat 7.0.2
adobe acrobat 7.0.2
adobe acrobat 7.0.3
adobe acrobat 7.0.3
adobe acrobat 7.0.4
adobe acrobat 7.0.4
adobe acrobat 7.0.5
adobe acrobat 7.0.5
adobe acrobat 7.0.6
adobe acrobat 7.0.6
adobe acrobat 7.0.7
adobe acrobat 7.0.7
adobe acrobat 7.0.8
adobe acrobat 7.0.8
adobe acrobat 9
adobe acrobat 8.1.2
adobe reader 7.0.1
adobe reader 7.0.2
adobe reader 7.0.3
adobe reader 7.0.5
adobe reader 7.0.7
adobe reader 7.0.8
adobe reader 7.0.9
adobe reader 8.1.1
adobe reader 9.0
adobe reader 7.1.0
adobe reader 8.1.2
adobe reader 7.1.1
adobe reader 8.1.4
adobe reader 9.1
adobe acrobat 9.1
adobe acrobat 9.1.1
adobe acrobat 9.0.0
adobe acrobat 8.1.3
adobe acrobat 8.1.4
adobe acrobat 9.1.2
adobe reader 9.1.2
adobe acrobat 9.1.3
adobe acrobat 7.1.3
adobe acrobat 8.1.6
adobe reader 3.0
adobe reader 4.0
adobe reader 4.0.5
adobe reader 4.0.5a
adobe reader 4.0.5c
adobe reader 4.5
adobe reader 5.0
adobe reader 5.0.10
adobe reader 5.0.11
adobe reader 5.0.5
adobe reader 6.0
adobe reader 5.1
adobe reader 5.0.9
adobe reader 5.0.7
adobe reader 5.0.6
adobe reader 6.0.5
adobe reader 6.0.4
adobe reader 6.0.3
adobe reader 6.0.2
adobe reader 6.0.1
adobe reader 7.1.3
adobe reader 9.1.3
adobe reader 8.1.6
gentoo linux *
suse linux enterprise server 8
novell linux desktop 9
debian debian linux 3.1
sun solaris 10
suse suse linux 10.0
redhat rhel extras 3
redhat rhel extras 4
suse suse linux 10.1
turbolinux turbolinux fuji
novell opensuse 10.2
novell opensuse 10.3
suse suse linux 9.3
novell opensuse 11.0
google chrome 1.0.154.36