Vulnerability Name:

CVE-2007-0045 (CCN-31271)

Assigned:2007-01-03
Published:2007-01-03
Updated:2018-10-16
Summary:Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Wed Jan 03 2007 - 11:22:49 CST
Adobe Acrobat Reader Plugin - Multiple Vulnerabilities

Source: MITRE
Type: CNA
CVE-2007-0045

Source: MISC
Type: UNKNOWN
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf

Source: CCN
Type: Google Chrome Releases Blog, Wednesday, January 28, 2009 | 00:37
Stable, Beta update: Yahoo! Mail and Security Fixes

Source: CONFIRM
Type: UNKNOWN
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html

Source: HP
Type: UNKNOWN
HPSBUX02153

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:011

Source: CCN
Type: RHSA-2007-0017
Critical: Adobe Acrobat Reader security update

Source: CCN
Type: RHSA-2007-0021
Critical: Adobe Acrobat Reader security update

Source: CCN
Type: SA23483
Adobe Reader / Acrobat Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
23483

Source: SECUNIA
Type: Vendor Advisory
23691

Source: SECUNIA
Type: Vendor Advisory
23812

Source: SECUNIA
Type: Vendor Advisory
23877

Source: SECUNIA
Type: Vendor Advisory
23882

Source: SECUNIA
Type: Vendor Advisory
24457

Source: CCN
Type: SA24533
Sun Solaris Adobe Acrobat Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
24533

Source: CCN
Type: SA33754
Google Chrome Cross-Site Scripting and Information Disclosure

Source: SECUNIA
Type: Vendor Advisory
33754

Source: GENTOO
Type: UNKNOWN
GLSA-200701-16

Source: SREASON
Type: UNKNOWN
2090

Source: CCN
Type: SECTRACK ID: 1017469
Adobe Acrobat Reader Plugin Bugs Let Remote Users Deny Service, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017469

Source: CCN
Type: SECTRACK ID: 1023007
Adobe Acrobat and Adobe Reader Flaws Lets Remote Users Execute Arbitrary Code and Deny Service

Source: SECTRACK
Type: UNKNOWN
1023007

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-066-05

Source: CCN
Type: Sun Alert ID: 102847
Multiple Security Vulnerabilities in Adobe Reader May Lead to Execution of Arbitrary Code

Source: SUNALERT
Type: UNKNOWN
102847

Source: CCN
Type: Sun Alert: 270669
Multiple Security Vulnerabilities in Adobe Reader for Solaris 10 May Allow Execution of Arbitrary Code or Cause Denial of Service (DoS) - Adobe Security Bulletin APSB09-15

Source: CCN
Type: ASA-2007-055
Adobe Acrobat Reader security update (RHSA-2007-0017)

Source: CCN
Type: ASA-2007-134
Multiple Security Vulnerabilities in Adobe Reader May Lead to Execution of Arbitrary Code (Sun 102847)

Source: CCN
Type: Adobe Acrobat Reader Plugin Web site
Adobe - Reader

Source: CCN
Type: Adobe Security Advisory APSA07-01
Cross-site scripting vulnerability in versions 7.0.8 and earlier of Adobe Reader and Acrobat

Source: CONFIRM
Type: Vendor Advisory
http://www.adobe.com/support/security/advisories/apsa07-01.html

Source: CONFIRM
Type: UNKNOWN
http://www.adobe.com/support/security/advisories/apsa07-02.html

Source: CONFIRM
Type: UNKNOWN
http://www.adobe.com/support/security/bulletins/apsb07-01.html

Source: CCN
Type: Adobe Product Security Bulletin APSB09-15
Security Advisory for Adobe Reader and Acrobat

Source: CONFIRM
Type: UNKNOWN
http://www.adobe.com/support/security/bulletins/apsb09-15.html

Source: DEBIAN
Type: DSA-1336
mozilla-firefox -- several vulnerabilities

Source: MISC
Type: Exploit
http://www.disenchant.ch/blog/hacking-with-browser-plugins/34

Source: CCN
Type: GLSA-200701-16
Adobe Acrobat Reader: Multiple vulnerabilities

Source: CCN
Type: GLSA-200910-03
Adobe Reader: Multiple vulnerabilities

Source: CONFIRM
Type: Exploit, Vendor Advisory
http://www.gnucitizen.org/blog/danger-danger-danger/

Source: MISC
Type: UNKNOWN
http://www.gnucitizen.org/blog/universal-pdf-xss-after-party

Source: CCN
Type: US-CERT VU#815960
Adobe Acrobat Plug-In cross domain violation

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#815960

Source: CONFIRM
Type: UNKNOWN
http://www.mozilla.org/security/announce/2007/mfsa2007-02.html

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0021

Source: BUGTRAQ
Type: Exploit
20070103 Universal XSS with PDF files: highly dangerous

Source: BUGTRAQ
Type: UNKNOWN
20070103 Re: Universal XSS with PDF files: highly dangerous

Source: BUGTRAQ
Type: UNKNOWN
20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities

Source: BUGTRAQ
Type: Exploit
20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

Source: BUGTRAQ
Type: UNKNOWN
20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

Source: BUGTRAQ
Type: UNKNOWN
20070104 Universal PDF XSS After Party

Source: BID
Type: UNKNOWN
21858

Source: CCN
Type: BID-21858
Adobe Reader Plugin Open Parameters Cross-Site Scripting Vulnerability

Source: CCN
Type: BID-33529
Google Chrome Cross Site Scripting and Cross Domain Security Bypass Vulnerabilities

Source: CCN
Type: TLSA-2007-6
Multiple vulnerabilities in AdobeReader

Source: CERT
Type: US Government Resource
TA09-286B

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0032

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0957

Source: VUPEN
Type: Vendor Advisory
ADV-2009-2898

Source: MISC
Type: Exploit, Patch
http://www.wisec.it/vulns.php?page=9

Source: XF
Type: UNKNOWN
adobe-acrobat-pdf-xss(31271)

Source: XF
Type: UNKNOWN
adobe-acrobat-pdf-xss(31271)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:6487

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9693

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0017

Source: SUSE
Type: SUSE-SA:2007:011
Acrobat Reader 7.0.9 update

Source: SUSE
Type: SUSE-SA:2009:049
Acrobat Reader Security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:*:*:elements:*:*:*:*:* (Version <= 7.0.8)
  • OR cpe:/a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.1::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.1::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.2::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.2::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.3::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.3::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.4::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.4::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.5::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.5::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.6::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.6::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.7::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.7::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.8::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.0.8::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:4.0.5a:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:4.0.5c:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:google:chrome:1.0.154.36:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20070045
    V
    CVE-2007-0045
    2015-11-16
    oval:org.mitre.oval:def:6487
    V
    Adobe Reader and Acrobat Multiple Vulnerabilities
    2013-08-12
    oval:org.mitre.oval:def:9693
    V
    Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
    2010-09-06
    oval:org.debian:def:1336
    V
    several vulnerabilities
    2007-07-22
    BACK
    adobe acrobat 7.0
    adobe acrobat 7.0
    adobe acrobat 7.0.1
    adobe acrobat 7.0.1
    adobe acrobat 7.0.2
    adobe acrobat 7.0.2
    adobe acrobat 7.0.3
    adobe acrobat 7.0.3
    adobe acrobat 7.0.4
    adobe acrobat 7.0.4
    adobe acrobat 7.0.5
    adobe acrobat 7.0.5
    adobe acrobat 7.0.6
    adobe acrobat 7.0.6
    adobe acrobat 7.0.7
    adobe acrobat 7.0.7
    adobe acrobat *
    adobe acrobat 7.0.8
    adobe acrobat 7.0.8
    adobe acrobat 3d *
    adobe acrobat reader 6.0
    adobe acrobat reader 6.0.1
    adobe acrobat reader 6.0.2
    adobe acrobat reader 6.0.3
    adobe acrobat reader 6.0.4
    adobe acrobat reader 6.0.5
    adobe acrobat reader 7.0
    adobe acrobat reader 7.0.1
    adobe acrobat reader 7.0.2
    adobe acrobat reader 7.0.3
    adobe acrobat reader 7.0.4
    adobe acrobat reader 7.0.5
    adobe acrobat reader 7.0.6
    adobe acrobat reader 7.0.7
    adobe acrobat reader 7.0.8
    adobe acrobat reader 6.0.1
    adobe acrobat reader 6.0
    adobe acrobat reader 6.0.2
    adobe acrobat reader 7.0
    adobe acrobat reader 7.0.1
    adobe acrobat 7.0
    adobe acrobat 7.0.1
    adobe acrobat reader 7.0.2
    adobe acrobat 3d *
    adobe acrobat reader 6.0.3
    adobe acrobat reader 6.0.4
    adobe acrobat reader 6.0.5
    adobe acrobat reader 7.0.3
    adobe acrobat reader 7.0.4
    adobe acrobat reader 7.0.5
    adobe acrobat reader 7.0.6
    adobe acrobat reader 7.0.7
    adobe acrobat reader 7.0.8
    adobe acrobat 3.0
    adobe acrobat 3.1
    adobe acrobat 4.0
    adobe acrobat 4.0.5
    adobe acrobat 4.0.5a
    adobe acrobat 4.0.5c
    adobe acrobat 5.0
    adobe acrobat 5.0.10
    adobe acrobat 5.0.5
    adobe acrobat 5.0.6
    adobe acrobat 6.0
    adobe acrobat 6.0.1
    adobe acrobat 6.0.2
    adobe acrobat 6.0.3
    adobe acrobat 6.0.4
    adobe acrobat 6.0.5
    adobe acrobat 7.0.2
    adobe acrobat 7.0.3
    adobe acrobat 7.0.4
    adobe acrobat 7.0.5
    adobe acrobat 7.0.6
    adobe acrobat 7.0.7
    adobe acrobat 7.0.8
    adobe acrobat 7.0.9
    adobe acrobat 8.1
    adobe acrobat 8.1.1
    adobe acrobat 7.0
    adobe acrobat 7.0
    adobe acrobat 7.0.1
    adobe acrobat 7.0.1
    adobe acrobat 7.0.2
    adobe acrobat 7.0.2
    adobe acrobat 7.0.3
    adobe acrobat 7.0.3
    adobe acrobat 7.0.4
    adobe acrobat 7.0.4
    adobe acrobat 7.0.5
    adobe acrobat 7.0.5
    adobe acrobat 7.0.6
    adobe acrobat 7.0.6
    adobe acrobat 7.0.7
    adobe acrobat 7.0.7
    adobe acrobat 7.0.8
    adobe acrobat 7.0.8
    adobe acrobat 9
    adobe acrobat 8.1.2
    adobe reader 7.0.1
    adobe reader 7.0.2
    adobe reader 7.0.3
    adobe reader 7.0.5
    adobe reader 7.0.7
    adobe reader 7.0.8
    adobe reader 7.0.9
    adobe reader 8.1.1
    adobe reader 9.0
    adobe reader 7.1.0
    adobe reader 8.1.2
    adobe reader 7.1.1
    adobe reader 8.1.4
    adobe reader 9.1
    adobe acrobat 9.1
    adobe acrobat 9.1.1
    adobe acrobat 9.0.0
    adobe acrobat 8.1.3
    adobe acrobat 8.1.4
    adobe acrobat 9.1.2
    adobe reader 9.1.2
    adobe acrobat 9.1.3
    adobe acrobat 7.1.3
    adobe acrobat 8.1.6
    adobe reader 3.0
    adobe reader 4.0
    adobe reader 4.0.5
    adobe reader 4.0.5a
    adobe reader 4.0.5c
    adobe reader 4.5
    adobe reader 5.0
    adobe reader 5.0.10
    adobe reader 5.0.11
    adobe reader 5.0.5
    adobe reader 6.0
    adobe reader 5.1
    adobe reader 5.0.9
    adobe reader 5.0.7
    adobe reader 5.0.6
    adobe reader 6.0.5
    adobe reader 6.0.4
    adobe reader 6.0.3
    adobe reader 6.0.2
    adobe reader 6.0.1
    adobe reader 7.1.3
    adobe reader 9.1.3
    adobe reader 8.1.6
    gentoo linux *
    suse linux enterprise server 8
    novell linux desktop 9
    debian debian linux 3.1
    sun solaris 10
    suse suse linux 10.0
    redhat rhel extras 3
    redhat rhel extras 4
    suse suse linux 10.1
    turbolinux turbolinux fuji
    novell opensuse 10.2
    novell opensuse 10.3
    suse suse linux 9.3
    novell opensuse 11.0
    google chrome 1.0.154.36