CVE-2007-0045

N/A Unknown
Published: January 03, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/23483
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23691
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23812
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23877
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23882
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/24457
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/24533
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/33754
Source: cve@mitre.org
Vendor Advisory
http://www.gnucitizen.org/blog/danger-danger-danger/
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/815960
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2007/0032
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0957
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898
Source: cve@mitre.org
Vendor Advisory
http://www.wisec.it/vulns.php?page=9
Source: cve@mitre.org
Exploit Patch
http://secunia.com/advisories/23483
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23691
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23812
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23877
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23882
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24457
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24533
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/33754
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200701-16.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/2090
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017469
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1023007
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.adobe.com/support/security/advisories/apsa07-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.adobe.com/support/security/advisories/apsa07-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.adobe.com/support/security/bulletins/apsb07-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.adobe.com/support/security/bulletins/apsb09-15.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.disenchant.ch/blog/hacking-with-browser-plugins/34
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.gnucitizen.org/blog/danger-danger-danger/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.gnucitizen.org/blog/universal-pdf-xss-after-party
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/815960
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0021.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/455790/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/455800/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/455801/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/455831/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/455836/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/455906/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/21858
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2007/0032
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0957
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.wisec.it/vulns.php?page=9
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/31271
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2007-0017.html
Source: af854a3a-2127-422b-91ae-364da2661108

88 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
61.4%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

adobe