CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
98.9%
Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
Vendor | Product | Version | CPE |
---|---|---|---|
adobe | acrobat_reader | * | cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* |
events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
secunia.com/advisories/23691
secunia.com/advisories/23812
secunia.com/advisories/23877
secunia.com/advisories/23882
secunia.com/advisories/24533
security.gentoo.org/glsa/glsa-200701-16.xml
securityreason.com/securityalert/2090
securitytracker.com/id?1017469
sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
www.adobe.com/support/security/bulletins/apsb07-01.html
www.redhat.com/support/errata/RHSA-2007-0021.html
www.securityfocus.com/archive/1/455801/100/0/threaded
www.vupen.com/english/advisories/2007/0032
www.vupen.com/english/advisories/2007/0957
www.wisec.it/vulns.php?page=9
exchange.xforce.ibmcloud.com/vulnerabilities/31272
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9684
rhn.redhat.com/errata/RHSA-2007-0017.html