Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2007-0044

CVE information

Published

15 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding.".

CVSSv2.0 Score

Severity
Medium
Base Score
4.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
None
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  Yes
- -