Description
Adobe Reader and Acrobat Trial allow remote attackers to read arbitrary files via a file:// URI in a PDF document, as demonstrated with <</URI(file:///C:/)/S/URI>>, a different issue than CVE-2007-0045.
Exploits (1)
References (7)
Core 7
Core References
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22753
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200803-01.xml
Exploit x_refsource_misc
http://www.gnucitizen.org/projects/pdf-strikes-back/
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29205
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24408
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32815
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33897
Scores
EPSS
0.2466
EPSS Percentile
96.2%
Details
Status
published
Products (26)
adobe/acrobat_reader
4.0
adobe/acrobat_reader
4.0.5
adobe/acrobat_reader
4.5
adobe/acrobat_reader
5.0
adobe/acrobat_reader
5.0.5
adobe/acrobat_reader
5.0.6
adobe/acrobat_reader
5.0.7
adobe/acrobat_reader
5.0.9
adobe/acrobat_reader
5.0.10
adobe/acrobat_reader
5.1
... and 16 more
Published
Mar 02, 2007
Tracked Since
Feb 18, 2026