Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-0046Double Free in Adobe Acrobat Reader

7 documents5 sources
Severity
7.5HIGHNVD
EPSS
64.9%
top 1.52%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 3
Latest updateMay 1

Description

Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-q78c-5c63-6wq4: Double free vulnerability in the Adobe Acrobat Reader Plugin before 82022-05-01

💥Exploits & PoCs

1
Exploit-DB
Adobe Acrobat Reader Plugin 7.0.x - 'acroreader' Cross-Site Scripting2007-01-05

📋Vendor Advisories

1
Red Hat
security flaw2007-01-03

💬Community

3
Bugzilla
CVE-2007-0046 security flaw2018-08-16
Bugzilla
CVE-2006-5857 Multiple Acrobat vulnerabilities (CVE-2007-0045 CVE-2007-0046)2007-01-11
Bugzilla
CVE-2006-5857 Multiple Acrobat vulnerabilities (CVE-2007-0045 CVE-2007-0046)2007-01-05
CVE-2007-0046 — Double Free in Adobe Acrobat Reader | cvebase