Adobe Acrobat Reader Plugin 7.0.x - 'acroreader' Cross-Site Scripting

Author: Stefano Di Paola
type: remote
platform: windows
port: 
date_added: 2007-01-04  
date_updated: 2016-09-20  
verified: 1  
codes: CVE-2007-0046  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 3084.txt  
# Stefano Di Paola
# http://www.wisec.it/

From Secunia:
Input passed to a hosted PDF file is not properly sanitised by the browser plug-in
before being returned to users. This can be exploited to execute arbitrary script code in
a user's browser session in context of an affected site.

Example:
- http://[host]/[filename].pdf#[some text]=javascript:[code]

# milw0rm.com [2007-01-05]