Adobe Reader and Acrobat DoS via long sequence of # (hash) charactersID: oval:org.mitre.oval:def:6348 | Date: (C)2009-10-23 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
Platform: |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Vista |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 10 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 8.1 |
Product: |
Adobe Reader |
Adobe Acrobat |