Executive Summary

Informations
Name CVE-2006-1785 First vendor Publication 2006-04-13
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:S/C:N/I:P/A:N)
Cvss Base Score 2.1 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 3.9 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the "Update Download Site" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1785

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
24588 Adobe Document Server for Reader Extensions ads-readerext Update Download Sit...

Adobe Document Server for Reader Extensions contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ReaderURL' variable upon submission to the "Update Download Site" section of "ads-readerext" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2006-04-14 Name : The remote web server is affected by multiple flaws.
File : adobe_document_server_61.nasl - Type : ACT_ATTACK

Sources (Detail)

http://secunia.com/advisories/15924
http://secunia.com/secunia_research/2005-68/advisory/
http://www.adobe.com/support/techdocs/322699.html
http://www.osvdb.org/24588
http://www.securityfocus.com/archive/1/430869/100/0/threaded
http://www.securityfocus.com/bid/17500
http://www.vupen.com/english/advisories/2006/1342
https://exchange.xforce.ibmcloud.com/vulnerabilities/25770
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 23:20:44
  • Multiple Updates
2024-11-28 12:08:43
  • Multiple Updates
2021-05-04 12:03:55
  • Multiple Updates
2021-04-22 01:04:28
  • Multiple Updates
2020-05-23 00:17:39
  • Multiple Updates
2018-10-18 21:20:04
  • Multiple Updates
2017-07-20 09:23:30
  • Multiple Updates
2016-06-28 15:43:40
  • Multiple Updates
2016-04-26 14:30:25
  • Multiple Updates
2014-02-17 10:35:27
  • Multiple Updates
2013-05-11 10:54:10
  • Multiple Updates