{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2007-0047","title":"Title"},{"category":"description","text":"CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2007-0047","url":"https://www.suse.com/security/cve/CVE-2007-0047"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 231724 for CVE-2007-0047","url":"https://bugzilla.suse.com/231724"},{"category":"external","summary":"Advisory link for SUSE-SA:2007:011","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQ73S2WHF76PZTUSVS6QTLS37WZUNBLH/#AQ73S2WHF76PZTUSVS6QTLS37WZUNBLH"}],"title":"SUSE CVE CVE-2007-0047","tracking":{"current_release_date":"2023-12-09T03:41:27Z","generator":{"date":"2023-02-15T06:13:24Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2007-0047","initial_release_date":"2023-02-15T06:13:24Z","revision_history":[{"date":"2023-02-15T06:13:24Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:19:31Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:41:27Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}