Description
Multiple use-after-free vulnerabilities were found in Foxit products. By exploiting these vulnerabilities malicious users can execute arbitrary code. These vulnerabilities can be exploited remotely via a specially designed PDF document.
Technical details
Vulnerabilities related to Print method and App object handling.
Original advisories
Related products
CVE list
- CVE-2015-8580 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!