Detect date
?
|
12/16/2015 |
Severity
?
|
High |
Description
|
Multiple use-after-free vulnerabilities were found in Foxit products. By exploiting these vulnerabilities malicious users can execute arbitrary code. These vulnerabilities can be exploited remotely via a specially designed PDF document. Technical details Vulnerabilities related to Print method and App object handling. |
Affected products
|
Foxit Reader versions earlier than 7.2.2 |
Solution
|
Update to the latest version |
Impacts
?
|
ACE [?] |
Related products
|
Foxit Reader Foxit Phantom PDF |
CVE-IDS
?
|
|
Find out the statistics of the vulnerabilities spreading in your region |