Foxit Reader Remote Code Execution Vulnerability

To exploit this issue, an attacker must entice an unsuspecting user into visiting a malicious webpage or opening a specially crafted PDF file.

The following exploits are available:


 

Privacy Statement
Copyright 2010, SecurityFocus