Foxit Reader Remote Code Execution Vulnerability
To exploit this issue, an attacker must entice an unsuspecting user into visiting a malicious webpage or opening a specially crafted PDF file. The following exploits are available: |
Privacy Statement |