Threat Encyclopedia



This indicates an attack attempt to exploit a Use After Free Vulnerability in Foxit Software PDF Reader.
This vulnerability is due to improper handling of a crafted PDF file. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.

affected-products-logoAffected Products

Foxit PDF Reader 32-bit

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References


Other References


Telemetry logoTelemetry