This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
from ZDI: Published Advisories http://ift.tt/2ttd04o
No comments:
Post a Comment