![]() ![]() ![]() ![]() Due to the manner in which certain JavaScript code or annotation objects are handled, a maliciously crafted PDF file may lead to the reuse of previously free memory and arbitrary code execution.Īll three flaws are use-after-free vulnerabilities in the JavaScript engine of PDF Reader that an attacker could exploit by tricking the target into opening a malicious PDF file. Three of the vulnerabilities addressed by Foxit were identified by Cisco Talos researchers, all three leading to arbitrary code execution. #Foxit pdf reader softwareFoxit Software this week released security updates for its PDF Reader and PDF Editor applications, to address multiple vulnerabilities, including some leading to remote code execution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |