Foxit.PDF.Reader.JavaScript.engine.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Foxit PhantomPDF.
The vulnerability is due to insufficient validation of user-supplied inputs. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the context of the current process.
Affected Products
Foxit Reader 12.0.0 and below
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.foxit.com/downloads/#Foxit-Reader/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |