Memory corruption and use-after-free vulnerabilities discovered in Foxit PDF Reader
These vulnerabilities could be triggered if an attacker tricks a user into opening a specially crafted, malicious PDF file, or open the file in a browser that has a PDF reader plugin installed.