Multiple use-after-free vulnerabilities in the (1) Print method and (2) App object handling in Foxit Reader before 7.2.2 and Foxit PhantomPDF before 7.2.2 allow remote attackers to execute arbitrary code via a crafted PDF document.
http://www.zerodayinitiative.com/advisories/ZDI-15-623
http://www.zerodayinitiative.com/advisories/ZDI-15-622
https://www.foxitsoftware.com/support/security-bulletins.php#FRD-34
Source: Mitre, NVD
Published: 2015-12-16
Updated: 2025-04-12
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00526