Menu
This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.8. ![]() An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. The issue results from incorrect permissions set on a resource used by the service. The specific flaw exists within the handling of the configuration files used by the Foxit PhantomPDF Update Service. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ![]() ![]() ![]() This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PhantomPDF 10.8. Autor Martin Hořický | Zranitelnosti vysoké závažnosti
0 Comments
Leave a Reply. |