Description
Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder.
Exploits (1)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73432
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/130840/Foxit-Reader-7.0.6.1126-Privilege-Escalation.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1031879
Patch, Vendor Advisory x_refsource_confirm
http://www.foxitsoftware.com/support/security_bulletins.php#FRD-25
Third Party Advisory x_refsource_misc
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36390
Scores
EPSS
0.0018
EPSS Percentile
38.7%
Details
Status
published
Products (7)
foxitsoftware/foxit_reader
6.1
foxitsoftware/foxit_reader
6.1.2
foxitsoftware/foxit_reader
6.1.4
foxitsoftware/foxit_reader
6.2
foxitsoftware/foxit_reader
6.2.1
foxitsoftware/foxit_reader
7.0
foxitsoftware/foxit_reader
7.0.6
Published
Mar 30, 2015
Tracked Since
Feb 18, 2026