The host is installed with Foxit Reader before 9.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to execute code in the context of the current process.