Two critical vulnerabilities in Foxit Reader

Using Foxit Reader? You might be vulnerable to network breaches [...]