Ref..: (October 3, 2019) ["Foxit PDF Reader Vulnerable to 8 High-Severity Flaws - Threatpost(.com)"] -- https://threatpost.com/foxit-pdf-reader-vulnerable-to-8-high-severity-flaws/148897/
Extracts from that security bulletin: <blockquote>"For instance, when a user opens a PDF document, it can execute JavaScript.</blockquote>
<blockquote>"In an attack scenario, “a specially crafted PDF document can trigger an out-of-memory condition which isn’t handled properly, resulting in arbitrary code execution,” according to Cisco Talos, which discovered the flaw. “An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.”"</blockquote>
When will the current Foxit Reader be updated to a safe(r) version? ( https://portableapps.com/apps/office/foxit_reader_portable#download_details )(v9.5 from April 2019)
It's available here: https://portableapps.com/apps/office/foxit_reader_portable
Sometimes, the impossible can become possible, if you're awesome!