Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Posted on February 18, 2026 By CWS

Researchers have uncovered significant vulnerabilities in widely used PDF platforms from Foxit and Apryse, highlighting potential risks such as account takeover and data exfiltration. These discoveries underscore the importance of robust security measures in digital document management solutions.

Discovery of Vulnerabilities by Novee

The vulnerabilities were identified by Novee, a penetration testing firm launched in January 2026 with substantial funding, amounting to over $51 million. Their research focused on Apryse WebViewer and Foxit PDF cloud services, revealing 16 distinct vulnerabilities.

Novee’s investigation into Apryse and Foxit products identified one critical and two high-severity vulnerabilities in Apryse offerings, alongside two high-severity and 11 medium-severity issues in Foxit products. These flaws included various types of XSS and command injection vulnerabilities.

Potential Exploitation and Impact

Exploitation of these vulnerabilities could have allowed attackers to execute arbitrary code or commands through specially crafted documents or URLs. Such security holes posed a risk of account takeovers, data extraction, and document manipulation, particularly in enterprise applications where these PDF viewers are embedded.

The vulnerabilities, some of which could be exploited with minimal effort, highlighted the potential for a high-impact attack surface in components traditionally deemed low-risk. Novee emphasized the importance of re-evaluating security assumptions around these tools.

Foxit and Apryse’s Response

Both Foxit and Apryse responded promptly to Novee’s findings. Foxit’s Hongtao Huang highlighted the company’s dedication to security through an active responsible disclosure program. Collaborative efforts with Novee led to swift remediation and updates published via their Trust Center.

Similarly, Stan Kornacki from Apryse detailed the measures taken to address the vulnerabilities, including product updates and improved documentation. Apryse’s comprehensive vulnerability management process aims to maintain high standards of code quality and minimize future occurrences.

This incident exemplifies the importance of cooperation between security researchers and software vendors to enhance product security and protect user data. As digital threats continue to evolve, such partnerships are critical in maintaining the integrity and trustworthiness of software solutions.

Security Week News Tags:account takeover, Apryse, CISO, Cybersecurity, data exfiltration, Foxit, Novee, Patch, PDF security, product updates, security research, software vulnerabilities, Vulnerabilities, web security, XSS

Post navigation

Previous Post: Security Risks in Popular VS Code Extensions Identified
Next Post: Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Related Posts

Coinbase Rejects M Ransom After Rogue Contractors Bribed to Leak Customer Data Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Microsoft Bug Bounty Program Expanded to Third-Party Code Microsoft Bug Bounty Program Expanded to Third-Party Code Security Week News
New StackWarp Attack Threatens Confidential VMs on AMD Processors New StackWarp Attack Threatens Confidential VMs on AMD Processors Security Week News
Docker Desktop Vulnerability Leads to Host Compromise Docker Desktop Vulnerability Leads to Host Compromise Security Week News
Ivanti Patches Exploited EPMM Zero-Days Ivanti Patches Exploited EPMM Zero-Days Security Week News
Cisco Patches Zero-Day Flaw Affecting Routers and Switches Cisco Patches Zero-Day Flaw Affecting Routers and Switches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking
  • OpenClaw AI Enhances Security and Anthropic Support
  • SysUpdate Malware Variant Targets Linux with Encrypted C2
  • Widespread Keenadu Malware Threatening Android Devices
  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking
  • OpenClaw AI Enhances Security and Anthropic Support
  • SysUpdate Malware Variant Targets Linux with Encrypted C2
  • Widespread Keenadu Malware Threatening Android Devices
  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News