Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Posted on February 18, 2026 By CWS

Researchers have uncovered significant vulnerabilities in widely used PDF platforms from Foxit and Apryse, highlighting potential risks such as account takeover and data exfiltration. These discoveries underscore the importance of robust security measures in digital document management solutions.

Discovery of Vulnerabilities by Novee

The vulnerabilities were identified by Novee, a penetration testing firm launched in January 2026 with substantial funding, amounting to over $51 million. Their research focused on Apryse WebViewer and Foxit PDF cloud services, revealing 16 distinct vulnerabilities.

Novee’s investigation into Apryse and Foxit products identified one critical and two high-severity vulnerabilities in Apryse offerings, alongside two high-severity and 11 medium-severity issues in Foxit products. These flaws included various types of XSS and command injection vulnerabilities.

Potential Exploitation and Impact

Exploitation of these vulnerabilities could have allowed attackers to execute arbitrary code or commands through specially crafted documents or URLs. Such security holes posed a risk of account takeovers, data extraction, and document manipulation, particularly in enterprise applications where these PDF viewers are embedded.

The vulnerabilities, some of which could be exploited with minimal effort, highlighted the potential for a high-impact attack surface in components traditionally deemed low-risk. Novee emphasized the importance of re-evaluating security assumptions around these tools.

Foxit and Apryse’s Response

Both Foxit and Apryse responded promptly to Novee’s findings. Foxit’s Hongtao Huang highlighted the company’s dedication to security through an active responsible disclosure program. Collaborative efforts with Novee led to swift remediation and updates published via their Trust Center.

Similarly, Stan Kornacki from Apryse detailed the measures taken to address the vulnerabilities, including product updates and improved documentation. Apryse’s comprehensive vulnerability management process aims to maintain high standards of code quality and minimize future occurrences.

This incident exemplifies the importance of cooperation between security researchers and software vendors to enhance product security and protect user data. As digital threats continue to evolve, such partnerships are critical in maintaining the integrity and trustworthiness of software solutions.

Security Week News Tags:account takeover, Apryse, CISO, Cybersecurity, data exfiltration, Foxit, Novee, Patch, PDF security, product updates, security research, software vulnerabilities, Vulnerabilities, web security, XSS

Post navigation

Previous Post: Security Risks in Popular VS Code Extensions Identified
Next Post: Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Related Posts

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Security Week News
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Volvo Group Employee Data Stolen in Ransomware Attack Volvo Group Employee Data Stolen in Ransomware Attack Security Week News
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Security Week News
North Korean Hackers Target macOS Developers via Malicious VS Code Projects North Korean Hackers Target macOS Developers via Malicious VS Code Projects Security Week News
Kosovar Administrator of Cybercrime Marketplace Extradited to US Kosovar Administrator of Cybercrime Marketplace Extradited to US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark