Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Posted on February 18, 2026 By CWS

Researchers have uncovered significant vulnerabilities in widely used PDF platforms from Foxit and Apryse, highlighting potential risks such as account takeover and data exfiltration. These discoveries underscore the importance of robust security measures in digital document management solutions.

Discovery of Vulnerabilities by Novee

The vulnerabilities were identified by Novee, a penetration testing firm launched in January 2026 with substantial funding, amounting to over $51 million. Their research focused on Apryse WebViewer and Foxit PDF cloud services, revealing 16 distinct vulnerabilities.

Novee’s investigation into Apryse and Foxit products identified one critical and two high-severity vulnerabilities in Apryse offerings, alongside two high-severity and 11 medium-severity issues in Foxit products. These flaws included various types of XSS and command injection vulnerabilities.

Potential Exploitation and Impact

Exploitation of these vulnerabilities could have allowed attackers to execute arbitrary code or commands through specially crafted documents or URLs. Such security holes posed a risk of account takeovers, data extraction, and document manipulation, particularly in enterprise applications where these PDF viewers are embedded.

The vulnerabilities, some of which could be exploited with minimal effort, highlighted the potential for a high-impact attack surface in components traditionally deemed low-risk. Novee emphasized the importance of re-evaluating security assumptions around these tools.

Foxit and Apryse’s Response

Both Foxit and Apryse responded promptly to Novee’s findings. Foxit’s Hongtao Huang highlighted the company’s dedication to security through an active responsible disclosure program. Collaborative efforts with Novee led to swift remediation and updates published via their Trust Center.

Similarly, Stan Kornacki from Apryse detailed the measures taken to address the vulnerabilities, including product updates and improved documentation. Apryse’s comprehensive vulnerability management process aims to maintain high standards of code quality and minimize future occurrences.

This incident exemplifies the importance of cooperation between security researchers and software vendors to enhance product security and protect user data. As digital threats continue to evolve, such partnerships are critical in maintaining the integrity and trustworthiness of software solutions.

Security Week News Tags:account takeover, Apryse, CISO, Cybersecurity, data exfiltration, Foxit, Novee, Patch, PDF security, product updates, security research, software vulnerabilities, Vulnerabilities, web security, XSS

Post navigation

Previous Post: Security Risks in Popular VS Code Extensions Identified
Next Post: Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Related Posts

Security Theater or Real Defense? The KPIs That Tell the Truth Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News
Cisco Patches Vulnerability Exploited by Chinese Hackers Cisco Patches Vulnerability Exploited by Chinese Hackers Security Week News
SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability Security Week News
Proofpoint Completes .8 Billion Acquisition of Hornetsecurity  Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity  Security Week News
CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable Security Week News
Cyberattack Targets International Criminal Court Cyberattack Targets International Criminal Court Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News