FoxIt fixes PDF tool flaws that allow for code execution


Foxit Software has released a patch of critical severity to address a critical remote code execution vulnerability in its PDF Reader and PDF Editor products.

The vulnerability could be exploited using manipulated PDF files of web pages, the company warned in an advisory. It was found and reported by researchers at the Renmin University of China. The vulnerability affects Foxit PDF Reader and earlier, as well as Foxit PhantomPDF – and earlier, according to Foxit, which provides an alternative to Adobe’s widely used PDF processing tools.

Also Read: Building a Healthy Security Culture in Today’s Hybrid Work Environment

The vulnerability, according to HackSys Inc., a business that independently found it, could be used against a target if they are duped into visiting a fake website or opening a malicious file.

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.