A critical vulnerability targeting Foxit Reader, a popular PDF viewer, has prompted urgent action from its developers. The exploit, capable of remote code execution, poses a significant risk to millions of users worldwide. Foxit has swiftly responded by releasing updates to address these vulnerabilities. The vulnerability affects various versions of Foxit PDF Reader and Foxit PDF Editor on both Windows and macOS platforms. Identified as Foxit PDF Reader 12.0.2 and earlier on Windows, and Foxit PDF Editor for Mac 12.0.1.0720 and earlier on macOS, the flaw exposes users to potential remote attacks. Reports indicate that an unidentified threat actor is actively selling the exploit, which operates by executing malicious code when a specially crafted PDF file is opened in the affected Foxit software. This exploit can potentially grant attackers control over compromised systems. In response, Foxit has issued updates for both Windows and macOS platforms. The latest versions, including Foxit PDF Editor 12.1 and Foxit PDF Reader 12.1 for Windows, and Foxit PDF Editor for Mac 12.0.2 and Foxit PDF Reader for Mac 12.0.2, address the security vulnerabilities and ensure stability. The announcement of an exploit sale targeting Foxit Reader underscores the critical need for proactive cybersecurity measures. By staying informed and promptly applying software updates, users can effectively protect their systems from potential remote code execution attacks.
Security researchers have identified a growing trend of attacks that bypass endpoint detection and response (EDR) systems by using in-memory PE loaders. These attacks typically beg...
A critical stored cross-site scripting (XSS) vulnerability (CVE-2025-59545) has been identified in the Prompt module of the DNN Platform, affecting all versions of the 'DotNetN...
A critical vulnerability identified as CVE-2025-26399 has been discovered in SolarWinds Web Help Desk (WHD) version 12.8.7, posing a severe security risk. The flaw stems from unsaf...