![]() Foxit’s free PDF Reader is the most powerful in the industry. ![]() But how can we avoid this Where is the displayinbrowser parameter stored Thank you Best regards. To view important PDF documents, you’ll need a reliable PDF Reader. Early versions of Foxit Reader were notable for startup performance and small file size. Foxit Reader is developed by Fuzhou, China-based Foxit Software. Suggested Actionĭue to the risks that those vulnerabilities present, CCIRC recommends that system administrators restrain or limit the interactions with Foxit Reader and/or make sure that the safe reading mode is always activated. But every time a user start Foxit reader this UAC dialogue is shown. Foxit PDF Reader (formerly Foxit Reader) is a multilingual freemium PDF (Portable Document Format) tool that can create, view, edit, digitally sign, and print PDF files. What version of Windows can Foxit Reader run on Foxit Reader can be used on a computer running Windows 11 or Windows 10. Download and installation of this PC software is free and 12.2 is the latest version last time we checked. This potentially however leaves the user exposed to high-impact vulnerabilities should a new technique arise allowing malicious actors to bypass the safe reading mode. Foxit Reader is provided under a freeware license on Windows from PDF software with no restrictions on usage. There are also Foxit Reader plugins for Microsoft Office programs including Word, Excel and PowerPoint.Īccording to the security firm who has discovered the vulnerabilities, the vendor has decided to not fix the vulnerabilities because an attacker would need to bypass safe reading mode. However, user interaction is required to exploit both vulnerabilities in that the target must visit a malicious page or open a malicious file.įoxit Reader is a popular free PDF reader that is distributed by many websites. Through open source reporting, CCIRC has been made aware of two recently disclosed zero-day vulnerabilities in Foxit Reader software that, when exploited though the JavaScript API in Foxit Reader, can allow remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. The purpose of this alert is to bring attention to two recently disclosed zero-day vulnerabilities in Foxit Reader.
0 Comments
Leave a Reply. |