PrizmDoc Viewer v13.23

Released: Mar 30, 2023

Mises à jour de v13.23

Fonctionnalités

  • PrizmDoc Viewer API now provides support for opening PDF Portfolio attachments. It can now open and navigate through multiple files assembled into an integrated PDF unit called a PDF Portfolio.
  • Added an option that allows a PrizmDoc Server cluster to communicate via HTTPS.
  • Added an option that allows a Linux-based PrizmDoc Server instance or cluster to communicate to a PrizmDoc MSO instance or cluster via HTTPS.
  • Improved text selection user experience. Text selection is now easier to use (starts faster and allows starting outside of text), and is more consistent and stable.
  • Added new Postman collections that show the most commonly used PrizmDoc API endpoints. Currently, the collections demonstrate the following APIs: PrizmDoc Server, PrizmDoc Application Services (PAS), PrizmDoc Editor, PrizmDoc Cells, Barcode Scanner, and Image Editor. You will also find a "Workflows" collection which features some of the most common use-cases.
  • Support for Kubernetes 1.26 has been added; support for Kubernetes 1.21 and 1.22 has been dropped. The list of supported Kubernetes versions now includes 1.23, 1.24, 1.25 and 1.26.
  • Updated 'hello-prizmdoc-viewer-with-kubernetes' sample to properly work with the latest 'ingress-nginx' controller.
  • Updated a PDF Processing Service (PDFPS) third-party dependency to a newer version to eliminate the use of outdated functionality.
  • Introduced new parameters in Central Configuration to control environment variables settings when starting PrizmDoc Server Java-based services (PDF Processing Service and Email Processing Service).
  • Updated the 'accusoft/prizmdoc-application-services' Docker image to include an 'init-database' command to enable initialization of the PAS database.
  • Support for Microsoft Windows Server 2012 and Windows Server 2012 R2 has been deprecated with this release and will be completely removed in a future release. Future releases will no longer support Windows Server 2012 and Windows Server 2012 R2.
  • Security
    • Updated the PrizmDoc Services to run on the newer Node.js v16.19.1, taking advantage of recent security fixes and other changes in Node.js.
    • Updated the PrizmDoc Application Services (PAS) to run on the newer Node.js v16.19.1, taking advantage of recent security fixes and other changes in Node.js.
  • Documentation Updates
    • Added a new Archive section in the Third-Party Attributions topic so that you can view the list of third-party dependencies and the licensing attributions for your product version.
    • Added a new guide, which provides information about configuring and using the new Postman collections.
    • Added a new PAS topic for How to Store Annotations in a Database.
    • Updated the Central Configuration topic to make it easier to find and read through the configuration options.
    • Added a note to the network.binding.addresses setting in the central configuration file documentation to explain the loop back interface is automatically bound.
    • Updated the PrizmDoc Application Services (PAS) Overview steps to be more clear.
    • Updated the Use Hybrid Viewing and PDF-only Viewing Packages topics for additional clarity.
    • Added a new page on PAS Licensing.
    • Updated the Set Initial Zoom Factor topic to clarify where to place the sample code described in the example.

Correctifs

  • Addressed an issue in PrizmDoc Viewer where text extraction returned incorrect results for vertical and horizontal characters that are "glued" together. This resulted in the inability to get an expected result for separate word search.
  • Addressed an issue when PrizmDoc Viewer was unable to show Outlook messages in ISO-2022-JP encoding.
  • Addressed an issue when PrizmDoc Viewer was unable to show email attachments which had long file names (120 symbols and more) on the Windows platform.
  • Addressed an issue in PrizmDoc Viewer when it could not properly render PDF Acroform fields due to the inability to match font name definitions.
  • Addressed an issue in the Email Processing Service (EPS) that caused PrizmDoc Viewer to render non-ASCII characters incorrectly. This occurred when converting or viewing EML documents with HTML bodies having additional charset tags.
  • Addressed an issue in the PrizmDoc Viewer where MSG files with internal structure specifics failed to load. This occurred when the MSG files contain lowercase letters in the hexadecimal numbers of the internal recipient storage stream index.
  • Addressed an issue in the PDF Processing Service (PDFPS) that caused PrizmDoc Viewer to fail saving redacted document. This occurred when source PDF document contained an internal element with a reference to itself.
  • Addressed an issue in the PrizmDoc Server Windows installer when it displayed an incorrect warning message for minimum system (RAM) requirements.
  • Addressed an issue when PrizmDoc Viewer was unable to show JPEG files and TIFF files which use JPEG as a compression method with odd width and subsampling type 0x221111 (yuv420). The issue also affected DICOM or any other type of image containers which use JPEG internally.
  • Addressed an issue in PrizmDoc Viewer where specific Canon .CR2 files caused Raster Conversion Service (RCS) to crash.
  • Security
    • Addressed potential vulnerabilities in the Raster Form Extraction Service (RFES) third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in the Text Service (TS) third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in the Watchdog Service third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in the LibreOffice third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in the PDF Processing Service (PDFPS) third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in HTML Conversion Service (HTMLCS) by removing vulnerable third-party components.
    • Addressed potential vulnerabilities in the Raster Conversion Service (RCS) by removing vulnerable third-party components.
    • Addressed potential vulnerabilities in the Viewing Service third-party components by updating them to the newer versions.
    • Addressed potential vulnerabilities in LibreOffice by removing vulnerable third-party components.