#FoxitPDF

Mauricio Cassemiromauriciocassemiro
2025-06-11

Aula 3 - Ferramentas “Mão”🖐🏽, “Selecionar Texto e Imagem” e “Selecionar Anotação” no Foxit PDF: youtu.be/F4KAXq8jAgo

Marcel SIneM(S)USsimsus@social.tchncs.de
2024-12-20
Julian Papulianji3o@ruhr.social
2024-09-10

Danke #foxitPDF für diese Add-On policy, dass ich die KI-Tools und HelpCenter deaktivieren kann 🤘

kb.foxit.com/s/articles/239782

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-05-16

Foxit PDF Reader Users Targeted by Malicious PDF Exploit

Date: May 15, 2024
CVE: CVE-2023-36033
Vulnerability Type: Remote Code Execution (RCE)
CWE: [[CWE-20]], [[CWE-78]], [[CWE-94]]
Sources: GBHackers, Checkpoint Research

Issue Summary

Researchers have identified a critical vulnerability in Foxit PDF Reader that allows attackers to execute malicious code on users' systems by exploiting a design flaw in the application's security warnings. The flaw makes it easy for attackers to trick users into approving malicious actions, leading to unauthorized access and data theft.

Technical Key Findings

The vulnerability stems from Foxit Reader's handling of security warnings, which default to an "OK" option. This flaw enables attackers to craft malicious PDFs that, when opened, prompt the user to approve actions unknowingly. Once approved, these actions can download and execute malicious code from a remote server, bypassing standard security detections.

Vulnerable Products

  • Foxit Reader

Impact Assessment

Exploitation of this vulnerability can lead to severe consequences, including unauthorized access to sensitive data, remote control of the affected device, and the ability to deploy various malware such as VenomRAT, Agent-Tesla, and others. This can result in data breaches, espionage, and further propagation of malware.

Patches or Workarounds

Foxit has acknowledged the issue and that it would be resolved in version 2024 3.

Tags

#FoxitPDF #CVE2023-36033 #RemoteCodeExecution #Malware #CyberSecurity #APT #VulnerabilityPatch #DataBreach

2024-05-15

📬 Foxit PDF Exploit: Ein unbedachter Klick löst Angriffskette aus
#ITSicherheit #AgentTesla #DoNotTeam #Exploid #FOXITPDF #FoxitReader #pdf sc.tarnkappe.info/17d3b6

Marcel SIneM(S)USsimsus@social.tchncs.de
2023-09-14
heise online (inoffiziell)heiseonline@squeet.me
2022-07-31
Wer PDF-Anwendungen von Foxit nutzt, sollte aus Sicherheitsgründen sicherstellen, dass die Software auf dem aktuellen Stand ist.
Foxit PDF Reader und Editor unter macOS und Windows angreifbar

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst