<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Windows OS Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/windows-os/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/windows-os/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Sun, 27 Jun 2021 18:26:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Two critical vulnerabilities in Foxit Reader</title>
		<link>https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/</link>
					<comments>https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 03 Oct 2017 11:50:23 +0000</pubDate>
				<category><![CDATA[Virus and spyware cleaning services]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Windows OS]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3505</guid>

					<description><![CDATA[<p>Using Foxit Reader? You might be vulnerable to network breaches Desktop Central | August 25, 2017 | 2 min read Cybersecurity and cyberattacks have become prominent topics lately. No matter how much you secure your network, vulnerabilities continue to emerge for different operating systems and applications. Most recently, security professionals have discovered two critical vulnerabilities  [...]</p>
<p>The post <a href="https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/">Two critical vulnerabilities in Foxit Reader</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Using Foxit Reader? You might be vulnerable to network breaches<br />
<a href="https://blogs.manageengine.com/desktop-mobile/desktopcentral/2017/08/25/using-foxit-reader-you-might-be-vulnerable-to-network-breaches.html">Desktop Central</a> | August 25, 2017 | 2 min read</p>
<p><a href="https://blogs.manageengine.com/desktop-mobile/desktopcentral/2017/08/25/using-foxit-reader-you-might-be-vulnerable-to-network-breaches.html"><img fetchpriority="high" decoding="async" class="aligncenter size-large wp-image-3506" src="https://cvtfstudios.net/wp-content/uploads/2017/10/foxit-1024x427.jpg" alt="" width="1024" height="427" srcset="https://cvtfstudios.net/wp-content/uploads/2017/10/foxit-300x125.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2017/10/foxit-500x208.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2017/10/foxit-700x292.jpg 700w, https://cvtfstudios.net/wp-content/uploads/2017/10/foxit-1024x427.jpg 1024w, https://cvtfstudios.net/wp-content/uploads/2017/10/foxit.jpg 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Cybersecurity and cyberattacks have become prominent topics lately. No matter how much you secure your network, vulnerabilities continue to emerge for different operating systems and applications. Most recently, security professionals have discovered two critical vulnerabilities in a third-party PDF reading application called Foxit Reader. These vulnerabilities allow hackers to execute arbitrarily-defined code on a user‘s computer when Foxit Reader is used without Safe Reading Mode enabled.</p>
<p>Two critical zero–day vulnerabilities</p>
<p>On August 17th, researchers Steven Seeley and Ariele Caltabiano discovered two vulnerabilities in Foxit Reader:</p>
<p>1. CVE-2017-10951, which acts as a command injection bug that resides in the app.launchURL function and executes strings provided by hackers. This vulnerability is mainly due to improper validation.</p>
<p>2. CVE-2017-10952, which exists in the saveAs function and allows hackers to execute an arbitrarily–specified file on user computers. If the arbitrary file is modified, then hackers can modify anything on the end user’s computer. Steven Seeley has tested a proof of concept and published it on Zero Day Initiative.</p>
<p>How can you keep Foxit Reader safe?</p>
<p>1.Take precautions: Avoid downloading attachments from email addresses you don’t know. Opening a PDF from a nefarious sender could compromise your entire system.</p>
<p>2.Manually change settings: Whether you’re using Foxit Reader or Foxit Phantom PDF, go to the settings menu and enable Safe Reading Mode and uncheck Enable JavaScript Actions.</p>
<p>3.Employ automatic patch management: Doing all the ground work manually is tiresome and complicated, especially since the number of vulnerabilities per application continually increases. Regularly updating your network is one of the best ways to remain free from zero-day vulnerabilities. Stay vigilant by employing patch management software like Desktop Central, which manages and deploys patches automatically.</p>
<p>How can ManageEngine help?</p>
<p>ManageEngine offers two types of support for these Foxit Reader vulnerabilities:</p>
<p>1.Patch deployment</p>
<p>Desktop Central can patch Windows, Mac, Linux, and over 250 third-party applications, all from a central location. We have released an update specifically for Foxit products to automatically enable Safe Reading Mode in Foxit PDF applications.</p>
<p>2.Registry configuration</p>
<p>With Desktop Central, you can deploy specific registry configurations, including the Foxit-specific keys below, to managed computers.</p>
<p>Key for enabling Safe Reading Mode:<br />
HKEY_CURRENT_USER\Software\Foxit Software\Foxit Reader 8.0\Preferences\TrustManager<br />
bSafeMode=1 (Enable Safe Reading Mode)<br />
bSafeMode=0 (Disable Safe Reading Mode)</p>
<p>Key for unchecking Enable JavaScript Actions:<br />
HKEY_CURRENT_USER\Software\Foxit Software\Foxit Reader 8.0\Preferences\Others<br />
bEnableJS=1 (Enable JavaScript Actions)<br />
bEnableJS=0 (Disable JavaScript Actions)</p>
<p>Start using Desktop Central today to evade vulnerabilities and breaches happening across any third–party application.<br />
Related posts :</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&amp;linkname=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Ftwo-critical-vulnerabilities-in-foxit-reader%2F&#038;title=Two%20critical%20vulnerabilities%20in%20Foxit%20Reader" data-a2a-url="https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/" data-a2a-title="Two critical vulnerabilities in Foxit Reader"></a></p><p>The post <a href="https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/">Two critical vulnerabilities in Foxit Reader</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/two-critical-vulnerabilities-in-foxit-reader/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
