The Mod of the subverse hosting the possible malware AND ATTACKING MY WARNINGs is Crensch, oddly. I do not know why Crensch is stopping warnings.
WHY ARE POSSIBLE EXPLOITS LIKE CVE-2019-7835 BEING POSTED ON VOAT TODAY?!
https://www.cvedetails.com/cve/CVE-2019-7835/
I am talking about THIS example first post by a new account that leads to a FBI computer and fetches a special payload seasoned PDF if the URL contains a URL attribute flag on it:
https://voat.co/v/GreatAwakening/3319004
URL (Don't open the PDF!) in his link, it's :
https://vault.fbi.gov/nikola-tesla?kek=top
fbi.gov is indeed actually fbi.gov, and the URL response is reveals a list of special PDFs you can download that may or may not be different , but the IP address will be tracked differently, due to attribute : "?kek=top"
Who is @Rondiggity and why is he testing the waters?
How many downvoats will his 20 other Fed voat accounts slam on my warning post?
Goats : avoid Using the insecure Adobe Acrobat Reader!!!
OVER 1000 backdoors tracked by security researchers!!!: Proof list :
https://www.cvedetails.com/vulnerability-list.php?vendor_id=53&product_id=497
OMG!!! Click on "Score Descending" or force sort "Score Descending", and look at RED COLOR exploits!
Over 400 different severe backdoor EXPLOITS, out of 1000 total over the last 20 years, used by many evil people and LEA (Law Enforcement Agencies).
To see the 400 severe backdoor exploits, click on in sort area " CVSS Score Descending".
Competitors to Adobe Acrobat reader, have had at most ,10 severe exploits, for the most common competitor: Foxit Reader (for windows), mac products are typically even a little safer.
I used to use https://www.foxitsoftware.com/pdf-reader/ all the time to open up "free" ebooks tamperred with by russians (25% of free technical books on http://gen.lib.rus.ec/ are infested with malware backdoors that only work in standard "all options on" Adobe Acrobat reader.
You can cripple and remove most plugin features of the pro Acrobat reader, to make it have no javascript, scripting, flash, movies, java, links to outside payloads, and then instead of 1000 backdoors into your operating system when opening up a document in Adobe Acrobat, only 50 backdoors, historically.
Every couple weeks a new serious exploit is discovered, moslty written by NSA/CIA/FBI/DIA/NRO/HomeLand Security/StateDepartment 5Eyes, and every large nation state.
Foxit is so popular it too is attacked :
Foxit PDF fresh list of historic backdoors :
https://www.cvedetails.com/vulnerability-list/vendor_id-7654/product_id-16993/
Click on "Score Descending", and look at RED COLOR exploits!
10, just 10 for foxit in list, versus over 400 red critical backdoors in Adobe Acrobat. You can count them both yourself.
Some security researchers have TWO airgapped machines on their desk, one for technical PDFs and company email and browsing, the other machine for their security programming and pen-testing.
I Do not know why so many sudden downvotes by Crensch and FBI shills on my v/AskVoat/3319513 warning to voat users?!?
My warning : https://voat.co/v/AskVoat/3319513
LOOK AT THE FBI ACTIVITY AGAINST v/AskVoat/3319513 !*
TL;DR : THERE IS NO SAFE WAY TO EVER OPEN A SINGLE PDF , EVER! And voat users need to be very wary of using the same computer they use on voat, with machines they open PDFs!!!
WHY is this Happening Here On Voat?!
view the rest of the comments →
Moodog ago
Can Voat not allow .PDF extensions to be posted?
Harsh, but effective fix.
yob ago
It could or should just put a WARNING next to it, like "WARNING : PDF !"
Science papers are all published in PDF and we need to offer links to those, even if many are full of malware.