PoC-in-GitHub/2022/CVE-2022-25090.json

38 lines
1.5 KiB
JSON
Raw Normal View History

2024-11-29 03:31:51 +09:00
[
{
"id": 465312209,
"name": "printix-CVE-2022-25090",
"full_name": "ComparedArray\/printix-CVE-2022-25090",
"owner": {
"login": "ComparedArray",
"id": 45703484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45703484?v=4",
"html_url": "https:\/\/github.com\/ComparedArray",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ComparedArray\/printix-CVE-2022-25090",
"description": "A \"Creation of Temporary Files in Directory with Insecure Permissions\" vulnerability in PrintixService.exe, in Printix's \"Printix Secure Cloud Print Management\", Version 1.3.1106.0 and below allows any logged in user to elevate any executable or file to the SYSTEM context. This is achieved by exploiting race conditions in the Installer.",
"fork": false,
"created_at": "2022-03-02T13:14:11Z",
"updated_at": "2024-08-12T20:21:09Z",
"pushed_at": "2022-05-10T14:32:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"elevation",
"exploit",
"printix"
],
"visibility": "public",
"forks": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}
]