[ { "id": 490736386, "name": "printix-CVE-2022-29553", "full_name": "ComparedArray\/printix-CVE-2022-29553", "owner": { "login": "ComparedArray", "id": 45703484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45703484?v=4", "html_url": "https:\/\/github.com\/ComparedArray", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ComparedArray\/printix-CVE-2022-29553", "description": "A \"Exposed Dangerous Method or Function\" or \"Use of Hard-coded, Security-relevant Constants\" vulnerability in PrintixService.exe, in Kofax Printix's \"Printix Secure Cloud Print Management\", Version 1.3.1156.0 and below allows a Local Or Remote attacker the ability to override the \"ProgramDir\" registry value and point it to a directory that contains a malicious PrintixServiceTask.xml file. This allows an attacker the ability to escalate their privileges to a system session.", "fork": false, "created_at": "2022-05-10T14:36:36Z", "updated_at": "2024-08-12T20:23:09Z", "pushed_at": "2022-07-09T20:17:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 3 } ]