mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
38 lines
No EOL
1.5 KiB
JSON
38 lines
No EOL
1.5 KiB
JSON
[
|
|
{
|
|
"id": 465312209,
|
|
"name": "printix-CVE-2022-25090",
|
|
"full_name": "ComparedArray\/printix-CVE-2022-25090",
|
|
"owner": {
|
|
"login": "ComparedArray",
|
|
"id": 45703484,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45703484?v=4",
|
|
"html_url": "https:\/\/github.com\/ComparedArray",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ComparedArray\/printix-CVE-2022-25090",
|
|
"description": "A \"Creation of Temporary Files in Directory with Insecure Permissions\" vulnerability in PrintixService.exe, in Printix's \"Printix Secure Cloud Print Management\", Version 1.3.1106.0 and below allows any logged in user to elevate any executable or file to the SYSTEM context. This is achieved by exploiting race conditions in the Installer.",
|
|
"fork": false,
|
|
"created_at": "2022-03-02T13:14:11Z",
|
|
"updated_at": "2024-08-12T20:21:09Z",
|
|
"pushed_at": "2022-05-10T14:32:31Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"elevation",
|
|
"exploit",
|
|
"printix"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |