Printix 1.3.1106.0 Privileged API Abuse ≈ Packet Storm

Printix 1.3.1106.0 Privileged API Abuse ≈ Packet Storm

Home[1] Files[2] News[3] Contact[4] Add New[5]

Printix 1.3.1106.0 Privileged API Abuse[6]
Authored by Logan Latvala[7] | Site github.com[8]

An "Incorrect Use of a Privileged API" vulnerability in PrintixService.exe in Printix's "Printix Secure Cloud Print Management" versions 1.3.1106.0 and below allows a local or remote attacker the ability change all HKEY Windows Registry values as SYSTEM context via the UITasks.PersistentRegistryData parameter.

systems | windows[9]
advisories | CVE-2022-25089[10]
SHA-256 | e26119f8d98f860e7ac7059a0d25e15dfc9acdbc0d49faa1f612da8efaf64cdc

Login[14] or Register[15] to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[118]
Hosting By
Rokasec[119]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"