Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.
- http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html
- http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html
- https://github.com/ComparedArray/printix-CVE-2022-25090
- https://www.exploit-db.com/exploits/50812
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ComparedArray/printix-CVE-2022-25090
- https://github.com/Enes4xd/Enes4xd
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/anquanscan/sec-tools
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/d3ltacros/d3ltacros
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve