Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
[RT-SA-2015-009] WebClientPrint Processor 2.0: Remote Code Execution via Updates
Aug 22 2017 01:39PM
RedTeam Pentesting GmbH (release redteam-pentesting de)
Advisory: WebClientPrint Processor 2.0: Remote Code Execution via Updates
RedTeam Pentesting discovered that rogue updates trigger a remote code
execution vulnerability in WebClientPrint Processor (WCPP). These
updates may be distributed through specially crafted websites and are
processed without ...
[ more ]
Copyright 2010, SecurityFocus