Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
[RT-SA-2015-008] WebClientPrint Processor 2.0: Remote Code Execution via Print Jobs
Aug 22 2017 01:39PM
RedTeam Pentesting GmbH (release redteam-pentesting de)
Advisory: WebClientPrint Processor 2.0: Remote Code Execution via Print Jobs
RedTeam Pentesting discovered that malicious print jobs can be used to
trigger a remote code execution vulnerability in WebClientPrint
Processor (WCPP). These print jobs may be distributed via specially
crafted websites an...
[ more ]
Copyright 2010, SecurityFocus