WebClientPrint Processor 2.0.15.109...

- AV AC AU C I A
发布: 2017-08-23
修订: 2025-04-13

RedTeam Pentesting discovered that rogue updates trigger a remote code execution vulnerability in WebClientPrint Processor (WCPP). These updates may be distributed through specially crafted websites and are processed without any user interaction as soon as the website is accessed. However, the browser must run with administrative privileges. Version 2.0.15.109 is affected.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息