Back to directory
WRITEUP #2968

Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer (part 2)

Race ConditionArbitrary file writePrinter hacking
by@saidelike(Cedric Halbronn)
Program
Lexmark
Published
Feb 18, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://research.nccgroup.com/2022/02/18/analyzing-a-pjl-directory-traversal-vulnerability-exploiting-the-lexmark-mc3224i-printer-part-2/
RELATED WRITEUPS
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write
ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts
Race ConditionCI/CD
Race Condition About The User Version and Ignored
Race ConditionPayment bypass
Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
Race Condition
Studying 0days: How we hacked Anki, the world's most popular flashcard app
RCEComponents with known vulnerabilities

Built with ❤️ by Shubham Rawat