Deep dive in Lexmark Perceptive Document Filters Exploitation
Common Information
Type Value
UUID 379a3a42-c99e-4fa7-9a92-a6e35c01a70f
Fingerprint b0121c17e82d50a1
Analysis status DONE
Considered CTI value 0
Text language
Published June 14, 2017, 2:41 p.m.
Added to db Oct. 9, 2022, 4:16 p.m.
Last updated Oct. 16, 2024, 2:30 a.m.
Headline Vulnerability Information
Title Deep dive in Lexmark Perceptive Document Filters Exploitation
Detected Hints/Tags/Attributes 57/1/20
Attributes
Details Type #Events CTI Value
Details Domain 3
libisys11df.so
Details Domain 1
libisysautocad.so
Details Domain 1
libisysgraphics.so
Details Domain 1
libisyspdf6.so
Details Domain 3
libisysreadershd.so
Details Domain 3
libisysreaders.so
Details Domain 2
libisysshared.so
Details Domain 1
parser.in
Details Domain 9
checksec.sh
Details Domain 1
libisysreadersh.so
Details Domain 1
ropper.py
Details Domain 1
file.my
Details File 2
malicious.xls
Details File 11
config.cfg
Details File 1
poc.xls
Details File 1
payload.xls
Details File 2
template.xls
Details File 1
explo_test.py
Details File 1
ropper.py
Details Url 1
http://www.evil.localdomain/malicious.xls