Kyoceramita

Scanner File Utility

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.19%
  • Veröffentlicht 28.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password.

Exploit
  • EPSS 1.41%
  • Veröffentlicht 28.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in the Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to upload files to arbitrary locations via a .. (dot dot) in a request.

  • EPSS 2.08%
  • Veröffentlicht 28.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 does not restrict the filenames or extensions of uploaded files, which makes it easier for remote attackers to execute arbitrary code or overwrite files by leveraging CVE-2008-7110 ...

Exploit
  • EPSS 0.54%
  • Veröffentlicht 28.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to cause a denial of service (hang or crash) via invalid field length values in a malformed (1) document or (2) request.

  • EPSS 0.27%
  • Veröffentlicht 28.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 uses a small space of predictable user identification numbers for access control, which allows remote attackers to upload documents via a brute force attack.