CVE-2024-1654
- EPSS 4.51%
- Veröffentlicht 14.03.2024 03:15:08
- Zuletzt bearbeitet 23.01.2025 20:29:56
This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid use...
CVE-2024-1222
- EPSS 2.43%
- Veröffentlicht 14.03.2024 03:15:07
- Zuletzt bearbeitet 23.01.2025 20:15:52
This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
CVE-2024-1223
- EPSS 0.12%
- Veröffentlicht 14.03.2024 03:15:07
- Zuletzt bearbeitet 23.01.2025 20:29:14
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an...
CVE-2024-1221
- EPSS 0.82%
- Veröffentlicht 14.03.2024 03:15:06
- Zuletzt bearbeitet 23.01.2025 20:15:15
This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE ...
CVE-2023-6006
- EPSS 0.05%
- Veröffentlicht 14.11.2023 04:15:07
- Zuletzt bearbeitet 21.11.2024 08:42:57
This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to enco...
CVE-2023-31046
- EPSS 0.19%
- Veröffentlicht 19.10.2023 14:15:08
- Zuletzt bearbeitet 21.11.2024 08:01:18
A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because reques...
CVE-2023-4568
- EPSS 83.2%
- Veröffentlicht 13.09.2023 21:15:07
- Zuletzt bearbeitet 21.11.2024 08:35:26
PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.
CVE-2023-39143
- EPSS 88.79%
- Veröffentlicht 04.08.2023 17:15:11
- Zuletzt bearbeitet 05.05.2025 16:15:43
PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration).
CVE-2023-3486
- EPSS 2.75%
- Veröffentlicht 25.07.2023 13:15:10
- Zuletzt bearbeitet 21.11.2024 08:17:22
An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the servic...
CVE-2023-2533
- EPSS 36.32%
- Veröffentlicht 20.06.2023 15:15:11
- Zuletzt bearbeitet 26.02.2026 15:03:53
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the targe...