Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h4fr-6c5r-8cr9

Опубликовано: 14 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers by sending a HTTP request without authentication. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL.

Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers by sending a HTTP request without authentication. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL.

EPSS

Процентиль: 28%
0.00102
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-776

Связанные уязвимости

CVSS3: 5.9
nvd
больше 1 года назад

Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers by sending a HTTP request without authentication. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL.

EPSS

Процентиль: 28%
0.00102
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-776