Логотип exploitDog
bind:CVE-2023-6006
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6006

Количество 3

Количество 3

nvd логотип

CVE-2023-6006

около 2 лет назад

This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM Note: This CVE has been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-83xv-2q8m-f6c3

около 2 лет назад

This vulnerability allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

CVSS3: 6.4
EPSS: Низкий
fstec логотип

BDU:2023-08200

около 2 лет назад

Уязвимость программных средств контроля за печатью в сети PaperCut MF и PaperCut NG, связанная с недостатками процедуры аутентификации, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6006

This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must have local write access to the C Drive. In addition, Print Archiving must be enabled or the attacker needs to encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM Note: This CVE has been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-83xv-2q8m-f6c3

This vulnerability allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

CVSS3: 6.4
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-08200

Уязвимость программных средств контроля за печатью в сети PaperCut MF и PaperCut NG, связанная с недостатками процедуры аутентификации, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу