This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows Papercut Papercut papercut Mf Papercut papercut Ng |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows Papercut Papercut papercut Mf Papercut papercut Ng |

Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2024-08-01T18:48:21.853Z
Reserved: 2024-02-20T02:23:09.252Z
Link: CVE-2024-1654

Updated: 2024-08-01T18:48:21.853Z

Status : Analyzed
Published: 2024-03-14T03:15:08.033
Modified: 2025-01-23T20:29:56.217
Link: CVE-2024-1654

No data.