This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
Thu, 26 Sep 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Papercut
Papercut papercut Mf Papercut papercut Ng |
|
Weaknesses | CWE-74 | |
CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Papercut
Papercut papercut Mf Papercut papercut Ng |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server. | This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server. |
Weaknesses | CWE-76 |

Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2024-09-26T03:52:57.154Z
Reserved: 2024-02-26T05:36:21.950Z
Link: CVE-2024-1882

Updated: 2024-08-01T18:56:22.441Z

Status : Analyzed
Published: 2024-03-14T04:15:08.003
Modified: 2025-01-23T20:30:14.080
Link: CVE-2024-1882

No data.