📦 Papercut Ng
by Papercut
🔍 What is Papercut Ng?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2023-39143 is a path traversal vulnerability in PaperCut NG/MF on Windows that allows attackers to upload, read, or delete arbitrary files. When external device integration is enabled (a common co...
CVE-2023-27350 is an authentication bypass vulnerability in PaperCut NG/MF that allows unauthenticated remote attackers to gain SYSTEM-level access and execute arbitrary code. This affects PaperCut NG...
This vulnerability allows authenticated remote attackers to execute arbitrary code with SYSTEM privileges on PaperCut NG servers by exploiting an exposed dangerous function in the print.script.sandbox...
This vulnerability in PaperCut software allows authenticated administrators to perform unauthorized write operations that could lead to remote code execution. It affects organizations using vulnerable...
CVE-2024-1222 is an authorization bypass vulnerability in PaperCut NG/MF that allows attackers to elevate privileges through specially crafted API requests. This affects a subset of API calls, potenti...
This CVE allows local attackers with write access to the C drive to escalate privileges to SYSTEM level by exploiting an insecure executable loading mechanism in PaperCut NG's pc-pdl-to-image process....
An authentication bypass vulnerability in PaperCut NG allows unauthenticated remote attackers to upload arbitrary files to the server's storage. This can lead to denial of service by exhausting system...
This vulnerability allows attackers to create arbitrary files on Windows PaperCut NG/MF servers with Web Print enabled, potentially flooding disk space and causing Denial of Service. Only affects Wind...