Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.PAPERCUT_NG_CVE-2023-27351.NBIN
HistoryMay 15, 2023 - 12:00 a.m.

PaperCut NG SecurityRequestFilter Authentication Bypass (CVE-2023-27351)

2023-05-1500:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

The PaperCut NG running on the remote host is affected by an authentication bypass vulnerability. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass access control.

Binary data papercut_ng_cve-2023-27351.nbin
VendorProductVersionCPE
papercutpapercut_ngcpe:/a:papercut:papercut_ng
Related for PAPERCUT_NG_CVE-2023-27351.NBIN