Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.PAPERCUT_NG_CVE-2023-27350.NBIN
HistoryApr 25, 2023 - 12:00 a.m.

PaperCut NG Authentication Bypass (CVE-2023-27350)

2023-04-2500:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
82
papercut ng authentication bypass binary data scanner cve-2023-27350

0.971 High

EPSS

Percentile

99.8%

The PaperCut NG running on the remote host is affected by an authentication bypass vulnerability. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass access control to login as the administrative user.

Binary data papercut_ng_cve-2023-27350.nbin
VendorProductVersionCPE
papercutpapercut_ngcpe:/a:papercut:papercut_ng