Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-10327 | 1 Printeron | 1 Printeron | 2019-10-02 | 1.9 LOW | 7.0 HIGH |
PrinterOn Enterprise 4.1.3 stores the Active Directory bind credentials using base64 encoding, which allows local users to obtain credentials for a domain user by reading the cps_config.xml file. | |||||
CVE-2018-17169 | 1 Printeron | 1 Printeron | 2019-04-30 | 4.0 MEDIUM | 7.7 HIGH |
An XML external entity (XXE) vulnerability in PrinterOn version 4.1.4 and lower allows remote authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. | |||||
CVE-2018-17168 | 1 Printeron | 1 Printeron | 2019-04-19 | 4.3 MEDIUM | 6.5 MEDIUM |
PrinterOn Enterprise 4.1.4 contains multiple Cross Site Request Forgery (CSRF) vulnerabilities in the Administration page. For example, an administrator, by following a link, can be tricked into making unwanted changes to a printer (Disable, Approve, etc). | |||||
CVE-2018-17167 | 1 Printeron | 1 Printeron | 2019-03-26 | 3.5 LOW | 5.4 MEDIUM |
PrinterOn Enterprise 4.1.4 suffers from multiple authenticated stored XSS vulnerabilities via the (1) "Machine Host Name" or "Server Serial Number" field in the clustering configuration, (2) "name" field in the Edit Group configuration, (3) "Rule Name" field in the Access Control configuration, (4) "Service Name" in the Service Configuration, or (5) First Name or Last Name field in the Edit Account configuration. | |||||
CVE-2018-19936 | 1 Printeron | 1 Printeron | 2019-01-04 | 5.5 MEDIUM | 6.5 MEDIUM |
PrinterOn Enterprise 4.1.4 allows Arbitrary File Deletion. | |||||
CVE-2018-10326 | 1 Printeron | 1 Printeron | 2018-06-19 | 3.5 LOW | 5.4 MEDIUM |
PrinterOn Enterprise 4.1.3 suffers from multiple authenticated stored XSS vulnerabilities via the (1) department field in the printer configuration, (2) description field in the print server configuration, and (3) username field for authentication to print as guest. |