Show filters
59 Total Results
Displaying 21-30 of 59
Sort by:
Attacker Value
Unknown
CVE-2024-27177
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying package name variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27176
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying session ID variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27175
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Remote Command program allows an attacker to read any file using a Local File Inclusion vulnerability. An attacker can read any file on the printer. As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27174
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Remote Command program allows an attacker to get Remote Code Execution. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27173
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27172
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Remote Command program allows an attacker to get Remote Code Execution. As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27171
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27170
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
It was observed that all the Toshiba printers contain credentials used for WebDAV access in the readable file. Then, it is possible to get a full access with WebDAV to the printer. As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27169
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Toshiba printers provides API without authentication for internal access. A local attacker can bypass authentication in applications, providing administrative access. As for the affected products/models/versions, see the reference URL.
0
Attacker Value
Unknown
CVE-2024-27168
Disclosure Date: June 14, 2024 (last updated June 14, 2024)
It appears that some hardcoded keys are used for authentication to internal API. Knowing these private keys may allow attackers to bypass authentication and reach administrative interfaces. As for the affected products/models/versions, see the reference URL.
0