June 18, 2024, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-1654.

arbitrary code attackers authentication code code execution cve cve-2024 cves cvss directory directory traversal exploit papercut rating remote code remote code execution vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Account Executive - Secureworks Direct Sales - US Remote Philadelphia

@ Dell Technologies | Remote - Pennsylvania, United States

SATCOM Technician - Shariki, Japan - Secret Clearance (Onsite)

@ RTX | RVA99: RTN Remote, Virginia

Senior Test Engineer

@ Commonwealth Bank | Bengaluru - Manyata Tech Park Road

Lead Developer - Pipeline & Algorithms

@ Arctic Wolf | Waterloo