NA - CVE-2024-27165 - Toshiba printers contain a suidperl binary and...
Toshiba printers contain a suidperl binary and it has a Local Privilege Escalation vulnerability. A local attacker can get root privileges. As for the affected products/models/versions, see the...
NA - CVE-2024-27166 - Coredump binaries in Toshiba printers have...
Coredump binaries in Toshiba printers have incorrect permissions. A local attacker can steal confidential information. As for the affected products/models/versions, see the reference URL.
NA - CVE-2024-27167 - Toshiba printers use Sendmail to send emails to...
Toshiba printers use Sendmail to send emails to recipients. Sendmail is used with several insecure directories. A local attacker can inject a malicious Sendmail configuration file. As for the...
NA - CVE-2024-27168 - It appears that some hardcoded keys are used...
It appears that some hardcoded keys are used for authentication to internal API. Knowing these private keys may allow attackers to bypass authentication and reach administrative interfaces. As for...
NA - CVE-2024-27169 - Toshiba printers provides API without...
Toshiba printers provides API without authentication for internal access. A local attacker can bypass authentication in applications, providing administrative access. As for the affected...
NA - CVE-2024-27170 - It was observed that all the Toshiba printers...
It was observed that all the Toshiba printers contain credentials used for WebDAV access in the readable file. Then, it is possible to get a full access with WebDAV to the printer. As for the...
NA - CVE-2024-27171 - A remote attacker using the insecure upload...
A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL.
NA - CVE-2024-27173 - Remote Command program allows an attacker to...
Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other...