3 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 434EXPL: 0

Null pointer dereference vulnerability exists in multiple vendors MFPs and printers which implement Debut web server 1.2 or 1.3. Processing a specially crafted request may lead an affected product to a denial-of-service (DoS) condition. As for the affected products/models/versions, see the detailed information provided by each vendor. • https://jvn.jp/en/vu/JVNVU93767756/index.html https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100793_000 https://support.brother.com/g/s/security/en https://www.fujifilm.com/fbglobal/eng/company/news/notice/2023/browser_announce.html • CWE-476: NULL Pointer Dereference •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 1

Cross-site request forgery (CSRF) vulnerability in TopAccess (aka the web-based management utility) on TOSHIBA TEC e-Studio 232, 233, 282, and 283 devices allows remote attackers to hijack the authentication of administrators for requests that change passwords. Vulnerabilidad de CSRF en TopAccess (también conocido como la utilidad de gestión basada en web) en dispositivos TOSHIBA TEC e-Studio 232, 233, 282 y 283 permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que cambian contraseñas. • https://www.exploit-db.com/exploits/29570 http://jvn.jp/en/jp/JVN13313061/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000038 http://www.toshibatec.co.jp/page.jsp?id=4224 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 1%CPEs: 64EXPL: 1

The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors. La interfaz de gestión TopAccess basada en web en los dispositivos periféricos multifuncionales (MFP) TOSHIBA TEC e-Studio con firmware desde v30x hasta v302, desde v35x hasta v354, y v4xx hasta v421 permite a atacantes remotos eludir la autenticación y obtener privilegios de administrador a través de vectores no especificados. • https://www.exploit-db.com/exploits/36238 http://jvn.jp/en/jp/JVN92830293/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028 http://www.toshibatec.co.jp/information/2012/20120405 • CWE-264: Permissions, Privileges, and Access Controls •