![]() The only component that uses libcurl is the PaperCut NG/MF print provider (used in a default Application server install, the direct print monitor component and the secondary print server component), however the version in use is not vulnerable to the following CVEs. No PaperCut products are impacted by any of the following CVEs. Please note: these issues do not affect PaperCut Hive, PaperCut Pocket, Print Deploy, Mobility Print, or PaperCut User Clients. Please see the PaperCut MF/NG Security bulletin (Nov 2023) for more information. Version 23.0.1 and later contains a fix for this vulnerability. ![]() There is an update available for PaperCut MF/NG customers. PaperCut products (including PaperCut MF, PaperCut NG, Print Deploy, Mobility Print, PaperCut Hive, PaperCut Pocket) do not use Apache Struts and are therefore not impacted by this exploit.ĬVE-2023-6006 - Privilege escalation vulnerability □ Want to sign up to receive important Security email notifications from PaperCut? Sign up for notifications over on the Security email list sign-up page. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |