{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T22:04:32.414","vulnerabilities":[{"cve":{"id":"CVE-2024-1882","sourceIdentifier":"eb41dac7-0af8-4f84-9f6d-0272772514f4","published":"2024-03-14T04:15:08.003","lastModified":"2025-01-23T20:30:14.080","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server."},{"lang":"es","value":"Esta vulnerabilidad permite que un usuario administrador ya autenticado cree un payload malicioso que podría aprovecharse para la ejecución remota de código en el servidor que aloja el servidor de aplicaciones PaperCut NG/MF."}],"metrics":{"cvssMetricV31":[{"source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","type":"Secondary","description":[{"lang":"en","value":"CWE-76"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionEndExcluding":"20.1.10","matchCriteriaId":"87E57A99-6580-4C5D-AD49-2C77153698B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndExcluding":"21.2.14","matchCriteriaId":"AC862C5A-C51D-455A-BA4C-62AF4B5593D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.1.5","matchCriteriaId":"3B444455-3DE9-4268-AED3-9457016B833F"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.1","versionEndExcluding":"23.0.7","matchCriteriaId":"06311316-1937-41A4-BEE2-57F7C4F6B6BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionEndExcluding":"20.1.10","matchCriteriaId":"F7A1BAB4-D3AC-4A06-B2AB-E46DED8CB19D"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndExcluding":"21.2.14","matchCriteriaId":"570DCFBC-7689-4E77-A8BF-8F310545EDE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.1.5","matchCriteriaId":"728ECAA8-FE3E-4F6D-8862-AF0C100C6699"},{"vulnerable":true,"criteria":"cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.1","versionEndExcluding":"23.0.7","matchCriteriaId":"7155AC1E-E4C8-4EF5-B593-7C924AF0C625"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","source":"eb41dac7-0af8-4f84-9f6d-0272772514f4","tags":["Vendor Advisory"]},{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}