Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-22773

Summary
Assigner-Patchstack
Assigner Org ID-21595511-bba5-4825-b968-b78d1f9984a3
Published At-15 Jan, 2025 | 15:23
Updated At-15 Jan, 2025 | 19:17
Rejected At-
Credits

WordPress Htaccess File Editor <= 1.0.19 - Broken Authentication vulnerability

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Patchstack
Assigner Org ID:21595511-bba5-4825-b968-b78d1f9984a3
Published At:15 Jan, 2025 | 15:23
Updated At:15 Jan, 2025 | 19:17
Rejected At:
▼CVE Numbering Authority (CNA)
WordPress Htaccess File Editor <= 1.0.19 - Broken Authentication vulnerability

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.

Affected Products
Vendor
WPChill
Product
Htaccess File Editor
Collection URL
https://wordpress.org/plugins
Package Name
htaccess-file-editor
Default Status
unaffected
Versions
Affected
  • From n/a through 1.0.19 (custom)
    • -> unaffectedfrom1.0.20
Problem Types
TypeCWE IDDescription
CWECWE-538CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
Type: CWE
CWE ID: CWE-538
Description: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-180CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels
CAPEC ID: CAPEC-180
Description: CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels
Solutions

Update the WordPress Htaccess File Editor wordpress plugin to the latest available version (at least 1.0.20).

Configurations

Workarounds

Exploits

Credits

finder
savphill (Patchstack Alliance)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://patchstack.com/database/wordpress/plugin/htaccess-file-editor/vulnerability/wordpress-htaccess-file-editor-1-0-19-broken-authentication-vulnerability?_s_id=cve
vdb-entry
Hyperlink: https://patchstack.com/database/wordpress/plugin/htaccess-file-editor/vulnerability/wordpress-htaccess-file-editor-1-0-19-broken-authentication-vulnerability?_s_id=cve
Resource:
vdb-entry
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:audit@patchstack.com
Published At:15 Jan, 2025 | 16:15
Updated At:15 Jan, 2025 | 16:15

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-538Primaryaudit@patchstack.com
CWE ID: CWE-538
Type: Primary
Source: audit@patchstack.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://patchstack.com/database/wordpress/plugin/htaccess-file-editor/vulnerability/wordpress-htaccess-file-editor-1-0-19-broken-authentication-vulnerability?_s_id=cveaudit@patchstack.com
N/A
Hyperlink: https://patchstack.com/database/wordpress/plugin/htaccess-file-editor/vulnerability/wordpress-htaccess-file-editor-1-0-19-broken-authentication-vulnerability?_s_id=cve
Source: audit@patchstack.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2022-45354
Matching Score-8
Assigner-Patchstack
ShareView Details
Matching Score-8
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-88.05% / 99.45%
||
7 Day CHG~0.00%
Published-08 Jan, 2024 | 20:45
Updated-14 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Download Monitor Plugin <= 4.7.60 is vulnerable to Sensitive Data Exposure

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.7.60.

Action-Not Available
Vendor-wpchillWPChill
Product-download_monitorDownload Monitor
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-21501
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-5.3||MEDIUM
EPSS-1.38% / 79.48%
||
7 Day CHG~0.00%
Published-24 Feb, 2024 | 05:00
Updated-25 Apr, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.

Action-Not Available
Vendor-apostrophecmsn/aapostrophecmsFedora Project
Product-sanitize-htmlfedorasanitize-htmlorg.webjars.npm:sanitize-htmlsanitize-html
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2024-0191
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.38%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 19:31
Updated-03 Jun, 2025 | 14:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RRJ Nueva Ecija Engineer Online Portal file information disclosure

A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.

Action-Not Available
Vendor-niaRRJ
Product-rrj_nueva_ecija_engineer_online_portalNueva Ecija Engineer Online Portal
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2023-4933
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 38.33%
||
7 Day CHG~0.00%
Published-16 Oct, 2023 | 19:39
Updated-02 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Job Openings < 3.4.3 - Sensitive Data Exposure via Directory Listing

The WP Job Openings WordPress plugin before 3.4.3 does not block listing the contents of the directories where it stores attachments to job applications, allowing unauthenticated visitors to list and download private attachments if the autoindex feature of the web server is enabled.

Action-Not Available
Vendor-UnknownAWSM Digital Innovations
Product-wp_job_openingsWP Job Openings
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2021-32822
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4||MEDIUM
EPSS-0.30% / 52.74%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 18:45
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File disclosure in hbs

The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.

Action-Not Available
Vendor-hbs_projectpillarjs
Product-hbshbs
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-9947
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-30.48% / 96.54%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. A directory traversal vulnerability could allow a remote attacker with network access to the integrated web server (80/tcp and 443/tcp) to obtain information on the structure of the file system of the affected devices.

Action-Not Available
Vendor-n/aSiemens AG
Product-talon_tc_compact_firmwaretalon_tc_modular_firmwaretalon_tc_modularapogee_pxctalon_tc_compactapogee_pxc_modularapogee_pxc_modular_firmwareapogee_pxc_firmwareAPOGEE PXC and TALON TC BACnet Automation Controllers All versions <V3.5
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2025-22306
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 21.35%
||
7 Day CHG~0.00%
Published-07 Jan, 2025 | 16:58
Updated-07 Jan, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Link Whisper Free plugin <= 0.7.7 - Sensitive Data Exposure vulnerability

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Link Whisper Link Whisper Free.This issue affects Link Whisper Free: from n/a through 0.7.7.

Action-Not Available
Vendor-Link Whisper
Product-Link Whisper Free
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2022-26329
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-1.8||LOW
EPSS-0.30% / 52.75%
||
7 Day CHG~0.00%
Published-24 Jan, 2023 | 00:00
Updated-01 Apr, 2025 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File existence disclosue vulnerability in IDM plugin

File existence disclosure vulnerability in NetIQ Identity Manager plugin prior to version 4.8.5 allows attacker to determine whether a file exists on the filesystem. This issue affects: Micro Focus NetIQ Identity Manager NetIQ Identity Manager versions prior to 4.8.5 on ALL.

Action-Not Available
Vendor-netiqMicro Focus International Limited
Product-identity_managerNetIQ Identity Manager
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2024-51977
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-5.3||MEDIUM
EPSS-51.31% / 97.79%
||
7 Day CHG+1.51%
Published-25 Jun, 2025 | 07:15
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated leak of sensitive information affecting multiple models from Brother Industries, Ltd., FUJIFILM Business Innovation, Ricoh, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.

Action-Not Available
Vendor-Brother Industries, LtdToshiba TecFUJIFILM Business InnovationKonica Minolta, Inc.Ricoh Company, Ltd.
Product-HL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L6200DWTTD-4420DNZDCP-L6600DWMFC-L2717DWDocuPrint P260 dwMFC-7895DWDCP-L2540DNMFC-J6580CDWMFC-J3930DWDCP-L2537DWDCP-J928N-WBM 340FWMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRDocuPrint M275 zMFC-1911WHL-1218WDocuPrint P388 dwMFC-L5802DWPT-E550W (for China)MFC-J1170DWbizhub 5020iMFC-J6983CDWMFC-L8690CDWMFC-L6950DWHL-L2371DNPT-E550W (for Russia)HL-L5200DWTMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWQL-1115NWBHL-L2375DWRHL-1212WRHL-1212WEMFC-J1215WMFC-L6800DWMFC-J5730DWMFC-1912WRMFC-J1205W(XL)DocuPrint P378 dwMFC-L5700DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNDCP-L2520DWDCP-J982N-W/BDCP-L5500DNDCP-J772DWHL-L2315DWDCP-T420WDCP-J4143NHL-2590DNHL-L2350DWMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NMFC-J6730DWMFC-L2710DWRDCP-B7530DNPT-P750WDCP-L2551DNMFC-J5845DW(XL)QL-820NWBPT-E550W (for Vietnum)MFC-J4345DW XLDocuPrint P118 wDCP-C421WMFC-L2705DWRJ-3050MFC-9150CDNHL-B2080DWMFC-1910WEMFC-L5755DWM 340WDCP-L2540DNRMFC-L6702DWMFC-J998DWNDCP-1615NWDCP-C1210NTD-4550DNWBDocuPrint P285 dwHL-L6200DWRJ-3150AiHL-L6400DWHL-T4000DWADS-3600WDCP-L3510CDWDCP-T710W(for China)MFC-L2751DWDCP-L2560DWRDCP-L3551CDWDCP-J1200W(XL)MFC-T810WHL-L2357DWDCP-T520WMFC-J895DWMFC-L2701DWSP-1 (for Japan)MFC-J1605DNDocuPrint P288 dwDCP-1623WRDCP-9030CDNDocuPrint P378 dMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L3230CDNMFC-J5945DWMFC-L2715DWDocuPrint M375 zHL-L2366DWDCP-J1200NPT-E850TKW (for Vietnum)DCP-T226DCP-1610WEMFC-J738DNDCP-L2530DWMFC-J4443NMFC-J939DNMFC-J5330DWDCP-T225DCP-J1203NHL-L2372DNPT-D800WMFC-L2700DNHL-L8260CDNHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWDCP-L5650DNMFC-J6997CDWSP 230SFNwMFC-L2710DWMFC-L8610CDW(for Japan)HL-L6250DNDCP-7190DWMFC-L5900DWPJ-773HL-L9310CDWMFC-L2740DWFAX-L2710DNMFC-J1800DWMFC-L2716DWADS-2800WHL-L2385DWMFC-J1012DWQL-810WHL-L5100DNTDCP-1618WMFC-L6900DWGHL-L2390DWMFC-J4940DNMFC-J6999CDWMFC-L3710CDWHL-1211WHL-L2370DWXLMFC-L5702DWMFC-7890DNMFC-T920DWDocuPrint M118 zHL-L8260CDWDCP-L2551DWNFC-J903NDocuPrint M115 fwTD-4420DNMFC-J497DWPT-E550W (for US, EU)HL-L2395DWHL-L6402DWDocuPrint P115 wHL-L5202DWHL-L2365DWPT-P950NWMFC-J904NMFC-J939DWNDocuPrint M378 dHL-L2365DWRDocuPrint M225 zDCP-1617NWDCP-L5652DNMFC-L8900CDWbizhub 3080MFMFC-J6947DWMFC-7889DWQL-820NWBcHL-L8360CDWTDCP-L3517CDWMFC-J6995CDWDCP-1616NWMFC-L2750DWDCP-J572NMFC-L3770CDWMFC-L2700DW(ASA)HL-L2360DWRJ-3150DCP-T428WHL-L2351DWDCP-J973N-W/BHL-1223WRMFC-J5630CDWDCP-J981NDCP-J988NMFC-L2700DWRMFC-8530DNHL-L2350DWRRJ-3050AiHL-3190CDWMFC-J739DWNDCP-J987N-WDCP-T510W(for China)DCP-J1800NHL-L6450DWMFC-L5750DWMFC-L2700DWMFC-J1010DWDocuPrint P385 dwTD-2125NDocuPrint M235 dwDCP-L5602DNQL-1110NWBcDocuPrint P235 dDCP-J572DWDocuPrint M375 dfDCP-1612WDCP-L3550CDWDocuPrint M265 zMFC-J805DW XLMFC-J2730DWMFC-L5700DNRJ-3250WBMFC-L2715DW(for Tiwan, Koria)MFC-J738DWNMFC-1911NWDCP-L2552DNMFC-L6700DWHL-L2376DWDocuPrint M118 wDCP-1622WEDCP-T220MFC-J6583CDWDCP-L8410CDWMFC-1915WDCP-J1050DWHL-1212WDCP-L2550DWQL-810WcMFC-J6935DWDCP-L5600DNMFC-L3750CDWDCP-J1800DWDocuPrint P265 dwHL-J6000DWMFC-J995DW XLMFC-L3735CDNDCP-J1140DWMFC-J6535DWHL-L2386DWMFC-L3745CDWDocuPrint M288 dwPT-E550W (for Koria)MFC-J4540NHL-L5050DNHL-L3230CDWbizhub 3000MFDCP-L2535DWMFC-L9570CDWRJ-4250WBMFC-L2720DNMFC-L8610CDWHL-J6000CDWDCP-J914NMFC-J690DWDCP-B7520DWPT-E800WDocuPrint P268 dHL-3160CDWHL-L8360CDWADS-2400NMFC-J815DW XLMFC-J5830DWDCP-T510WHL-1210WMFC-L2710DNRMFC-L2740DWRHL-5595DNHDCP-T720DWMFC-L2732DWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2560DWDCP-J1200WEHL-J6100DWMFC-L9577CDWDocuPrint M288 zMFC-L2680WMFC-1910WDCP-L5502DNDCP-7180DNP 201Wbizhub 4020iMFC-4340DWEDCP-1623WEPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-L2520DWRDCP-J577NTD-2130NMFC-L2703DWPJ-883MFC-L2685DWMFC-J998DNMFC-1916NWDocuPrint M285 zDocuPrint M115 zMFC-L2707DWDCP-J972NDocuPrint P375 dwPT-E550W (for Tiwan, Hongkong)RJ-2150MFC-J6930DWDocuPrint P275 dwHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L2720DWMFC-L6902DWPT-E550W (for Thailand)HL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-L2720DWRDocuPrint M225 dwMFC-8540DNDCP-1610WRHL-1222WEDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NQL-1110NWBHL-5595DNPT-E850TKW (for Tiwan)PT-E850TKW (for UAE)HL-L5102DWMFC-J890DWTD-4520DNPT-P900WcMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEMFC-J4535DW(XL)DocuPrint M115 wMFC-J905NMFC-L2712DNDCP-7090DWMFC-J893NDCP-7190DNDCP-J526NDCP-7195DWMFC-L2730DWRHL-L2370DNDocuPrint P360 dwDocuPrint M260 zPT-E850TKW (for China)MFC-J5930DWPT-E850TKW (for Thailand)DCP-7189DWHL-L6202DWMFC-J1300DWRJ-2140DCP-L2532DWMFC-J6945DWHL-2595DWMFC-L5902DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-J4440DWHL-2560DNFAX-L2700DNDocuPrint P375 dMFC-L2730DNMFC-J6980CDWHL-L3210CWMFC-J995DWHL-L2360DNRSP 230DNwHL-L6400DWTPT-P900WDCP-1612WRDocuPrint P225 dHL-5590DNHL-L2370DNRDocuPrint M268 dwMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J987N-BDCP-J978N-W/BMFC-T4500DWDCP-J587NPT-E850TKW (for Koria)HL-L6250DWDocuPrint M378 dfDocuPrint M268 zMFC-J739DNHL-B2050DNHL-L2340DWRDCP-J1700DWSP-1MFC-L2730DWMFC-L6750DWMFC-L6970DWDCP-T725DWDocuPrint P268 dwDCP-J4140NDCP-J774DWbizhub 4000iHL-L5200DWMFC-B7720DNDCP-T425WDCP-T710WMFC-J2330DWHL-L3290CDWHL-2569DWDCP-1612WEHL-L2305WMFC-L6900DWMFC-J1500NMFC-J805DWDocuPrint M385 zHL-L3270CDWHL-1223WEMFC-1919NWDocuPrint M235 zDCP-J528NDCP-L2530DWRADS-3000NMFC-J4335DW(XL)MFC-L2770DWMFC-T925DWDCP-L2550DW(TWN)DCP-T820DWDCP-J1100DW
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
Details not found