Search criteria

6 vulnerabilities found for imagerunner_6870 by canon

FKIE_CVE-2008-0303

Vulnerability from fkie_nvd - Published: 2008-02-29 02:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Impacted products
Vendor Product Version
canon i-sensys lbp3360
canon i-sensys lbp3460
canon i-sensys lbp5360
canon imagepress c1
canon imagerunner 85plus
canon imagerunner 105plus
canon imagerunner 2230
canon imagerunner 2270
canon imagerunner 2570c
canon imagerunner 2570ci
canon imagerunner 2870
canon imagerunner 3025
canon imagerunner 3025n
canon imagerunner 3035
canon imagerunner 3035n
canon imagerunner 3045
canon imagerunner 3045n
canon imagerunner 3170c
canon imagerunner 3170ci
canon imagerunner 3180c
canon imagerunner 3180ci
canon imagerunner 3530
canon imagerunner 3570
canon imagerunner 4570
canon imagerunner 5055
canon imagerunner 5055n
canon imagerunner 5065
canon imagerunner 5065n
canon imagerunner 5075
canon imagerunner 5075n
canon imagerunner 5570
canon imagerunner 5800c
canon imagerunner 5800cn
canon imagerunner 6570
canon imagerunner 6800c
canon imagerunner 6800cn
canon imagerunner 7086
canon imagerunner 7095
canon imagerunner 7095p
canon imagerunner 7105
canon imagerunner 8070
canon imagerunner c2380i
canon imagerunner c2620
canon imagerunner c2620n
canon imagerunner c2880
canon imagerunner c2880i
canon imagerunner c3220n
canon imagerunner c3380
canon imagerunner c3380i
canon imagerunner c4080i
canon imagerunner c4580i
canon imagerunner c5185i
canon imagerunner c5870
canon imagerunner c5870i
canon imagerunner c5880
canon imagerunner c5880i
canon imagerunner c6870i
canon imagerunner c6880
canon imagerunner c6880i
canon imagerunner clc4040
canon imagerunner clc5151
canon imagerunner_2620 *
canon imagerunner_5000i *
canon imagerunner_5020 *
canon imagerunner_6870 *
canon imagerunner_8500 *
canon imagerunner_9070 *
canon imagerunner_c3200 *
canon imagerunner_c3220 *
canon imagerunner_c6800 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:canon:i-sensys:lbp3360:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5527A3-316B-4C5C-9499-E90A9B3ED521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:i-sensys:lbp3460:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACAFBF89-8C4D-4F18-BDB8-F7E5D5E18658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:i-sensys:lbp5360:*:*:*:*:*:*:*",
              "matchCriteriaId": "D090A27B-BDEF-45CB-ADDD-02C787401682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagepress:c1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8A809D-AE44-439B-850A-A4C282E2879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:85plus:*:*:*:*:*:*:*",
              "matchCriteriaId": "956D38C1-63EB-484A-86E1-8FFFBB4F2687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:105plus:*:*:*:*:*:*:*",
              "matchCriteriaId": "92429901-A557-4CCD-9014-1EA32D1D738C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:2230:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E229C8-C530-4EF1-8582-E50000DDC676",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:2270:*:*:*:*:*:*:*",
              "matchCriteriaId": "05045F4F-C2BD-4215-AB82-060A9C8E5C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:2570c:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F18BD2-8628-4D74-AB71-1F07C45AA865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:2570ci:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2191AA9-6EAD-401E-A831-7EAFF1D1AE4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:2870:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB25A914-5F7D-4134-B8D3-9FEE77D1E004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3025:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBBB4571-76C9-44D6-85BF-A3A4EAEF30A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3025n:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EB2555A-4596-4502-9F3D-1C863A49A7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3035:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D230D14-2B2D-4005-A613-45AC1BCE881F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3035n:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C8E5E7F-2A49-4EE1-8AF3-7A10D35A0C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3045:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5F8120-3BB9-4922-A210-3EC2DE905824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3045n:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C7BF9D-12DD-48AF-8CA2-F7FBE975827B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3170c:*:*:*:*:*:*:*",
              "matchCriteriaId": "522C81B2-8565-42B0-986A-AA529B68CE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3170ci:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D2BED79-2917-43D3-9B8F-AFE6103B780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3180c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFAE5078-589D-4B69-BB89-0F639B63A617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3180ci:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D2110B-56A3-4288-A81D-C9EB43602AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3530:*:*:*:*:*:*:*",
              "matchCriteriaId": "83390EF6-E058-48C2-89C0-B05973017958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:3570:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B4AA49-EF73-44B9-BF36-7ACA3AF83865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:4570:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C2944E-3FBC-465F-A2B5-35051F0531CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5055:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E74C0F-E5DC-446A-AB63-47EC0A733E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5055n:*:*:*:*:*:*:*",
              "matchCriteriaId": "B10EB3DD-F392-46E0-ADC0-10DA2AF44731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5065:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAE2C40-18E7-4BA5-B121-2363D973257B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5065n:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFCFF25F-5974-40D0-916D-065A5899647B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5075:*:*:*:*:*:*:*",
              "matchCriteriaId": "040BE6F9-5F1C-4E4C-825D-3F9EB35A7D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5075n:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF5B10EF-4DEF-4B82-A3E2-ABABCEC4FA9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5570:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB74285C-E11C-490A-970A-39B467AA9AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5800c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4F0C391-0A24-4A71-B700-AC7968B18B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:5800cn:*:*:*:*:*:*:*",
              "matchCriteriaId": "00810DAE-7457-4FBF-95C9-E1AF355D7C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:6570:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A409632-8511-4EC0-BB5F-743C9A14CBFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:6800c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C116560B-00B6-4BCF-9349-EE345D07E0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:6800cn:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EC135D-87E6-40EE-A699-B7501ADF5D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:7086:*:*:*:*:*:*:*",
              "matchCriteriaId": "17866E3B-F0AB-4776-8337-7F297613A766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:7095:*:*:*:*:*:*:*",
              "matchCriteriaId": "C15C1554-F055-457F-B1EB-99214798BD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:7095p:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE290B3-F248-4F79-B971-6658845E531F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:7105:*:*:*:*:*:*:*",
              "matchCriteriaId": "786EC60E-A890-4236-AEC4-1815CBE36404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:8070:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B23884-6B28-4E91-9207-C0B43A8911BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c2380i:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FBAD1AD-E705-4BB1-B308-C33B4F4FBF7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c2620:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3547DD-7C0B-4ED6-B361-25FD0D0C0FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c2620n:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B8527DA-E3A3-4CBD-AD8D-643314BFA0DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c2880:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D82E498-D467-42E7-B82B-DB970A8584F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c2880i:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DCF3699-B5FA-4E48-8C95-20FA7ADA6EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c3220n:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC02E198-284C-45BE-8CB2-0AE1BED06FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c3380:*:*:*:*:*:*:*",
              "matchCriteriaId": "3194031C-A77E-4DB1-8AA1-394D9D0069F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c3380i:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9795579-0C94-4704-94B6-419390055B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c4080i:*:*:*:*:*:*:*",
              "matchCriteriaId": "C13F455D-7C30-45D3-8987-5EFD05930679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c4580i:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BDB208C-9DFD-41D2-8563-6637958938F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c5185i:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8CBCB-7C3D-4D7F-92A9-07EE65D44864",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c5870:*:*:*:*:*:*:*",
              "matchCriteriaId": "8944BA6B-1CE1-4548-BF12-AA00972869BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c5870i:*:*:*:*:*:*:*",
              "matchCriteriaId": "311E74FA-8C6E-4186-95CB-57579796BF4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c5880:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD69F8-B40C-4189-93D4-6A7E611B31B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c5880i:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5E4B7A-F8CB-4D01-BFF1-E2F2B4B680C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c6870i:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D65FD6-90A3-4048-973D-1D6404B1CA57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c6880:*:*:*:*:*:*:*",
              "matchCriteriaId": "3415DF9C-CE4A-499E-A032-D0C66AA0E37E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:c6880i:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD97A28-761D-482F-8A3C-1BE80B356E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:clc4040:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE907E6-6033-429D-948C-F0C67CFB39A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner:clc5151:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE2BDF2-D17A-4ABB-82A3-F0B94064824D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_2620:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E4C7D11-EE90-4E10-9BBB-9CDC55467A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_5000i:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EB4A89-5470-4B7E-B09D-3CC1D7CC7F4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_5020:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E411CEEF-8615-47B3-AC1F-F907ECD8C725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_6870:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B994ED-E476-43EE-BD7D-FA3158AA66F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_8500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5C108F-F89B-457D-9EDA-A5096AA01363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_9070:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C40ED96-C1D9-4C2F-B90A-BEF0B36BAF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_c3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "714DD889-AFDB-4300-9A72-F46A6263733C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_c3220:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DACE20-FDA4-4633-9755-95F72257F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_c6800:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1542430-BAEB-4A4E-B617-AFC303614E0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica de impresi\u00f3n FTP en m\u00faltiples impresoras Canon, incluyendo imageRUNNER e imagePRESS, permite a atacantes remotos utilizar el servidor como un proxy inadvertido a trav\u00e9s de un comando PORT modificado, tambi\u00e9n conocido como salto FTP."
    }
  ],
  "id": "CVE-2008-0303",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-29T02:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/568073"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28042"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/568073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-4680

Vulnerability from fkie_nvd - Published: 2006-09-11 17:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_2620:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E4C7D11-EE90-4E10-9BBB-9CDC55467A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_5020:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E411CEEF-8615-47B3-AC1F-F907ECD8C725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_6870:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B994ED-E476-43EE-BD7D-FA3158AA66F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_8500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5C108F-F89B-457D-9EDA-A5096AA01363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_9070:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C40ED96-C1D9-4C2F-B90A-BEF0B36BAF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_c3220:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DACE20-FDA4-4633-9755-95F72257F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canon:imagerunner_c6800:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1542430-BAEB-4A4E-B617-AFC303614E0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information."
    },
    {
      "lang": "es",
      "value": "El interfaz de usuario remoto de Canon imageRUNNER incluye nombres de usuario y contrase\u00f1as cuando se exportan una libreta de direcciones, lo que permite a un atacante dependiente del contexto obtener informaci\u00f3n sensible."
    }
  ],
  "id": "CVE-2006-4680",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-11T17:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21788"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1538"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19865"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3501"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21788"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1538"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3501"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-0303 (GCVE-0-2008-0303)

Vulnerability from cvelistv5 – Published: 2008-02-29 02:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/568073 third-party-advisoryx_refsource_CERT-VN
http://www.securityfocus.com/bid/28042 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN10056705/index.html third-party-advisoryx_refsource_JVN
http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack x_refsource_MISC
http://securitytracker.com/id?1019528 vdb-entryx_refsource_SECTRACK
http://www.usa.canon.com/html/security/pdf/CVA-001.pdf x_refsource_CONFIRM
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:39:34.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#568073",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/568073"
          },
          {
            "name": "28042",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28042"
          },
          {
            "name": "JVN#10056705",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
          },
          {
            "name": "1019528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019528"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
          },
          {
            "name": "JVNDB-2008-000013",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#568073",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/568073"
        },
        {
          "name": "28042",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28042"
        },
        {
          "name": "JVN#10056705",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
        },
        {
          "name": "1019528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019528"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
        },
        {
          "name": "JVNDB-2008-000013",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#568073",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/568073"
            },
            {
              "name": "28042",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28042"
            },
            {
              "name": "JVN#10056705",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
            },
            {
              "name": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack",
              "refsource": "MISC",
              "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
            },
            {
              "name": "1019528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019528"
            },
            {
              "name": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
            },
            {
              "name": "JVNDB-2008-000013",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0303",
    "datePublished": "2008-02-29T02:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T07:39:34.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4680 (GCVE-0-2006-4680)

Vulnerability from cvelistv5 – Published: 2006-09-11 17:00 – Updated: 2024-08-07 19:23
VLAI?
Summary
The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/445532/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3501 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/445302/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/19865 vdb-entryx_refsource_BID
http://secunia.com/advisories/21788 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/1538 third-party-advisoryx_refsource_SREASON
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:23:40.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
          },
          {
            "name": "ADV-2006-3501",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3501"
          },
          {
            "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
          },
          {
            "name": "canon-imagerunner-information-disclosure(28795)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
          },
          {
            "name": "19865",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19865"
          },
          {
            "name": "21788",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21788"
          },
          {
            "name": "1538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1538"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
        },
        {
          "name": "ADV-2006-3501",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3501"
        },
        {
          "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
        },
        {
          "name": "canon-imagerunner-information-disclosure(28795)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
        },
        {
          "name": "19865",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19865"
        },
        {
          "name": "21788",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21788"
        },
        {
          "name": "1538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1538"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4680",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
            },
            {
              "name": "ADV-2006-3501",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3501"
            },
            {
              "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
            },
            {
              "name": "canon-imagerunner-information-disclosure(28795)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
            },
            {
              "name": "19865",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19865"
            },
            {
              "name": "21788",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21788"
            },
            {
              "name": "1538",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1538"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4680",
    "datePublished": "2006-09-11T17:00:00",
    "dateReserved": "2006-09-11T00:00:00",
    "dateUpdated": "2024-08-07T19:23:40.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0303 (GCVE-0-2008-0303)

Vulnerability from nvd – Published: 2008-02-29 02:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/568073 third-party-advisoryx_refsource_CERT-VN
http://www.securityfocus.com/bid/28042 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN10056705/index.html third-party-advisoryx_refsource_JVN
http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack x_refsource_MISC
http://securitytracker.com/id?1019528 vdb-entryx_refsource_SECTRACK
http://www.usa.canon.com/html/security/pdf/CVA-001.pdf x_refsource_CONFIRM
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:39:34.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#568073",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/568073"
          },
          {
            "name": "28042",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28042"
          },
          {
            "name": "JVN#10056705",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
          },
          {
            "name": "1019528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019528"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
          },
          {
            "name": "JVNDB-2008-000013",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#568073",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/568073"
        },
        {
          "name": "28042",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28042"
        },
        {
          "name": "JVN#10056705",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
        },
        {
          "name": "1019528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019528"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
        },
        {
          "name": "JVNDB-2008-000013",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0303",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#568073",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/568073"
            },
            {
              "name": "28042",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28042"
            },
            {
              "name": "JVN#10056705",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10056705/index.html"
            },
            {
              "name": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack",
              "refsource": "MISC",
              "url": "http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack"
            },
            {
              "name": "1019528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019528"
            },
            {
              "name": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.usa.canon.com/html/security/pdf/CVA-001.pdf"
            },
            {
              "name": "JVNDB-2008-000013",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0303",
    "datePublished": "2008-02-29T02:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T07:39:34.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4680 (GCVE-0-2006-4680)

Vulnerability from nvd – Published: 2006-09-11 17:00 – Updated: 2024-08-07 19:23
VLAI?
Summary
The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/445532/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3501 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/445302/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/19865 vdb-entryx_refsource_BID
http://secunia.com/advisories/21788 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/1538 third-party-advisoryx_refsource_SREASON
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:23:40.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
          },
          {
            "name": "ADV-2006-3501",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3501"
          },
          {
            "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
          },
          {
            "name": "canon-imagerunner-information-disclosure(28795)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
          },
          {
            "name": "19865",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19865"
          },
          {
            "name": "21788",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21788"
          },
          {
            "name": "1538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1538"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
        },
        {
          "name": "ADV-2006-3501",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3501"
        },
        {
          "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
        },
        {
          "name": "canon-imagerunner-information-disclosure(28795)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
        },
        {
          "name": "19865",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19865"
        },
        {
          "name": "21788",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21788"
        },
        {
          "name": "1538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1538"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4680",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060907 Re: Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/445532/100/0/threaded"
            },
            {
              "name": "ADV-2006-3501",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3501"
            },
            {
              "name": "20060905 Canon ImageRunner reveals SMB, IPX, and FTP username/passwords",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/445302/100/0/threaded"
            },
            {
              "name": "canon-imagerunner-information-disclosure(28795)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28795"
            },
            {
              "name": "19865",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19865"
            },
            {
              "name": "21788",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21788"
            },
            {
              "name": "1538",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1538"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4680",
    "datePublished": "2006-09-11T17:00:00",
    "dateReserved": "2006-09-11T00:00:00",
    "dateUpdated": "2024-08-07T19:23:40.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}