Page 2 of 10 results (0.013 seconds)

CVSS: 9.8EPSS: 0%CPEs: 76EXPL: 0

Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Remote Code Execution. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of HP Color LaserJet Pro M479fdw printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the cacheddata_http_handler method. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.hp.com/us-en/document/ish_7920078-7920104-16/hpsbpi03840 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 76EXPL: 0

Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Elevation of Privilege. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of HP Color LaserJet Pro M479fdw printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Probe messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.hp.com/us-en/document/ish_7919962-7920003-16/hpsbpi03839 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 138EXPL: 0

Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution. Algunos dispositivos de impresión de HP pueden ser vulnerables a una posible divulgación de información, denegación de servicio o ejecución de código remota This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of HP LaserJet Pro MFP M283fdw printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ScanJobs API. Crafted data in a request can cause a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://support.hp.com/us-en/document/ish_5950417-5950443-16 •

CVSS: 10.0EPSS: 1%CPEs: 138EXPL: 0

Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution. Algunos dispositivos de impresión de HP pueden ser vulnerables a una divulgación potencial de información, una denegación de servicio o a una ejecución de código remota This vulnerability allows remote attackers to disclose sensitive information on affected installations of HP LaserJet Pro MFP M283fdw printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PostScript interpreter. Crafted data in a CFF font can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. • https://support.hp.com/us-en/document/ish_5950417-5950443-16 •

CVSS: 10.0EPSS: 1%CPEs: 138EXPL: 0

Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution. Algunos dispositivos de impresión de HP pueden ser vulnerables a una divulgación potencial de información, una denegación de servicio o a una ejecución de código remota This vulnerability allows remote attackers to execute arbitrary code on affected installations of HP LaserJet Pro MFP M283fdw printers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the address book feature. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://support.hp.com/us-en/document/ish_5950417-5950443-16 •