5 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419. Vulnerabilidad de salto de directorio en el servidor web HP-ChaiSOE/1.0 en la impresora HP LaserJet P3015 con firmware anterior a v07.080.3, impresora LaserJet 4650 con firmware v07.006.0, e impresora LaserJet 2430 con firmware v08.113.0_I35128 permite a atacantes remotos leer ficheros arbitrarios a través de vectores de ataque desconocidos, una vulnerabilidad diferente a CVE-2008-4419. • http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0116.html http://osvdb.org/78224 http://secunia.com/advisories/47457 http://www.securityfocus.com/archive/1/521160 http://www.securityfocus.com/archive/1/521165 http://www.securityfocus.com/bid/51329 https://exchange.xforce.ibmcloud.com/vulnerabilities/72227 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.1EPSS: 0%CPEs: 164EXPL: 1

Multiple cross-site request forgery (CSRF) vulnerabilities in the HP Embedded Web Server (EWS) on HP LaserJet Printers, Edgeline Printers, and Digital Senders allow remote attackers to hijack the intranet connectivity of arbitrary users for requests that (1) print documents via unknown vectors, (2) modify the network configuration via a NetIPChange request to hp/device/config_result_YesNo.html/config, or (3) change the password via the Password and ConfirmPassword parameters to hp/device/set_config_password.html/config. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en HP Embedded Web Server (EWS) on HP LaserJet Printers, Edgeline Printers, and Digital Senders, permiten a atacantes remotos (1) imprimir documentos mediante vectores desconocidos, (2) modificar la configuración de red mediante una petición NetIPChange a hp/device/config_result_YesNo.html/config o (3) cambiar la contraseña mediante los parámetros Password y ConfirmPassword a hp/device/set_config_password.html/config. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01684566 http://osvdb.org/52847 http://osvdb.org/52848 http://osvdb.org/52849 http://www.louhinetworks.fi/advisory/HP_20090317.txt http://www.securityfocus.com/archive/1/501884/100/0/threaded http://www.securityfocus.com/bid/34143 http://www.vupen.com/english/advisories/2009/0754 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.6EPSS: 0%CPEs: 164EXPL: 0

The HP Embedded Web Server (EWS) on HP LaserJet Printers, Edgeline Printers, and Digital Senders has no management password by default, which makes it easier for remote attackers to obtain access. El HP Embedded Web Server (EWS) en HP LaserJet Printers, Edgeline Printers, y Digital Senders no tiene contraseña de administración por defecto, lo que facilita a atacantes remotos el obtener acceso. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01684566 http://www.louhinetworks.fi/advisory/HP_20090317.txt http://www.securityfocus.com/archive/1/501884/100/0/threaded http://www.vupen.com/english/advisories/2009/0754 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Directory traversal vulnerability in the HP JetDirect web administration interface in the HP-ChaiSOE 1.0 embedded web server on the LaserJet 9040mfp, LaserJet 9050mfp, and Color LaserJet 9500mfp before firmware 08.110.9; LaserJet 4345mfp and 9200C Digital Sender before firmware 09.120.9; Color LaserJet 4730mfp before firmware 46.200.9; LaserJet 2410, LaserJet 2420, and LaserJet 2430 before firmware 20080819 SPCL112A; LaserJet 4250 and LaserJet 4350 before firmware 20080819 SPCL015A; and LaserJet 9040 and LaserJet 9050 before firmware 20080819 SPCL110A allows remote attackers to read arbitrary files via directory traversal sequences in the URI. Vulnerabilidad de salto de directorio en la interfaz de administración Web HP JetDirect en el servidor web empotrado HP-ChaiSOE v1.0 en las LaserJet 9040mfp, LaserJet 9050mfp y Color LaserJet 9500mfp anteriores al software empotrado 08.110.9; LaserJet 4345mfp y 9200C Digital Sender anteriores al software empotrado 09.120.9; Color LaserJet 4730mfp anterior al software empotrado 46.200.9; LaserJet 2410, LaserJet 2420 y LaserJet 2430 anterior al software empotrado 20080819 SPCL112A; LaserJet 4250 y LaserJet 4350 anterior al software empotrado 20080819 SPCL015A; y LaserJet 9040 y LaserJet 9050 anterior al software empotrado 20080819 SPCL110A; permite a atacantes remotos leer ficheros arbitrario a través de secuencias de salto de directorio en el URI. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905 http://secunia.com/advisories/33779 http://www.securityfocus.com/archive/1/500657/100/0/threaded http://www.securityfocus.com/bid/33611 http://www.securitytracker.com/id?1021687 http://www.vupen.com/english/advisories/2009/0341 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

HP LaserJet 2430, and possibly other printers that use Jetdirect controls, stores information about recently printed documents without proper protection, which could allow remote attackers to obtain sensitive information via SNMP. • http://marc.info/?l=bugtraq&m=112684965506652&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/22289 •