8 results (0.002 seconds)

CVSS: 10.0EPSS: 3%CPEs: 5821EXPL: 0

22 Nov 2022 — Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution or LLMNR. Ciertos productos HP Print y productos Digital Sending pueden ser vulnerables a una posible ejecución remota de código y desbordamiento de búfer con el uso de resolución de nombres de multidifusión local de enlace o LLMNR. • https://support.hp.com/us-en/document/ish_5948778-5949142-16/hpsbpi03780 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 1523EXPL: 0

09 Nov 2021 — During installation with certain driver software or application packages an arbitrary code execution could occur. Durante la instalación con determinados paquetes de software de controladores o aplicaciones podría producirse una ejecución de código arbitrario • https://support.hp.com/us-en/document/c07058567 •

CVSS: 7.8EPSS: 30%CPEs: 8EXPL: 5

17 Nov 2010 — The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack. La configuración por defecto del valor PJL Access en las opciones de File System External Access de las imp... • https://www.exploit-db.com/exploits/17635 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 164EXPL: 1

18 Mar 2009 — Multiple cross-site request forgery (CSRF) vulnerabilities in the HP Embedded Web Server (EWS) on HP LaserJet Printers, Edgeline Printers, and Digital Senders allow remote attackers to hijack the intranet connectivity of arbitrary users for requests that (1) print documents via unknown vectors, (2) modify the network configuration via a NetIPChange request to hp/device/config_result_YesNo.html/config, or (3) change the password via the Password and ConfirmPassword parameters to hp/device/set_config_password... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01684566 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 1%CPEs: 164EXPL: 0

18 Mar 2009 — The HP Embedded Web Server (EWS) on HP LaserJet Printers, Edgeline Printers, and Digital Senders has no management password by default, which makes it easier for remote attackers to obtain access. El HP Embedded Web Server (EWS) en HP LaserJet Printers, Edgeline Printers, y Digital Senders no tiene contraseña de administración por defecto, lo que facilita a atacantes remotos el obtener acceso. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01684566 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 2

10 Jan 2007 — The PML Driver HPZ12 (HPZipm12.exe) in the HP all-in-one drivers, as used by multiple HP products, uses insecure SERVICE_CHANGE_CONFIG DACL permissions, which allows local users to gain privileges and execute arbitrary programs, as demonstrated by modifying the binpath argument, a related issue to CVE-2006-0023. El controlador PML HPZ12 (HPZipm12.exe) en los controladores todo en uno de HP, usado en múltiples productos HP, utiliza permisos no seguros SERVICE_CHANGE_CONFIG DACL, lo cual permite a un usuario ... • https://www.exploit-db.com/exploits/29403 •

CVSS: 9.8EPSS: 1%CPEs: 19EXPL: 0

31 Dec 2004 — The remote upgrade capability in HP LaserJet 4200 and 4300 printers does not require a password, which allows remote attackers to upgrade firmware. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBPI01085 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

31 Dec 2002 — ChaiVM EZloader for HP color LaserJet 4500 and 4550 and HP LaserJet 4100 and 8150 does not properly verify JAR signatures for new services, which allows local users to load unauthorized Chai services. • http://online.securityfocus.com/advisories/4317 • CWE-347: Improper Verification of Cryptographic Signature •