Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp jetdirect x.08.05 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2000-1064
Buffer overflow in the LPD service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
445
VMScore
CVE-2000-1065
Vulnerability in IP implementation of HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service (printer crash) via a malformed packet.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
445
VMScore
CVE-2000-1062
Buffer overflow in the FTP service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
445
VMScore
CVE-2000-1063
Buffer overflow in the Telnet service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
755
VMScore
CVE-2002-1048
HP JetDirect printers allow remote malicious users to obtain the administrative password for the (1) web and (2) telnet services via an SNMP request to the variable (.iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0.
Hp Jetdirect X.08.00
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
Hp Jetdirect J3111a Rev. A.08.06
Hp Jetdirect J3111a Rev. G.05.35
Hp Jetdirect J3111a Rev. G.07.02
Hp Jetdirect J3111a Rev. G.07.17
Hp Jetdirect X.20.00
Hp Jetdirect J3111a Rev. G.07.03
Hp Jetdirect J3111a Rev. G.08.03
Hp Jetdirect X.08.32
Hp Jetdirect X.21.00
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started