Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp jetdirect x.08.04 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-1062
Buffer overflow in the FTP service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
5
CVSSv2
CVE-2000-1064
Buffer overflow in the LPD service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
5
CVSSv2
CVE-2000-1065
Vulnerability in IP implementation of HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service (printer crash) via a malformed packet.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
5
CVSSv2
CVE-2000-1063
Buffer overflow in the Telnet service in HP JetDirect printer card Firmware x.08.20 and previous versions allows remote malicious users to cause a denial of service.
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
7.5
CVSSv2
CVE-2002-1048
HP JetDirect printers allow remote malicious users to obtain the administrative password for the (1) web and (2) telnet services via an SNMP request to the variable (.iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0.
Hp Jetdirect X.08.00
Hp Jetdirect X.08.04
Hp Jetdirect X.08.05
Hp Jetdirect X.08.20
Hp Jetdirect J3111a Rev. A.08.06
Hp Jetdirect J3111a Rev. G.05.35
Hp Jetdirect J3111a Rev. G.07.02
Hp Jetdirect J3111a Rev. G.07.17
Hp Jetdirect X.20.00
Hp Jetdirect J3111a Rev. G.07.03
Hp Jetdirect J3111a Rev. G.08.03
Hp Jetdirect X.08.32
Hp Jetdirect X.21.00
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started