Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-2697

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-29 Jul, 2011 | 20:00
Updated At-06 Aug, 2024 | 23:08
Rejected At-
Credits

foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:29 Jul, 2011 | 20:00
Updated At:06 Aug, 2024 | 23:08
Rejected At:
▼CVE Numbering Authority (CNA)

foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
vendor-advisory
x_refsource_MANDRIVA
http://www.openwall.com/lists/oss-security/2011/07/18/3
mailing-list
x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
vdb-entry
x_refsource_XF
http://www.openwall.com/lists/oss-security/2011/07/13/3
mailing-list
x_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=721001
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/28/1
mailing-list
x_refsource_MLIST
http://www.ubuntu.com/usn/USN-1194-1
vendor-advisory
x_refsource_UBUNTU
https://bugzilla.novell.com/show_bug.cgi?id=698451
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-201203-07.xml
vendor-advisory
x_refsource_GENTOO
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/18/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/13/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=721001
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/28/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.ubuntu.com/usn/USN-1194-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=698451
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/18/3
mailing-list
x_refsource_MLIST
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
vdb-entry
x_refsource_XF
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/13/3
mailing-list
x_refsource_MLIST
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=721001
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/28/1
mailing-list
x_refsource_MLIST
x_transferred
http://www.ubuntu.com/usn/USN-1194-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://bugzilla.novell.com/show_bug.cgi?id=698451
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-201203-07.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/18/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/13/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=721001
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/28/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1194-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=698451
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:29 Jul, 2011 | 20:55
Updated At:11 Apr, 2025 | 00:51

foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

HP Inc.
hp
>>linux_imaging_and_printing_project>>3.11.5
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://security.gentoo.org/glsa/glsa-201203-07.xmlsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/13/3secalert@redhat.com
Exploit
Patch
http://www.openwall.com/lists/oss-security/2011/07/18/3secalert@redhat.com
Exploit
Patch
http://www.openwall.com/lists/oss-security/2011/07/28/1secalert@redhat.com
Exploit
Patch
http://www.ubuntu.com/usn/USN-1194-1secalert@redhat.com
N/A
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfsecalert@redhat.com
N/A
https://bugzilla.novell.com/show_bug.cgi?id=698451secalert@redhat.com
Exploit
Patch
https://bugzilla.redhat.com/show_bug.cgi?id=721001secalert@redhat.com
Exploit
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-201203-07.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/13/3af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.openwall.com/lists/oss-security/2011/07/18/3af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.openwall.com/lists/oss-security/2011/07/28/1af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.ubuntu.com/usn/USN-1194-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.novell.com/show_bug.cgi?id=698451af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
https://bugzilla.redhat.com/show_bug.cgi?id=721001af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-07.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/13/3
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/18/3
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/28/1
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: http://www.ubuntu.com/usn/USN-1194-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=698451
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=721001
Source: secalert@redhat.com
Resource:
Exploit
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201203-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/13/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/18/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/28/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://www.ubuntu.com/usn/USN-1194-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.novell.com/show_bug.cgi?id=698451
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=721001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

713Records found

CVE-2020-6921
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.02%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:38
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

Action-Not Available
Vendor-n/aHP Inc.
Product-support_assistantHP Support Assistant
CVE-2020-6922
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.02%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:38
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

Action-Not Available
Vendor-n/aHP Inc.
Product-support_assistantHP Support Assistant
CVE-2020-6917
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.02%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:38
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

Action-Not Available
Vendor-n/aHP Inc.
Product-support_assistantHP Support Assistant
CVE-2016-5387
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-59.81% / 98.21%
||
7 Day CHG+1.91%
Published-19 Jul, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

Action-Not Available
Vendor-n/aopenSUSEThe Apache Software FoundationRed Hat, Inc.Fedora ProjectCanonical Ltd.Debian GNU/LinuxOracle CorporationHP Inc.
Product-enterprise_linuxenterprise_linux_serversolarissystem_management_homepageenterprise_linux_eusenterprise_manager_ops_centerhttp_serverjboss_web_serverdebian_linuxlinuxenterprise_linux_server_ausjboss_enterprise_web_serverfedoraleapopensuseenterprise_linux_desktopubuntu_linuxjboss_core_servicesenterprise_linux_server_tusenterprise_linux_workstationcommunications_user_data_repositoryn/a
CVE-2016-4390
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.02% / 83.47%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Filter SDK in HPE KeyView 10.18 through 10.24 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4387, CVE-2016-4388, and CVE-2016-4389.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2016-4388
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.20% / 84.10%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Filter SDK in HPE KeyView 10.18 through 10.24 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4387, CVE-2016-4389, and CVE-2016-4390.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2016-4389
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.02% / 83.47%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Filter SDK in HPE KeyView 10.18 through 10.24 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4387, CVE-2016-4388, and CVE-2016-4390.

Action-Not Available
Vendor-n/aHP Inc.
Product-keyviewn/a
CVE-2020-6919
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.02%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

Action-Not Available
Vendor-n/aHP Inc.
Product-support_assistantHP Support Assistant
CVE-2015-5451
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.08%
||
7 Day CHG~0.00%
Published-23 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in HP Operations Orchestration Central 10.x before 10.22.001 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-operations_orchestrationn/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2020-28419
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-8.8||HIGH
EPSS-0.78% / 73.24%
||
7 Day CHG~0.00%
Published-09 Nov, 2021 | 18:01
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During installation with certain driver software or application packages an arbitrary code execution could occur.

Action-Not Available
Vendor-n/aHP Inc.
Product-deskjet_plus_ink_advantage_6400_5sd79aink_tank_310_z4b05acolor_laserjet_managed_mfp_e77422_5cm77aofficejet_pro_9010_firmwarecolor_laserjet_managed_mfp_e67550_firmwareenvy_photo_7100_k7g99adeskjet_ink_advantage_3830_f5r98bofficejet_8022_3uc62dlaserjet_pro_400_n404dw_firmwareofficejet_pro_8210_j3p65adeskjet_plus_4100_7fs76asmart_tank_plus_550_wireless_y0f72alaserjet_pro_m201_firmwaredeskjet_plus_4100_7mr23alaserjet_pro_mfp_m148_g3q77alaserjet_pro_mfp_m134_g3q59adeskjet_3790_firmwaredeskjet_plus_4100_7fs87adeskjet_3790_1sh08adeskjet_3700_j9v95bsmart_tank_plus_650_wireless_y0f71alaserjet_managed_mfp_e62555_j8j74alaserjet_pro_200_color_m251_cf147alaserjet_managed_flow_mfp_m830_firmwaredeskjet_ink_advantage_ultra_5730_f5s61acolor_laserjet_pro_mfp_m274n_m6d61asmart_tank_610_wireless_1tj10asmart_tank_plus_650_wireless_firmwareenvy_6000_5se16alaserjet_managed_flow_mfp_m630_p7z47acolor_laserjet_enterprise_flow_mfp_m577_b5l54adeskjet_ink_advantage_2600_y5z04bofficejet_pro_9020_1mr72acolor_laserjet_enterprise_m552_b5l23adeskjet_plus_ink_advantage_6000_5se23cdeskjet_ink_advantage_5000_m2u88bink_tank_wireless_410_z4b53alaserjet_managed_flow_mfp_m630_l3u62acolor_laserjet_enterprise_flow_mfp_m577_b5l47apagewide_managed_color_mfp_p77940_5zp00alaserjet_enterprise_m506_f2a70asmart_tank_plus_550_wireless_3yw71alaserjet_managed_mfp_m630_firmwaresmart_tank_510_wireless_1tj12alaserjet_pro_m203_g3q48aofficejet_8022_1kr70blaserjet_pro_m206_4pa39aink_tank_310_7zv78alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80asmart_tank_510_wireless_6hf11asmart_tank_510_wireless_4sb23adeskjet_3755_t8w92adeskjet_3755_j9v90alaserjet_pro_mfp_m132_g3q62acolor_laserjet_pro_m252n_b4a22alaserjet_ultra_mfp_m230_4pa44adeskjet_ink_advantage_3700_4sc29aofficejet_6960_j7k39asmart_tank_510_wireless_1tj09asmart_tank_plus_550_wireless_3yw70acolor_laserjet_managed_mfp_e67550_l3u67aofficejet_pro_9020_1mr71adeskjet_3755_t8x05bpagewide_managed_color_mfp_e58650dn_firmwareenvy_photo_7100_z3m47bpagewide_managed_color_mfp_p77960_5zp00aenvy_5000_m2u92bofficejet_6950_t3p03apagewide_managed_color_mfp_p77940_y3z68adeskjet_ink_advantage_3700_t8w37aofficejet_pro_9020_1mr70aofficejet_8010_1kr70bsmart_tank_plus_650_wireless_3yw72alaserjet_pro_mfp_m426_f6w14aenvy_photo_7800_k7s10ddeskjet_ink_advantage_2700_4ws04blaserjet_managed_m506_firmwareofficejet_8022_4kj70bcolor_laserjet_managed_flow_mfp_e67550_firmwarelaserjet_p1560_ce651acolor_laserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_mfp_e67560_l3u70aenvy_5000_z4a69alaserjet_pro_mfp_m126_cz186adeskjet_ink_advantage_2700_4ws04alaserjet_enterprise_flow_mfp_m830_firmwarepagewide_managed_color_mfp_p77950_5zp01aenvy_pro_6400_6wd16apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_pro_mfp_m277dw_firmwarecolor_laserjet_pro_mfp_m476_cf386aofficejet_enterprise_color_mfp_x585_firmwaredeskjet_ink_advantage_5000_m2u86apagewide_managed_color_mfp_p77950_y3z66aofficejet_8022_3uc65alaserjet_pro_mfp_m134_g3q62adeskjet_plus_4100_3xv15acolor_laserjet_pro_m154_t6b52aofficejet_8022_1kr69alaserjet_pro_mfp_m227_g3q74alaserjet_p1100_ce651acolor_laserjet_pro_m155_firmwareenvy_6000_7cz37apagewide_managed_color_mfp_p77960_y3z68alaserjet_enterprise_flow_mfp_m630_p7z48aenvy_photo_7100_k7g96alaserjet_enterprise_600_m603_ce994alaserjet_pro_mfp_m134_g3q58alaserjet_pro_m15_firmwarecolor_laserjet_enterprise_flow_mfp_m680_cz249acolor_laserjet_pro_mfp_m177_cz165alaserjet_managed_flow_mfp_e62575_j8j74aofficejet_pro_9010_3uk97dlaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71aneverstop_laser_1020_4ye48aofficejet_pro_8020_4kj71dneverstop_laser_1200a_5nl12aenvy_pro_6400_5se48adeskjet_2600_5sf02aneverstop_laser_1020_5hg80adeskjet_3755_t8x10blaserjet_pro_400_m401_firmwarelaserjet_enterprise_500_color_m551_cf083asmart_tank_plus_650_wireless_3yw74acolor_laserjet_enterprise_mfp_m577_b5l48adeskjet_2600_v1n08alaserjet_managed_flow_mfp_e62575_j8j67alaserjet_pro_mfp_m125_cz175adeskjet_ink_advantage_3700_1dt62aofficejet_pro_9020_1mr71blaserjet_pro_mfp_m226_c6n23apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m856_firmwaredeskjet_2700_7fr60ddeskjet_ink_advantage_3830_f5r96claserjet_enterprise_600_m602_ce991acolor_laserjet_pro_mfp_m277dw_b3q10alaserjet_pro_m202_firmwarelaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_cm4540_mfp_cc420adeskjet_2600_4uj28bdeskjet_ink_advantage_3700_t8w48cneverstop_laser_1000_4ry22aenvy_photo_7800_firmwarelaserjet_pro_mfp_m427_f6w14alaserjet_enterprise_m806_firmwareneverstop_laser_1020_4ry23aenvy_photo_7100_z3m48blaserjet_pro_mfp_m149_4pa42acolor_laserjet_managed_flow_mfp_m880zm_a2w76adeskjet_3755_j9v91a_laserjet_managed_mfp_e62665_3gy15alaserjet_pro_mfp_m227_4pa44alaserjet_pro_m16_firmwarelaserjet_pro_m226_c6n23alaserjet_pro_mfp_m134_g3q67alaserjet_enterprise_mfp_m725_firmwarelaserjet_enterprise_m607_firmwarelaserjet_enterprise_600_m601_firmwarelaserjet_pro_m402_f6j41a_laserjet_managed_mfp_e62665_3gy16alaserjet_pro_400_mfp_m425_cf288alaserjet_pro_m201_cf455acolor_laserjet_managed_mfp_e77428_5cm78aink_tank_wireless_410_4dx94alaserjet_pro_400_m401_cf399aofficejet_pro_9010_1kr55blaserjet_pro_m402_g3v21acolor_laserjet_enterprise_mfp_m680_firmwarepagewide_managed_color_mfp_p77960_2gp25alaserjet_p1560_firmwareofficejet_pro_9020_1mr70bcolor_laserjet_pro_mfp_m377_m5h23acolor_laserjet_enterprise_m552_firmwareofficejet_pro_9020_1mr73dlaserjet_enterprise_mfp_m528_1pv49aofficejet_pro_9020_1mr69alaserjet_pro_m402_f6j44alaserjet_pro_mfp_m126_cz184aenvy_pro_6400_5se45bdeskjet_3790_t8x40alaserjet_pro_300_color_mfp_m375_firmwarelaserjet_pro_m521_mfp_firmwarelaserjet_pro_cp1525_ce875adeskjet_3630_k4t97alaserjet_managed_flow_mfp_m630_b3g86acolor_laserjet_pro_m452dn_cf389adeskjet_ink_advantage_3700_t8w42cdeskjet_3700_j9v96blaserjet_pro_m403_f6j41adeskjet_2600_y5h62adeskjet_2600_5sf04acolor_laserjet_managed_m651_h0dc9acolor_laserjet_pro_mfp_m182_7kw55aenvy_5000_z4a74acolor_laserjet_managed_flow_mfp_e67560_l3u66adeskjet_2700_3xv18bdeskjet_3630_k4t99cenvy_5000_m2u85acolor_laserjet_enterprise_m855_a2w79asmart_tank_plus_650_wireless_3yw48apagewide_managed_color_mfp_p77950_2gp22adeskjet_3700_firmwaredeskjet_ink_advantage_2700_7hz98bcolor_laserjet_enterprise_flow_mfp_m880z_a2w76alaserjet_pro_m15_w2g52aofficejet_3830_k7v36alaserjet_managed_flow_mfp_m525_l3u59alaserjet_pro_m402_c5f95acolor_laserjet_pro_mfp_m277n_firmwarelaserjet_managed_mfp_e72425_firmwaresmart_tank_610_wireless_3yw72acolor_laserjet_pro_mfp_m477_cf379acolor_laserjet_pro_mfp_m180_t6b71aofficejet_8010_4kj69bofficejet_pro_9020_1mr78blaserjet_enterprise_color_flow_mfp_m575_cd644acolor_laserjet_cm4540_mfp_firmwarelaserjet_pro_mfp_m225_cf485alaserjet_pro_mfp_m31_cf485adeskjet_3755_t8w94adeskjet_3700_t8w94alaserjet_pro_m203_firmwaresmart_tank_610_wireless_3yw74aink_tank_wireless_410_z6z95asmart_tank_510_wireless_3yw71adeskjet_2600_v1n01alaserjet_pro_400_color_mfp_m451_ce955adeskjet_2600_v1n05bpagewide_enterprise_color_flow_mfp_780f_j7z10acolor_laserjet_managed_e75245_firmwaredeskjet_ink_advantage_2600_y5z03bsmart_tank_plus_550_wireless_3yw51alaserjet_enterprise_600_m602_ce993adeskjet_2700_7fr57dlaserjet_pro_200_color_m276_cf144alaserjet_pro_m521_mfp_a8p79alaserjet_pro_mfp_m227_g3q77acolor_laserjet_managed_mfp_e67650_3gy32adeskjet_ink_advantage_2700_7fr26blaserjet_managed_flow_mfp_m630_firmwareofficejet_6960_t0f38alaserjet_managed_mfp_m630_j7x28acolor_laserjet_pro_m252dw_b4a21acolor_laserjet_enterprise_flow_mfp_m880z_d7p70alaserjet_enterprise_mfp_m725_cf067alaserjet_pro_400_m401_cf274adeskjet_3700_t8x19blaserjet_pro_mfp_m426_firmwarepagewide_managed_color_mfp_p77960_5zn98acolor_laserjet_enterprise_m651_cz255alaserjet_pro_m402_f6j43alaserjet_pro_mfp_m226_cf484alaserjet_managed_mfp_m630_l3u61alaserjet_ultra_mfp_m230_g3q78alaserjet_managed_mfp_e72425_5cm72alaserjet_pro_mfp_m226_c6n22alaserjet_enterprise_flow_mfp_m527z_f2a78alaserjet_enterprise_m4555_mfp_ce504alaserjet_pro_mfp_m130_g3q58acolor_laserjet_managed_m553_bl27acolor_laserjet_managed_mfp_e77422_5rc91acolor_laserjet_enterprise_m855_a2w77alaserjet_pro_mfp_m134_g3q65alaserjet_managed_m605_l3u54apagewide_enterprise_color_flow_mfp_780f_firmwareofficejet_managed_color_mfp_x585deskjet_2600_y5h65adeskjet_3700_t8x23bdeskjet_ink_advantage_5000_m2u86cdeskjet_3700_t8x10blaserjet_pro_mfp_m125_cz183alaserjet_pro_m203_g3q46acolor_laserjet_enterprise_m855_t3u66alaserjet_pro_mfp_m130_g3q59acolor_laserjet_managed_mfp_e77422color_laserjet_pro_m452dw_cf389adeskjet_ink_advantage_3700_4sc30acolor_laserjet_pro_mfp_m176_firmwareofficejet_3830_f5r95cenvy_photo_7100_firmwarelaserjet_pro_mfp_m149_g3q75acolor_laserjet_enterprise_m855_d7p72acolor_laserjet_managed_flow_mfp_m880zm_d7p70alaserjet_enterprise_mfp_m527_f2a76aneverstop_laser_1000_4ye47adeskjet_2600_y5h60alaserjet_pro_mfp_m127_firmwaredeskjet_3630_f5s49blaserjet_managed_mfp_m527_f2a80acolor_laserjet_enterprise_flow_mfp_m680_cz248alaserjet_pro_mfp_m130_g3q64apagewide_managed_color_e55650_l3u44alaserjet_managed_m605_e6b69alaserjet_pro_m521_mfp_a8p80aenvy_5000_m2u94bcolor_laserjet_pro_mfp_m180_t6b70apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_mfp_e67560_l3u67aofficejet_8010_1kr58acolor_laserjet_managed_mfp_m775_firmwaresmart_tank_plus_550_wireless_7xv38adeskjet_3630_k4u00bink_tank_310_z6z11alaserjet_enterprise_flow_mfp_m830_l3u65aofficejet_enterprise_color_x555_l1h45acolor_laserjet_enterprise_m855_firmwarelaserjet_pro_m1536_mfp_firmwaredeskjet_2600_y5h80adeskjet_3700_t8w96adeskjet_3630_f5s50blaserjet_enterprise_600_m603_ce996aenvy_pro_6400_5se45alaserjet_managed_flow_mfp_e62575_firmwarelaserjet_pro_mfp_m126_cz174acolor_laserjet_enterprise_flow_mfp_m577_b5l48asmart_tank_plus_550_wireless_1tj09aenvy_photo_7100_z3m52alaserjet_p1100_ce653alaserjet_enterprise_500_color_m551_cf082acolor_laserjet_cm4540_mfp_cc419acolor_laserjet_pro_m452dw_firmwareenvy_photo_7800_y0g50blaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_pro_mfp_m29_firmwareofficejet_pro_9010_3uk91blaserjet_p1560_ce657alaserjet_pro_mfp_m132_firmwareink_tank_310_4yh05acolor_laserjet_cm4540_mfp_cc421acolor_laserjet_managed_mfp_e77422_5cm78asmart_tank_plus_650_wireless_6hf11alaserjet_pro_mfp_m127_cz182alaserjet_pro_500_color_mfp_m570_firmwaredeskjet_3700_t8x05benvy_6000_8qq99acolor_laserjet_enterprise_m855_d7p73alaserjet_pro_300_color_mfp_m351_ce957adeskjet_3755_t8w52aenvy_photo_7800_y0g49benvy_5000_m2u85bsmart_tank_610_wireless_7xv38alaserjet_managed_mfp_e62565_firmwaredeskjet_plus_ink_advantage_6400_5sd80blaserjet_ultra_mfp_m230_4pa41aenvy_pro_6400_6wd14aink_tank_wireless_410_z7a01alaserjet_enterprise_600_m601laserjet_managed_mfp_e72425_5cm70acolor_laserjet_pro_mfp_m283_7kw72aofficejet_pro_9010_3uk86blaserjet_managed_flow_mfp_m630_p7z48adeskjet_3700_t8w57acolor_laserjet_managed_flow_mfp_m880zm_firmwarelaserjet_pro_mfp_m134_g3q63acolor_laserjet_enterprise_m651_cz257alaserjet_pro_mfp_m126_cz183alaserjet_pro_m17_w2g50acolor_laserjet_managed_m553_b5l39aenvy_pro_6400_firmwarecolor_laserjet_pro_mfp_m183_firmwaresmart_tank_plus_650_wireless_3yw70alaserjet_pro_mfp_m427_f6w17alaserjet_enterprise_m806_cz244alaserjet_pro_mfp_m127_cz184aofficejet_pro_8020_4kj66bdeskjet_ink_advantage_ultra_5730_f5s60acolor_laserjet_pro_mfp_m181_firmwarecolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_mfp_e77428_5rc91alaserjet_pro_mfp_m227_4pa41alaserjet_enterprise_m608_k0q18alaserjet_enterprise_m4555_mfp_firmwarecolor_laserjet_managed_e85055_t3u52alaserjet_enterprise_color_flow_mfp_m575_firmwarelaserjet_pro_mfp_m149_g3q79adeskjet_3755_t8w83alaserjet_enterprise_color_flow_mfp_m575_cd646asmart_tank_510_wireless_1tj11alaserjet_enterprise_700_m712_firmwarelaserjet_ultra_mfp_m230_firmwaredeskjet_3700_t8x00bdeskjet_plus_4100_7fs74alaserjet_pro_mfp_m148_4pa42alaserjet_managed_flow_mfp_e62555_j8j79alaserjet_p1600_ce653apagewide_managed_color_mfp_p77960_y3z64aenvy_5000_m2u91bofficejet_pro_8020_3uc61bdeskjet_2600_y5h64alaserjet_pro_m16_w2g53aofficejet_6960_t0f30alaserjet_pro_m226_cf484aofficejet_3830_k7v44bcolor_laserjet_managed_e85055_t3u51adeskjet_plus_4100_3xv14claserjet_enterprise_m606_e6b72adeskjet_2600_y5h61adeskjet_3700_t8x07bdeskjet_3700_j9v92alaserjet_managed_flow_mfp_m830_l3u65alaserjet_pro_mfp_m225_c6n23adeskjet_3700_t8w83asmart_tank_plus_650_wireless_3yw75alaserjet_enterprise_m607_k0q15alaserjet_pro_mfp_m125_cz174adeskjet_3790_t8x44aofficejet_pro_8210_d9l63alaserjet_enterprise_700_color_mfp_m775_firmwarecolor_laserjet_managed_mfp_e77428_5cm77adeskjet_2700_3xv19ddeskjet_plus_4100_7fs74dcolor_laserjet_pro_mfp_m282_firmwaredeskjet_plus_4100_7mr24adeskjet_3755_j9v86aofficejet_8010_1kr69alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14aofficejet_3830_k7v37alaserjet_pro_mfp_m31laserjet_pro_m403_firmwareenvy_photo_7800_y0g42dlaserjet_pro_m403_c5f93acolor_laserjet_pro_m252n_firmwaresmart_tank_510_wireless_y0f72adeskjet_3790_t8x40blaserjet_pro_400_n404dw_cf278aneverstop_laser_1000_4ry23alaserjet_pro_mfp_m128_cz185acolor_laserjet_enterprise_flow_mfp_m880z_a2w75acolor_laserjet_pro_mfp_m281_t6b83asmart_tank_510_wireless_7xv38alaserjet_managed_flow_mfp_e62555_j8j67acolor_laserjet_enterprise_flow_mfp_m880z_d7p71apagewide_enterprise_color_mfp_586_g1w39alaserjet_enterprise_600_m603_ce995apagewide_managed_color_mfp_p77940_5zn99alaserjet_managed_m506_f2a71asmart_tank_plus_550_wireless_3yw48acolor_laserjet_enterprise_m651_h0dc9alaserjet_pro_mfp_m125_cz185adeskjet_ink_advantage_3830_firmwaredeskjet_plus_ink_advantage_6400_firmwarelaserjet_p1560_ce655asmart_tank_355_firmwaredeskjet_3790_t8x39claserjet_pro_400_n404dw_cf274aofficejet_6960_j7k38acolor_laserjet_pro_mfp_m477_cf377acolor_laserjet_pro_mfp_m182_firmwarecolor_laserjet_managed_flow_mfp_e62675_firmwaredeskjet_2600_firmwarelaserjet_enterprise_mfp_m527_f2a81alaserjet_p1600_firmwareofficejet_pro_9010_1kr53dlaserjet_managed_flow_mfp_m525_firmwaresmart_tank_plus_550_wireless_3yw72alaserjet_enterprise_500_mfp_m525f_cf116alaserjet_pro_m17_y5s43a_laserjet_managed_mfp_e62665_3gy17alaserjet_enterprise_m506_f2a68adeskjet_2700_7fr57aofficejet_pro_9020_1mr76aenvy_photo_7800_k7s00adeskjet_3700_t8x01bdeskjet_3630_k4t96alaserjet_enterprise_m608_m0p32acolor_laserjet_pro_m452dn_cf394adeskjet_3630_f5s43ccolor_laserjet_managed_m553_b5l25alaserjet_pro_m118_g3q47apagewide_managed_color_mfp_p77950_5zn98alaserjet_pro_400_color_mfp_m475_ce864adeskjet_plus_4100_7fs87dcolor_laserjet_enterprise_flow_mfp_m880z_firmwareofficejet_managed_color_mfp_x585_firmwarecolor_laserjet_enterprise_mfp_m680_ca251alaserjet_enterprise_mfp_m725_cf066alaserjet_pro_mfp_m130_g3q63acolor_laserjet_managed_flow_mfp_e67550_l3u67acolor_laserjet_pro_m156_firmwarelaserjet_pro_m225_c6n22apagewide_enterprise_color_556_g1w46alaserjet_100_color_mfp_m175nw_ce865alaserjet_pro_m402_c5j91alaserjet_pro_m403_g3v21acolor_laserjet_managed_flow_mfp_m880zm_l3u52adeskjet_ink_advantage_2600_v1n02bdeskjet_ink_advantage_3700_j9v89bpagewide_managed_color_p75250_firmwaresmart_tank_plus_550_wireless_3yw73alaserjet_pro_mfp_m125_cz181alaserjet_pro_mfp_m427_c5f97aenvy_6000_5se17aofficejet_6960_t0f28aofficejet_3830_f5r99alaserjet_managed_mfp_e52545_firmwarelaserjet_enterprise_m605_e6b69aofficejet_6950_p4c81acolor_laserjet_pro_mfp_m183_7kw55alaserjet_enterprise_flow_mfp_m630_p7z47adeskjet_3630_k4u01bdeskjet_plus_4100_7fs75ddeskjet_2600_y5h66alaserjet_pro_mfp_m132_g3q64alaserjet_pro_mfp_m134_g3q60adeskjet_ink_advantage_3700_7fm65bofficejet_pro_9020_1mr73aofficejet_pro_7720_wide_format_y0s18aofficejet_pro_8020_3uc64alaserjet_managed_mfp_m630_b3g84alaserjet_pro_mfp_m126_cz172alaserjet_enterprise_m407_firmwarecolor_laserjet_managed_mfp_e67550_l3u70aenvy_5000_m2u91asmart_tank_610_wireless_firmwarelaserjet_pro_m435_mfp_a3e42alaserjet_managed_mfp_e72425_5cm71apagewide_managed_color_mfp_p77950_5zp00aink_tank_310_firmwarepagewide_managed_color_mfp_p77960_y3z63alaserjet_enterprise_700_m712_cf236adeskjet_2700_7fr53alaserjet_pro_mfp_m225_firmwarelaserjet_pro_m118_g3q50adeskjet_3755_j9v93bcolor_laserjet_enterprise_m750_firmwarelaserjet_ultra_mfp_m230_g3q79acolor_laserjet_pro_m452dn_cf388adeskjet_ink_advantage_3700_t8w50claserjet_pro_400_n404dw_cf285alaserjet_pro_mfp_m132_g3q58aofficejet_pro_8020_1kr57adeskjet_plus_4100_7fs88dsmart_tank_610_wireless_6hf11adeskjet_3700_t8x06benvy_pro_6400_8qq88acolor_laserjet_pro_mfp_m181_t6b71aink_tank_wireless_410_z6z99adeskjet_3700_t8x04blaserjet_pro_500_color_mfp_m570_cz272acolor_laserjet_pro_mfp_m281_t6b81acolor_laserjet_pro_mfp_m476_cf385alaserjet_pro_mfp_m427_c5f99alaserjet_pro_mfp_m128_cz186acolor_laserjet_enterprise_flow_mfp_m880z_l3u51alaserjet_pro_400_n404dw_cf399acolor_laserjet_managed_mfp_e62675_3gy16asmart_tank_610_wireless_3yw73alaserjet_pro_m402_firmwaredeskjet_3700_t8w51alaserjet_pro_mfp_m426_c5f98alaserjet_enterprise_m806_cz245aofficejet_8022_3uc58ddeskjet_plus_4100_8qb70acolor_laserjet_enterprise_mfp_m577_b5l46acolor_laserjet_managed_mfp_e77422_5cm79alaserjet_pro_mfp_m227_firmwarelaserjet_pro_m16_w2g51acolor_laserjet_managed_flow_mfp_e67550_l3u66apagewide_enterprise_color_mpf_780_j7z09alaserjet_managed_mfp_m725_l3u63acolor_laserjet_pro_mfp_m181_t6b70alaserjet_pro_mfp_m149_firmwarelaserjet_managed_mfp_e62565_j8j67alaserjet_pro_200_color_m251_firmwaredeskjet_3755_j9v95bofficejet_3830_f5s02bdeskjet_3700_t8w52alaserjet_pro_cp1525_firmwaredeskjet_2700_5ar83bsmart_tank_plus_550_wireless_3yw75alaserjet_pro_mfp_m426_c5f97aofficejet_pro_8020_1kr65bdeskjet_2700_7fr52acolor_laserjet_enterprise_m553_b5l25adeskjet_2600_v1n05aenvy_5000_z4a73asmart_tank_510_wireless_3yw51alaserjet_pro_mfp_m126_firmwarecolor_laserjet_pro_mfp_m277n_b3q17adeskjet_3700_j9v90alaserjet_enterprise_m609_k0q21aofficejet_8010_1kr71bcolor_laserjet_pro_m452dw_cf394acolor_laserjet_managed_mfp_e77428deskjet_2600_v1n07alaserjet_enterprise_m606_e6b73alaserjet_enterprise_m608_k0q19asmart_tank_plus_550_wireless_1tj10acolor_laserjet_enterprise_m455_firmwarelaserjet_p1100_ce658asmart_tank_plus_650_wireless_y0f72asmart_tank_610_wireless_y0f72acolor_laserjet_managed_mfp_e62675_3gy14aofficejet_enterprise_color_x555_c2s11asmart_tank_plus_550_wireless_1tj12adeskjet_ink_advantage_2700_7fr29blaserjet_enterprise_600_m601_ce990alaserjet_pro_m403_c5f96adeskjet_ink_advantage_2600_y5z02bofficejet_6950_p4c78alaserjet_pro_m226_cf485adeskjet_3755_j9v96blaserjet_managed_flow_mfp_e62565_j8j73aofficejet_8010_4kj67blaserjet_pro_mfp_m427_firmwareenvy_photo_7100_z3m42dlaserjet_pro_mfp_m125_cz182asmart_tank_510_wireless_y0f73alaserjet_pro_mfp_m132_g3q59alaserjet_pro_mfp_m134_g3q68a_laserjet_managed_mfp_e62665_firmwarelaserjet_managed_flow_mfp_e62565_j8j67adeskjet_plus_ink_advantage_6000_5se522claserjet_enterprise_flow_mfp_m830_cf367alaserjet_pro_m203_g3q47acolor_laserjet_enterprise_m750_d3l08acolor_laserjet_pro_mfp_m280_t6b83adeskjet_3700_j9v86blaserjet_enterprise_flow_mfp_m527z_f2a76acolor_laserjet_pro_m252dw_b4a22alaserjet_pro_mfp_m227_g3q75asmart_tank_510_wireless_3yw73aneverstop_laser_1200a_4ye52alaserjet_pro_m226_firmwarelaserjet_pro_mfp_m128_cz174asmart_tank_plus_650_wireless_1tj12adeskjet_ink_advantage_2600_v1n02acolor_laserjet_enterprise_flow_mfp_m880z_l3u52aofficejet_3830_k7v38adeskjet_plus_ink_advantage_6400_5sd78cpagewide_managed_color_mfp_e58650dn_l3u42apagewide_enterprise_color_flow_mfp_785_j7z11aofficejet_8010_3uc65alaserjet_enterprise_500_color_m551_firmwareofficejet_pro_8210_t0g70asmart_tank_wireless_450_firmwareofficejet_pro_9020_1mr77aneverstop_laser_1020_4ye47apagewide_managed_color_mfp_p77950_2gp25acolor_laserjet_managed_mfp_e77428_5cm76alaserjet_enterprise_m604_e6b67alaserjet_enterprise_m604_firmwareenvy_6000_8qq97apagewide_managed_color_mfp_p77940_y3z62adeskjet_plus_ink_advantage_6000_5se522asmart_tank_610_wireless_3yw75alaserjet_pro_mfp_m130_g3q65aofficejet_enterprise_color_mfp_x585_b5l04aneverstop_laser_1020_4ry22asmart_tank_510_wireless_3yw74aofficejet_6960_j7k37acolor_laserjet_enterprise_m455_3pz95adeskjet_3755_t8x07blaserjet_managed_m605_firmwarelaserjet_enterprise_700_color_mfp_m775_l3u49aofficejet_pro_9010_3uk83blaserjet_enterprise_600_m602_firmwarelaserjet_enterprise_m406_3pz15aenvy_photo_7800_y0g43dofficejet_pro_8020_4kj64dcolor_laserjet_managed_mfp_e62655_3gy18acolor_laserjet_pro_mfp_m280_t6b81alaserjet_enterprise_mfp_m630_b3g84alaserjet_pro_mfp_m128_cz184acolor_laserjet_managed_mfp_e67650_firmwarelaserjet_pro_mfp_m127_cz185adeskjet_3755_t8x12bcolor_laserjet_enterprise_mfp_m577_b5l47apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_managed_m651_cz255aofficejet_8022_firmwarecolor_laserjet_managed_e85055_firmwarecolor_laserjet_enterprise_m750_d3l09alaserjet_managed_mfp_m725_cf069adeskjet_ink_advantage_2600_7fq79bpagewide_managed_color_flow_mfp_e58650z_firmwaredeskjet_ink_advantage_ultra_5730_firmwaredeskjet_ink_advantage_3700_t8w41blaserjet_enterprise_flow_mfp_m525_cf118aofficejet_6960_j7k35adeskjet_3755_t8w58aneverstop_laser_1020_5hg74alaserjet_pro_m403_f6j43alaserjet_pro_m201_cf456alaserjet_pro_m118_g3q48aenvy_6000_5se20acolor_laserjet_pro_mfp_m282_7kw74alaserjet_enterprise_m605_l3u53aofficejet_6960_t0f31adeskjet_2700_8rk11acolor_laserjet_managed_mfp_m775_l3u49adeskjet_ink_advantage_3700_t8w46ccolor_laserjet_managed_mfp_e67560_l3u69alaserjet_pro_m17_w2g52aenvy_pro_6400_5se47aenvy_5000_m2u94apagewide_managed_color_mfp_p77940_2gp22adeskjet_3630_k4t99bdeskjet_plus_4100_7fs77bsmart_tank_510_wireless_y0f74asmart_tank_plus_550_wireless_1tj11asmart_tank_plus_550_wireless_3yw74aofficejet_pro_9010_y8m28dlaserjet_pro_m402_c5f94alaserjet_pro_cm1415_mfp_ce862aofficejet_pro_8020_4kj72dcolor_laserjet_enterprise_mfp_m680_cz250alaserjet_managed_mfp_e72425_5rc89adeskjet_3700_t8w56asmart_tank_510_wireless_3yw75aink_tank_310_z4b04adeskjet_2600_v1n03acolor_laserjet_managed_mfp_m680_firmwarecolor_laserjet_enterprise_m855_t3u52alaserjet_pro_m17_w2g51aenvy_photo_7800_y0g52bofficejet_pro_9010_1kr55alaserjet_pro_m203_g3q50alaserjet_pro_mfp_m130_g3q57aenvy_5000_z4a60adeskjet_2700_7fr54bdeskjet_3755_firmwarecolor_laserjet_managed_m651_firmwarelaserjet_pro_200_color_m276_cf145acolor_laserjet_pro_mfp_m176_cf547alaserjet_pro_mfp_m426_c5f99aenvy_photo_7100_z3m37alaserjet_managed_m506_f2a66alaserjet_pro_mfp_m128_cz175alaserjet_pro_mfp_m426_f6w19aenvy_pro_6400_5se46bofficejet_pro_8210_j3p67alaserjet_pro_mfp_m132_g3q67apagewide_enterprise_color_mpf_780_j7z10adeskjet_3630_f5s43adeskjet_3790_t8x39aofficejet_8010_4kj70bdeskjet_3700_j9v94bdeskjet_2600_v1n04adeskjet_plus_4100_3xv15dsmart_tank_610_wireless_3yw48acolor_laserjet_enterprise_m855_a2w78adeskjet_3755_t8w56acolor_laserjet_managed_mfp_m775_l3u50alaserjet_managed_m506_f2a68aofficejet_pro_9010_1kr48alaserjet_managed_flow_mfp_m525_l3u60adeskjet_ink_advantage_3700_3yz75alaserjet_pro_mfp_m148_firmwareofficejet_pro_9020_3ul00dcolor_laserjet_managed_mfp_e67550_l3u66aneverstop_laser_1000_5hg80apagewide_enterprise_color_flow_mfp_785_firmwareofficejet_pro_9020_3uk99dlaserjet_enterprise_m605_l3u54alaserjet_pro_m206_g3q46adeskjet_plus_ink_advantage_6000_5se26bcolor_laserjet_managed_mfp_e67650_3gy31alaserjet_pro_mfp_m149_g3q74aofficejet_enterprise_color_x555_c2s12alaserjet_managed_mfp_m630_b3g85acolor_laserjet_pro_mfp_m280_t6b80acolor_laserjet_enterprise_m651_cz256apagewide_managed_color_mfp_p77960_2gp22adeskjet_ink_advantage_2600_y5z00alaserjet_pro_mfp_m227_g3q78alaserjet_pro_mfp_m132_g3q61aofficejet_pro_8020_1kr66bofficejet_pro_7730_wide_format_l3t99aofficejet_pro_9020_1mr69claserjet_pro_mfp_m125_cz173apagewide_managed_color_mfp_p77960_y3z66adeskjet_2700_7fr50bdeskjet_2700_7fr48dofficejet_pro_9020_1mr80ddeskjet_2700_5ar84adeskjet_3630_v3f22acolor_laserjet_managed_flow_mfp_e67550_l3u69acolor_laserjet_pro_mfp_m283_7kw73aofficejet_pro_9010_3uk83alaserjet_enterprise_m609_k0q22acolor_laserjet_pro_mfp_m282_7kw75alaserjet_pro_m402_c5f93aofficejet_8010_3uc58dlaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_700_m712_cf235alaserjet_enterprise_m506_f2a66alaserjet_pro_mfp_m427_f6w15asmart_tank_plus_650_wireless_y0f74adeskjet_3755_j9v86blaserjet_pro_mfp_m29_cf485alaserjet_managed_flow_mfp_e62555_j8j74asmart_tank_plus_550_wireless_y0f73adeskjet_2600_y5h69alaserjet_pro_m15_w2g50acolor_laserjet_pro_m154_t6b51alaserjet_pro_mfp_m127_cz174alaserjet_enterprise_flow_mfp_m630_b3g86alaserjet_pro_mfp_m130_g3q66acolor_laserjet_pro_m452nw_cf394alaserjet_pro_mfp_m128_cz173adeskjet_ink_advantage_3700_3yz74alaserjet_pro_m403_f6j42acolor_laserjet_pro_m155_7kw48alaserjet_pro_mfp_m226_cf485acolor_laserjet_enterprise_flow_mfp_m680_ca251alaserjet_managed_500_mfp_m525_firmwarecolor_laserjet_managed_mfp_m680_l3u47alaserjet_pro_mfp_m130_g3q68alaserjet_pro_mfp_m149_g3q77alaserjet_pro_mfp_m130_firmwaresmart_tank_610_wireless_y0f74aofficejet_pro_9010_1kr49alaserjet_pro_mfp_m148_g3q74aenvy_photo_7800_k7r96acolor_laserjet_managed_mfp_e62675_3gy15asmart_tank_plus_550_wireless_y0f71adeskjet_3630_v3f21alaserjet_managed_m506_f2a69asmart_tank_610_wireless_3yw70alaserjet_pro_mfp_m225_c6n22alaserjet_pro_400_m401_cf285aofficejet_pro_8210_d9l64alaserjet_managed_mfp_e52545_3gy19adeskjet_ink_advantage_2700_4ws03bdeskjet_3700_j9v86acolor_laserjet_managed_mfp_e77428_5cm79adeskjet_ink_advantage_3700_t8w35alaserjet_pro_mfp_m125_firmwarelaserjet_pro_400_mfp_m425_cf286acolor_laserjet_managed_flow_mfp_m680_l3u48apagewide_managed_color_mfp_p77960_y3z62alaserjet_enterprise_mfp_m725_l3u64alaserjet_pro_m226_cf486aofficejet_3830_firmwarecolor_laserjet_enterprise_m553_b5l26adeskjet_2600_v1n05cenvy_6000_firmwaredeskjet_ink_advantage_5000_m2u89bofficejet_pro_9010_3uk96dlaserjet_pro_m17_firmwarelaserjet_pro_400_color_m451_firmwarepagewide_managed_color_mfp_p77950_y3z64alaserjet_pro_mfp_m132_g3q63acolor_laserjet_pro_mfp_m476_cf387alaserjet_enterprise_700_color_mfp_m775_cc522aofficejet_pro_9010_3uk90dcolor_laserjet_pro_mfp_m377_firmwarecolor_laserjet_managed_flow_mfp_e67560_l3u70apagewide_enterprise_color_flow_mfp_586z_firmwarelaserjet_pro_200_color_m276_firmwarecolor_laserjet_pro_mfp_m477_cf378adeskjet_3755_t8w59acolor_laserjet_pro_mfp_m277n_b3q10acolor_laserjet_managed_e75245_t3u64acolor_laserjet_pro_mfp_m181_t6b74alaserjet_pro_mfp_m149_g3q76aneverstop_laser_1000_5hg74alaserjet_pro_m118_firmwareofficejet_pro_8020_5lj17acolor_laserjet_enterprise_m553_firmwareneverstop_laser_1200a_4ye53acolor_laserjet_pro_m452dw_cf388adeskjet_ink_advantage_5000_m2u87bpagewide_managed_color_e55650_firmwarecolor_laserjet_pro_mfp_m283_7kw75acolor_laserjet_pro_m452dn_firmwaredeskjet_ink_advantage_5000_m2u87aofficejet_8010_4kj68blaserjet_managed_m605_e6b70aneverstop_laser_1000_firmwarelaserjet_managed_flow_mfp_m527z_f2a79aofficejet_pro_9020_1mr72blaserjet_pro_cp1525_ce874acolor_laserjet_managed_flow_mfp_m680_firmwarelaserjet_enterprise_m4555_mfp_ce502alaserjet_pro_mfp_m134_g3q66alaserjet_pro_m403_c5f92alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_pro_mfp_m283_firmwarelaserjet_pro_mfp_m148_4pa41aofficejet_6950_p4c82adeskjet_2600_y5h67adeskjet_ink_advantage_5000_firmwarelaserjet_ultra_mfp_m230_4pa42alaserjet_pro_mfp_m127_cz173asmart_tank_610_wireless_1tj11apagewide_managed_color_mfp_p77940_y3z63adeskjet_2600_v1n03bdeskjet_plus_4100_firmwarelaserjet_pro_m15_y5s43aenvy_5000_m2u92adeskjet_3630_k4t93apagewide_enterprise_color_mpf_780dn_firmwarelaserjet_p1600_ce655adeskjet_2600_y5h68dofficejet_pro_9010_1kr46claserjet_pro_mfp_m149_g3q78adeskjet_2700_7fr55blaserjet_pro_m15_w2g51acolor_laserjet_pro_mfp_m280_t6b82apagewide_color_755_firmwarelaserjet_enterprise_m605_firmwaredeskjet_3790_t8x39bpagewide_managed_color_mfp_p77950_firmwarecolor_laserjet_pro_m155_7kw49adeskjet_3630_f5s48acolor_laserjet_enterprise_m553_bl27alaserjet_pro_m403_c5j91alaserjet_pro_mfp_m132_g3q68alaserjet_p1600_ce651apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_mfp_m775_cc523aofficejet_pro_9020_1mr75alaserjet_pro_mfp_m134_firmwarecolor_laserjet_managed_mfp_e67560_firmwarelaserjet_pro_mfp_m126_cz173apagewide_managed_color_mfp_p77960_y3z65alaserjet_pro_m402_c5f92alaserjet_managed_mfp_m725_cf068asmart_tank_plus_650_wireless_3yw51alaserjet_pro_mfp_m149_4pa44adeskjet_3630_f5s57aofficejet_pro_9010_3uk85dlaserjet_ultra_mfp_m230_g3q76alaserjet_pro_mfp_m128_cz181aofficejet_pro_9010_1kr55dlaserjet_pro_m206_g3q48alaserjet_pro_mfp_m132_g3q66alaserjet_p1600_ce657adeskjet_2600_y5h67dlaserjet_pro_m501_j8h61acolor_laserjet_pro_mfp_m182_7kw56adeskjet_2600_y5h69denvy_5000_z4a70alaserjet_enterprise_m407_3pz16apagewide_managed_color_e75160_firmwarepagewide_enterprise_color_flow_mfp_586z_g1w40alaserjet_pro_mfp_m128_cz183alaserjet_enterprise_managed_e42540_cz245acolor_laserjet_pro_mfp_m176_cz165alaserjet_ultra_mfp_m230_g3q74adeskjet_ink_advantage_3700_firmwarelaserjet_pro_mfp_m227_g3q76aofficejet_pro_9020_1mr74alaserjet_pro_m206_g3q50alaserjet_pro_mfp_m134_g3q61alaserjet_p1560_ce653alaserjet_enterprise_mfp_m630_b3g85alaserjet_pro_300_color_mfp_m351_ce955aneverstop_laser_1200a_4ry26alaserjet_enterprise_600_m601_ce989alaserjet_pro_mfp_m127_cz183alaserjet_pro_mfp_m148_g3q75acolor_laserjet_pro_mfp_m477_firmwareofficejet_8010_3uc62dpagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_enterprise_mfp_m725_cf069alaserjet_pro_m403_c5f94aofficejet_pro_8020_5lj18acolor_laserjet_pro_mfp_m277dw_b3q17apagewide_color_755_4pz47alaserjet_100_color_mfp_m175nw_ce866alaserjet_pro_m15_w2g53adeskjet_ink_advantage_3700_t8w36aofficejet_8022_1kr71bsmart_tank_wireless_450_z6z96acolor_laserjet_enterprise_m750_d3l10acolor_laserjet_enterprise_mfp_m680_cz249alaserjet_enterprise_500_mfp_m525f_cf118alaserjet_pro_400_color_mfp_m475_firmwaresmart_tank_510_wireless_3yw70aenvy_photo_7100_z3m46bsmart_tank_355_z4b07aenvy_5000_z4a71acolor_laserjet_managed_m651_l8z07alaserjet_pro_mfp_m148_4pa44apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_pro_400_color_mfp_m475_ce863adeskjet_3630_k4t95acolor_laserjet_pro_mfp_m476_firmwarelaserjet_pro_mfp_m426_f6w15asmart_tank_plus_550_wireless_6hf11apagewide_managed_color_e75160_j7z06asmart_tank_plus_550_wireless_y0f74aink_tank_wireless_410_4dx95adeskjet_ink_advantage_2700_7fr20alaserjet_p1100_ce655alaserjet_enterprise_500_color_mfp_m575_cd644acolor_laserjet_managed_mfp_e62655_3gy15acolor_laserjet_enterprise_m651_l8z07acolor_laserjet_pro_mfp_m280_firmwaredeskjet_ink_advantage_2700_firmwarecolor_laserjet_managed_flow_mfp_m880zm_d7p71adeskjet_ink_advantage_3700_j9v87cdeskjet_ink_advantage_3700_1dt61aofficejet_pro_8020_3uc59b_laserjet_managed_mfp_e62665_3gy14aofficejet_8022_1kr58apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_managed_mfp_m775_cc524apagewide_managed_color_flow_mfp_e58650z_l3u42adeskjet_ink_advantage_3700_j9v87alaserjet_pro_mfp_m426_f6w18asmart_tank_510_wireless_3yw72alaserjet_managed_mfp_e62565_j8j79alaserjet_managed_flow_mfp_e52545c_firmwarepagewide_managed_color_mfp_p77960_5zn99adeskjet_ink_advantage_2600_firmwareenvy_pro_6400_5se46alaserjet_pro_400_m401_cf270aenvy_6000_5se18acolor_laserjet_pro_m255_7kw65alaserjet_pro_mfp_m126_cz182apagewide_managed_color_mfp_p77950_y3z65alaserjet_pro_mfp_m427_f6w13aneverstop_laser_1020_firmwareenvy_5000_z4a54asmart_tank_plus_550_wireless_4sb23acolor_laserjet_managed_m553_firmwarelaserjet_pro_mfp_m125_cz184aofficejet_pro_9010_1kr45alaserjet_managed_flow_mfp_e62555_firmwareofficejet_pro_8020_1kr62aink_tank_wireless_410_firmwarelaserjet_enterprise_600_m603laserjet_managed_mfp_e62555_firmwareenvy_6000_5se16blaserjet_enterprise_flow_mfp_m630_firmwareofficejet_pro_8210_j3p66apagewide_enterprise_color_556_g1w47vdeskjet_2700_5ar83acolor_laserjet_pro_mfp_m182_7kw54acolor_laserjet_pro_m156_7kw49acolor_laserjet_pro_m156_7kw48acolor_laserjet_managed_e45028_3qa35aofficejet_8010_firmwarelaserjet_enterprise_m609_firmwarelaserjet_pro_m202_c6n21aofficejet_pro_8210_firmwarelaserjet_managed_flow_mfp_m830_cf367alaserjet_pro_mfp_m127_cz175apagewide_enterprise_color_556_firmwarelaserjet_pro_m403_f6j44apagewide_enterprise_color_flow_mfp_586z_g1w39apagewide_managed_color_mfp_p77940_firmwarelaserjet_pro_mfp_m126_cz175acolor_laserjet_pro_mfp_m281_t6b80aink_tank_wireless_410_4yf79apagewide_managed_color_p75250_y3z49alaserjet_managed_flow_mfp_e62565_firmwarepagewide_managed_color_mfp_p77960_y3z61adeskjet_2600_y5h58alaserjet_100_color_mfp_m175nw_firmwarelaserjet_managed_500_mfp_m525_l3u60apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m4555_mfp_ce738alaserjet_enterprise_m506_f2a67aofficejet_pro_9010_1kr49bofficejet_3830_k7v40adeskjet_3630_k4t94acolor_laserjet_pro_m154_firmwarelaserjet_managed_mfp_m527_firmwarelaserjet_enterprise_flow_mfp_m527z_f2a81alaserjet_enterprise_500_mfp_m525f_cf117alaserjet_ultra_mfp_m230_g3q77alaserjet_managed_mfp_m527_f2a79acolor_laserjet_pro_m252n_b4a21acolor_laserjet_managed_mfp_e67560_l3u66alaserjet_managed_mfp_m725_cf067acolor_laserjet_pro_m452nw_cf389adeskjet_2700_3xv17alaserjet_pro_m225_cf486aneverstop_laser_1000_4ye51alaserjet_enterprise_mfp_m528_1pv65alaserjet_pro_m16_w2g52apagewide_managed_color_mfp_p77950_y3z63asmart_tank_wireless_450_z6z98adeskjet_plus_ink_advantage_6000_5se23blaserjet_pro_m402_c5f96aofficejet_pro_7720_wide_format_g5j56acolor_laserjet_pro_mfp_m283_7kw74alaserjet_pro_mfp_m227_g3q79aofficejet_pro_9020_1mr79acolor_laserjet_pro_m452nw_firmwaresmart_tank_plus_650_wireless_1tj10aofficejet_pro_9010_3uk93dlaserjet_enterprise_m604_e6b68acolor_laserjet_pro_mfp_m281_t6b82alaserjet_pro_mfp_m227_4pa42alaserjet_pro_m206_g3q47acolor_laserjet_managed_flow_mfp_e67550_l3u70adeskjet_2600_5sf03alaserjet_pro_mfp_m125_cz172alaserjet_pro_mfp_m127_cz186alaserjet_pro_mfp_m134_g3q57aenvy_6000_5se19bink_tank_wireless_410_z4b54asmart_tank_610_wireless_1tj09alaserjet_managed_flow_mfp_e52545c_3gy20adeskjet_ink_advantage_3700_t8w49claserjet_managed_flow_mfp_e62555_j8j80aenvy_photo_7800_k7s09dofficejet_pro_8020_4kj73dofficejet_6960_t0f36alaserjet_pro_m226_c6n22adeskjet_2700_7fr56dlaserjet_pro_mfp_m125_cz186alaserjet_pro_cm1415_mfp_ce861acolor_laserjet_managed_mfp_e62675_3gy18alaserjet_pro_400_m401_cf278alaserjet_pro_mfp_m226_cf486alaserjet_pro_mfp_m426_f6w17adeskjet_3700_t8x27bdeskjet_ink_advantage_3830_f5r96aink_tank_310_z6z13alaserjet_enterprise_m4555_mfp_ce503apagewide_managed_color_mfp_p77950_2gp23alaserjet_pro_mfp_m128_cz182asmart_tank_610_wireless_y0f71apagewide_managed_color_mfp_p77940_y3z64alaserjet_enterprise_700_color_mfp_m775_cf304acolor_laserjet_managed_mfp_e77422_5cm76adeskjet_3755_j9v94blaserjet_managed_flow_mfp_m527z_firmwarelaserjet_managed_mfp_e62555_j8j66alaserjet_managed_m605_l3u53alaserjet_pro_mfp_m426_f6w16acolor_laserjet_pro_mfp_m277n_b3q11asmart_tank_510_wireless_1tj10apagewide_managed_color_mfp_p77940_2gp26aneverstop_laser_1200a_firmwarelaserjet_enterprise_m609_k0q20adeskjet_3755_t8w95adeskjet_ink_advantage_2700_7fr21alaserjet_pro_m202_c6n20adeskjet_ink_advantage_3700_t8w38aneverstop_laser_1020_4ye51alaserjet_enterprise_managed_e42540_firmwaredeskjet_ink_advantage_3830_f5r97acolor_laserjet_pro_mfp_m180_firmwareofficejet_6950_p4c85aenvy_pro_6400_5se50alaserjet_enterprise_700_color_mfp_m775_cc524adeskjet_3700_j9v97blaserjet_managed_mfp_e62555_j8j73adeskjet_2600_v1n03cofficejet_6960_j7k33adeskjet_ink_advantage_3700_7fm66blaserjet_enterprise_flow_mfp_m525_firmwarelaserjet_pro_mfp_m427_f6w19adeskjet_3790_t8x42adeskjet_ink_advantage_2600_7fq81bpagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_pro_mfp_m277dw_b3q11alaserjet_pro_300_color_mfp_m375_ce903aofficejet_6950_p4c84alaserjet_enterprise_flow_mfp_m630_l3u62aenvy_6000_5se17blaserjet_enterprise_flow_mfp_m527z_firmwarecolor_laserjet_managed_mfp_e77422_5cm75alaserjet_enterprise_mfp_m630_firmwaredeskjet_2700_7fr53bcolor_laserjet_managed_mfp_m680_l3u48aenvy_pro_6400_5se48blaserjet_managed_flow_mfp_e62575_j8j73aenvy_5000_z4a61blaserjet_pro_400_n404dw_cf270apagewide_enterprise_color_mfp_586_g1w41aofficejet_pro_8020_firmwarelaserjet_pro_m1536_mfp_ce538alaserjet_enterprise_m506_f2a69alaserjet_pro_400_color_mfp_m451_ce957alaserjet_ultra_mfp_m230_g3q75adeskjet_3755_t8x06bdeskjet_3700_t8w93aofficejet_pro_9020_1mr67aenvy_photo_7100_k7g93asmart_tank_plus_650_wireless_1tj11adeskjet_3700_t8w54adeskjet_2600_v1n01benvy_5000_firmwaresmart_tank_plus_550_wireless_firmwaredeskjet_ink_advantage_3830_f5r96bdeskjet_2700_3xv18cneverstop_laser_1200a_4qd21adeskjet_plus_4100_7fs88aofficejet_pro_9010_1kr42alaserjet_enterprise_mfp_m528_firmwarecolor_laserjet_managed_mfp_e67550_l3u69aink_tank_310_4qa85alaserjet_pro_mfp_m225_cf486asmart_tank_plus_650_wireless_4sb23acolor_laserjet_pro_m252dw_firmwarelaserjet_pro_mfp_m132_g3q65alaserjet_managed_m605_e6b71alaserjet_pro_mfp_m132_g3q60aofficejet_3830_f5s03bcolor_laserjet_enterprise_flow_mfp_m680_cz250adeskjet_3700_j9v91adeskjet_ink_advantage_2700_7fr27bofficejet_pro_9010_1kr46acolor_laserjet_managed_m553_b5l24alaserjet_pro_m435_mfp_firmwareofficejet_enterprise_color_x555_firmwarelaserjet_enterprise_700_color_mfp_m775_cc523alaserjet_managed_500_mfp_m525_l3u59alaserjet_managed_mfp_e72425_5cm68alaserjet_pro_m225_cf484acolor_laserjet_enterprise_mfp_m480deskjet_ink_advantage_3700_j9v88aofficejet_pro_9010_1kr50bcolor_laserjet_managed_mfp_e62655_firmwarecolor_laserjet_managed_mfp_m775_cf304adeskjet_3755_t8x04bcolor_laserjet_pro_m255_firmwarepagewide_managed_color_mfp_p77940_y3z66adeskjet_ink_advantage_2700_7hz99bpagewide_enterprise_color_flow_mfp_586z_g1w41aenvy_pro_6400_8qq86apagewide_enterprise_color_556_g1w46venvy_photo_7100_3xd89aofficejet_pro_9010_3uk84alaserjet_managed_m506_f2a70aenvy_photo_7800_k7s01alaserjet_enterprise_flow_mfp_m525_cf116aink_tank_wireless_410_z4b55alaserjet_pro_mfp_m226_firmwarelaserjet_pro_m17_w2g53adeskjet_3630_f5s56bofficejet_pro_8020_1kr61adeskjet_3755_t8w57acolor_laserjet_pro_mfp_m281_firmwarelaserjet_pro_mfp_m126_cz181alaserjet_enterprise_600_m602_ce992adeskjet_ink_advantage_2600_7fq80bdeskjet_ink_advantage_2700_7fr28bcolor_laserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_e45028_firmwareofficejet_pro_9020_3ul05blaserjet_managed_mfp_m725_cf066adeskjet_3700_j9v93bpagewide_managed_color_flow_mfp_e58650z_l3u43aofficejet_enterprise_color_mfp_x585_l3u40acolor_laserjet_pro_mfp_m282_7kw73acolor_laserjet_managed_flow_mfp_e67560_firmwareofficejet_pro_9020_1mr78alaserjet_enterprise_500_color_mfp_m575_cd645a_laserjet_managed_mfp_e62665_3gy18alaserjet_enterprise_mfp_m725_cf068alaserjet_p1600_ce658aofficejet_3830_f5r95benvy_photo_7800_k7s08alaserjet_pro_mfp_m225_cf484alaserjet_enterprise_500_color_mfp_m575_firmwarelaserjet_enterprise_managed_e42540_cz244adeskjet_3630_firmwaredeskjet_3630_f5s47alaserjet_enterprise_m406_firmwaredeskjet_2600_y5h63alaserjet_enterprise_m608_firmwaredeskjet_3755_t8x27blaserjet_pro_m225_firmwarepagewide_managed_color_mfp_p77960_2gp26aenvy_6000_8qq98alaserjet_managed_mfp_e72425_5cm69acolor_laserjet_pro_m452nw_cf388alaserjet_managed_mfp_e62555_j8j80adeskjet_3700_t8w95aneverstop_laser_1000_4ye48alaserjet_pro_m403_c5f95alaserjet_pro_m118_g3q46adeskjet_3630_f5s43bdeskjet_2600_v1n06bdeskjet_3630_k4u03bofficejet_pro_9020_3uk98dcolor_laserjet_managed_e85055_t3u66aofficejet_pro_8020_3uc63dlaserjet_pro_300_color_mfp_m351_ce958adeskjet_2700_3xv19alaserjet_pro_m206_firmwarelaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_enterprise_color_flow_mfp_m575_cd645aofficejet_pro_8020_3uc60bdeskjet_ink_advantage_3700_j9v87blaserjet_pro_mfp_m134_g3q64adeskjet_3790_t8x39ddeskjet_plus_4100_7fs83dcolor_laserjet_pro_mfp_m183_7kw56aink_tank_wireless_410_z6z97adeskjet_3700_t8w59alaserjet_pro_m118_4pa39alaserjet_enterprise_700_color_mfp_m775_l3u50adeskjet_ink_advantage_3700_t8w40blaserjet_enterprise_500_color_mfp_m575_cd646aofficejet_3830_k7v45bpagewide_managed_color_mfp_p77960_2gp23adeskjet_3755_t8w54alaserjet_pro_m501_j8h60acolor_laserjet_enterprise_mfp_m680_cz248acolor_laserjet_managed_mfp_m775_cc522alaserjet_pro_mfp_m427_f6w16adeskjet_plus_ink_advantage_6000_5se522bofficejet_6960_t0g26aofficejet_pro_8020_5lj20dlaserjet_pro_mfp_m426_f6w13adeskjet_2700_7fr61alaserjet_pro_mfp_m130_g3q62alaserjet_enterprise_mfp_m527_firmwaredeskjet_3755_t8w96alaserjet_pro_mfp_m126_cz185aofficejet_pro_9010_1kr51bofficejet_8010_3uc57bdeskjet_plus_4100_3xv14bsmart_tank_plus_650_wireless_3yw73acolor_laserjet_managed_m651_cz257alaserjet_p1560_ce658adeskjet_plus_ink_advantage_6000_firmwaresmart_tank_610_wireless_3yw71aofficejet_6960_t0f32adeskjet_3755_t8x23bdeskjet_plus_ink_advantage_6400_5sd78bcolor_laserjet_managed_flow_mfp_m680_l3u47alaserjet_managed_mfp_e62565_j8j73adeskjet_2600_v1n07bpagewide_managed_color_mfp_p77950_2gp26asmart_tank_610_wireless_4sb23alaserjet_enterprise_m605_e6b70aofficejet_pro_9020_firmwarelaserjet_pro_m203_4pa39acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20adeskjet_3755_t8x00bdeskjet_3700_t8w58acolor_laserjet_managed_e75245_t3u44alaserjet_pro_m16_w2g50alaserjet_enterprise_mfp_m725_l3u63adeskjet_2700_firmwarecolor_laserjet_pro_mfp_m180_t6b74acolor_laserjet_managed_mfp_e77428_5cm75adeskjet_2600_y5h72dpagewide_managed_color_mfp_p77940_y3z61adeskjet_2700_5ar85alaserjet_pro_300_color_mfp_printer_m351_firmwarelaserjet_pro_400_mfp_m425_firmwareofficejet_6950_p4c86adeskjet_3755_t8x19blaserjet_managed_mfp_e62565_j8j80aofficejet_8022_4kj67bofficejet_3830_f5s01bdeskjet_2600_y5h68adeskjet_2700_7fr58alaserjet_enterprise_mfp_m527_f2a77asmart_tank_610_wireless_y0f73alaserjet_pro_mfp_m427_c5f98adeskjet_3700_t8w92apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_managed_flow_mfp_m880zm_a2w75aofficejet_6960_firmwarelaserjet_pro_mfp_m130_g3q61acolor_laserjet_enterprise_flow_mfp_m680_firmwarelaserjet_enterprise_mfp_m527_f2a78adeskjet_ink_advantage_5000_m2u86bofficejet_8022_4kj69bsmart_tank_610_wireless_1tj12apagewide_enterprise_color_mfp_586_firmwarepagewide_managed_color_mfp_p77950_5zn99acolor_laserjet_managed_mfp_e62655_3gy17apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67asmart_tank_610_wireless_3yw51asmart_tank_wireless_450_z4b56adeskjet_3755_t8w93alaserjet_pro_mfp_m128_cz172adeskjet_ink_advantage_3700_t8w39blaserjet_pro_400_color_mfp_m451_ce958adeskjet_3630_k4u02bofficejet_pro_8020_5lj19aofficejet_pro_7730_wide_format_firmwarepagewide_managed_color_mfp_p77940_2gp25adeskjet_3700_t8x12bpagewide_enterprise_color_mfp_586_g1w40aofficejet_pro_9010_1kr54acolor_laserjet_managed_m651_cz256acolor_laserjet_enterprise_mfp_m480_3qa55alaserjet_pro_m501_firmwarecolor_laserjet_managed_mfp_e77428_5rc92acolor_laserjet_enterprise_m651_firmwaredeskjet_plus_ink_advantage_6400_5sd79benvy_pro_6400_5se47bcolor_laserjet_managed_m553_b5l38adeskjet_ink_advantage_3700_7fm64bofficejet_pro_9020_1mr68acolor_laserjet_pro_m255_7kw64alaserjet_pro_mfp_m127_cz181alaserjet_managed_mfp_m725_firmwarecolor_laserjet_enterprise_m855_t3u51aofficejet_8022_3uc57blaserjet_enterprise_500_color_m551_cf081aofficejet_pro_7720_wide_format_firmwarelaserjet_pro_mfp_m130_g3q60aofficejet_6960_t0g25alaserjet_pro_mfp_m132_g3q57alaserjet_pro_cm1415_mfp_firmwaredeskjet_3755_j9v92alaserjet_pro_m402_f6j42alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_m527z_f2a80aofficejet_3830_f5r95adeskjet_plus_ink_advantage_6400_5sd79ccolor_laserjet_enterprise_mfp_m577_firmwaresmart_tank_plus_650_wireless_1tj09alaserjet_managed_mfp_e72425_5rc90alaserjet_pro_mfp_m149_4pa41adeskjet_ink_advantage_3700_t8w47claserjet_pro_mfp_m127_cz172alaserjet_pro_m225_cf485acolor_laserjet_enterprise_m553_b5l38adeskjet_plus_4100_3xv13alaserjet_pro_m16_y5s43alaserjet_pro_mfp_m148_g3q76adeskjet_2600_v1n01claserjet_managed_flow_mfp_e62555_j8j66aofficejet_6950_firmwareenvy_pro_6400_8qq87alaserjet_pro_m225_c6n23alaserjet_managed_mfp_e62565_j8j66adeskjet_plus_4100_7fs86adeskjet_3790_t8x40dcolor_laserjet_managed_mfp_e62675_3gy17acolor_laserjet_pro_mfp_m274n_firmwaresmart_tank_plus_650_wireless_y0f73aofficejet_pro_7730_wide_format_y0s19alaserjet_enterprise_mfp_m528_1pv64adeskjet_2700_7fr59dcolor_laserjet_pro_m255_7kw63alaserjet_enterprise_500_mfp_m525f_firmwarecolor_laserjet_managed_flow_mfp_m880zm_l3u51alaserjet_enterprise_mfp_m630_l3u61alaserjet_managed_mfp_m725_l3u64aenvy_6000_5se20blaserjet_p1100_ce657aenvy_6000_6wd35alaserjet_p1100_firmwarelaserjet_pro_200_color_m251_cf146adeskjet_plus_4100_7fs79blaserjet_pro_mfp_m427_f6w18aofficejet_pro_8210_j3p68aofficejet_pro_8020_1kr67ddeskjet_3755_t8x01bcolor_laserjet_managed_m553_b5l26asmart_tank_510_wireless_y0f71aenvy_photo_7100_z3m41dlaserjet_managed_flow_mfp_e62575_j8j80alaserjet_pro_mfp_m148_g3q79asmart_tank_plus_650_wireless_7xv38aenvy_6000_5se19aofficejet_pro_8020_1kr64blaserjet_enterprise_mfp_m528_1pv67alaserjet_pro_500_color_mfp_m570_cz271asmart_tank_510_wireless_firmwareofficejet_pro_9020_1mr66alaserjet_enterprise_700_m712_cf238acolor_laserjet_enterprise_flow_mfp_m577_firmwarelaserjet_managed_m506_f2a67apagewide_managed_color_mfp_p77960_firmwaredeskjet_3755_t8w51asmart_tank_510_wireless_3yw48acolor_laserjet_pro_mfp_m177_firmwareenvy_5000_z4a61acolor_laserjet_enterprise_m553_b5l39asmart_tank_plus_650_wireless_3yw71alaserjet_pro_mfp_m148_g3q78acolor_laserjet_managed_e75245_t3u43aofficejet_enterprise_color_mfp_x585_b5l05aofficejet_8022_4kj68blaserjet_pro_mfp_m130_g3q67acolor_laserjet_pro_mfp_m177_cf547acolor_laserjet_pro_mfp_m183_7kw54acolor_laserjet_pro_mfp_m282_7kw72acolor_laserjet_managed_mfp_e77422_5rc92adeskjet_3755_j9v97bdeskjet_plus_ink_advantage_6400_5sd78aenvy_5000_z4a59alaserjet_pro_mfp_m128_firmwareenvy_6000_5se18blaserjet_enterprise_flow_mfp_m525_cf117aenvy_photo_7100_k7g95alaserjet_enterprise_mfp_m630_j7x28adeskjet_plus_4100_7fs81benvy_pro_6400_7xk12alaserjet_enterprise_m606_firmwarelaserjet_enterprise_m506_firmwarelaserjet_enterprise_m605_e6b71aHP LaserJet Printer; HP LaserJet Pro Printer; HP PageWide Printer; HP PageWide Pro Printer; HP inkjet Printer; HP OfficeJet Printer
CVE-2015-7547
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-93.87% / 99.87%
||
7 Day CHG~0.00%
Published-18 Feb, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Action-Not Available
Vendor-n/aopenSUSESophos Ltd.Red Hat, Inc.Debian GNU/LinuxOracle CorporationF5, Inc.GNUSUSEHP Inc.Canonical Ltd.
Product-enterprise_linux_serverhelion_openstackenterprise_linux_server_eusbig-ip_analyticsserver_migration_packlinux_enterprise_desktopbig-ip_domain_name_systembig-ip_local_traffic_managerdebian_linuxbig-ip_advanced_firewall_managerbig-ip_policy_enforcement_managerlinux_enterprise_software_development_kitfujitsu_m10_firmwarebig-ip_link_controllerenterprise_linux_server_ausexalogic_infrastructureenterprise_linux_hpc_nodeopensusebig-ip_application_acceleration_managerenterprise_linux_desktopubuntu_linuxsuse_linux_enterprise_serverbig-ip_application_security_managerglibcenterprise_linux_workstationunified_threat_management_softwareenterprise_linux_hpc_node_euslinux_enterprise_serverlinux_enterprise_debuginfobig-ip_access_policy_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3180
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.58%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 01:00
Updated-02 Oct, 2024 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_eussatellitejdkenterprise_linux_server_tusenterprise_linux_desktopjrockitJava
CVE-2015-5255
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-2.90% / 86.07%
||
7 Day CHG~0.00%
Published-18 Nov, 2015 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe BlazeDS, as used in ColdFusion 10 before Update 18 and 11 before Update 7 and LiveCycle Data Services 3.0.x before 3.0.0.354175, 3.1.x before 3.1.0.354180, 4.5.x before 4.5.1.354177, 4.6.2.x before 4.6.2.354178, and 4.7.x before 4.7.0.354178, allows remote attackers to send HTTP traffic to intranet servers via a crafted XML document, related to a Server-Side Request Forgery (SSRF) issue.

Action-Not Available
Vendor-n/aHP Inc.Adobe Inc.
Product-xp7_command_view_advanced_editioncoldfusionxp_p9000_command_view_advanced_editionlivecycle_data_servicesn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-3318
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 18.35%
||
7 Day CHG~0.00%
Published-17 Jun, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CA Common Services, as used in CA Client Automation r12.5 SP01, r12.8, and r12.9; CA Network and Systems Management r11.0, r11.1, and r11.2; CA NSM Job Management Option r11.0, r11.1, and r11.2; CA Universal Job Management Agent; CA Virtual Assurance for Infrastructure Managers (aka SystemEDGE) 12.6, 12.7, 12.8, and 12.9; and CA Workload Automation AE r11, r11.3, r11.3.5, and r11.3.6 on UNIX, does not properly validate an unspecified variable, which allows local users to gain privileges via unknown vectors.

Action-Not Available
Vendor-n/aCA Technologies (Broadcom Inc.)Linux Kernel Organization, IncIBM CorporationOracle CorporationHP Inc.
Product-universal_job_management_agentnsm_job_management_optionsolarislinux_kernelclient_automationhp-uxnetwork_and_systems_managementvirtual_assurance_for_infrastructure_managersworkload_automation_aeaixn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-3237
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-5.13% / 89.64%
||
7 Day CHG~0.00%
Published-22 Jun, 2015 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.

Action-Not Available
Vendor-n/aOracle CorporationHP Inc.CURL
Product-libcurlsystem_management_homepageenterprise_manager_ops_centercurlglassfish_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-2140
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.04%
||
7 Day CHG~0.00%
Published-27 Aug, 2015 | 01:50
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Systems Insight Manager (SIM) before 7.5.0, as used in HP Matrix Operating Environment before 7.5.0 and other products, allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-matrix_operating_environmentsystems_insight_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-2202
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.42% / 61.59%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 00:00
Updated-30 Sep, 2024 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows administrative users to escalate privileges to root on the underlying OS.

Action-Not Available
Vendor-n/aHP Inc.Aruba Networks
Product-airwaven/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-4559
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.97% / 88.14%
||
7 Day CHG~0.00%
Published-08 Feb, 2009 | 21:00
Updated-17 Sep, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via shell metacharacters in argument fields to the (1) webappmon.exe or (2) OpenView5.exe CGI program. NOTE: this issue may be partially covered by CVE-2009-0205.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-3947
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.51%
||
7 Day CHG~0.00%
Published-05 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DCL (aka the CLI) in OpenVMS Alpha 8.3 allows local users to gain privileges via a long command line.

Action-Not Available
Vendor-n/aHP Inc.
Product-openvmsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2941
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.04% / 10.51%
||
7 Day CHG~0.00%
Published-14 Aug, 2008 | 20:00
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The hpssd message parser in hpssd.py in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to cause a denial of service (process stop) via a crafted packet, as demonstrated by sending "msg=0" to TCP port 2207.

Action-Not Available
Vendor-n/aHP Inc.
Product-linux_imaging_and_printing_projectn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-31772
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.32% / 54.45%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 18:56
Updated-01 May, 2025 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM MQ denial of service

IBM MQ 8.0, 9.0 LTS, 9.1 CD, 9.1 LTS, 9.2 CD, and 9.2 LTS could allow an authenticated and authorized user to cause a denial of service to the MQTT channels. IBM X-Force ID: 228335.

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft CorporationOracle CorporationHP Inc.IBM Corporation
Product-solarislinux_kernelihp-uxlinux_on_ibm_zwindowsmqaixMQ
CWE ID-CWE-20
Improper Input Validation
CVE-2014-2642
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 64.18%
||
7 Day CHG~0.00%
Published-02 Oct, 2014 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP System Management Homepage (SMH) before 7.4 allows remote attackers to conduct clickjacking attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-2645
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 64.18%
||
7 Day CHG~0.00%
Published-05 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Systems Insight Manager (SIM) before 7.4 allows remote attackers to conduct clickjacking attacks via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-systems_insight_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-5806
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-55.43% / 98.01%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-intelligent_management_centerIntelligent Management Center (iMC) PLAT
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4812
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-74.00% / 98.79%
||
7 Day CHG~0.00%
Published-13 Sep, 2013 | 18:00
Updated-22 Apr, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Action-Not Available
Vendor-n/aHP Inc.
Product-procurve_manageridentity_driven_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4811
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-83.54% / 99.26%
||
7 Day CHG~0.00%
Published-13 Sep, 2013 | 18:00
Updated-22 Apr, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Action-Not Available
Vendor-n/aHP Inc.
Product-procurve_manageridentity_driven_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-3574
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-23.03% / 95.79%
||
7 Day CHG~0.00%
Published-14 Jun, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability in hpdiags/frontend2/commands/saveCompareConfig.php in HP Insight Diagnostics 9.4.0.4710 allows remote attackers to write data to arbitrary files via a full pathname in the argument to the devicePath (aka mount) parameter.

Action-Not Available
Vendor-n/aHP Inc.
Product-insight_diagnosticsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-3573
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-1.11% / 77.82%
||
7 Day CHG~0.00%
Published-14 Jun, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Insight Diagnostics 9.4.0.4710 allows remote attackers to conduct unspecified injection attacks via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-insight_diagnosticsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-6501
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.58% / 68.42%
||
7 Day CHG~0.00%
Published-12 Jan, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The KillProcess method in the HP PKI ActiveX control (HPPKI.ocx) before 1.2.0.1 allows remote attackers to cause a denial of service (kill process) via the partial or full name of a process.

Action-Not Available
Vendor-n/aHP Inc.
Product-pki_activex_controln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-2004
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-8.3||HIGH
EPSS-1.26% / 79.11%
||
7 Day CHG~0.00%
Published-02 May, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in HP Insight Management Agents before 9.0.0.0 on Windows Server 2003 and 2008 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.Microsoft Corporation
Product-windows_server_2008windows_server_2003windows_2003_serverinsight_management_agentsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-2608
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.84% / 74.34%
||
7 Day CHG~0.00%
Published-01 Jul, 2011 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command.

Action-Not Available
Vendor-n/aHP Inc.
Product-operations_agentopenview_performance_agentn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-1853
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-15.65% / 94.55%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a (1) large or (2) invalid opcode field, related to a function pointer table.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-0923
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-89.89% / 99.56%
||
7 Day CHG~0.00%
Published-09 Feb, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."

Action-Not Available
Vendor-n/aHP Inc.
Product-data_protectorn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-0921
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-4.71% / 89.14%
||
7 Day CHG~0.00%
Published-09 Feb, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

crs.exe in the Cell Manager Service in the client in HP Data Protector does not properly validate credentials associated with the hostname, domain, and username, which allows remote attackers to execute arbitrary code by sending unspecified data over TCP, related to the webreporting client, the applet domain, and the java username.

Action-Not Available
Vendor-n/aHP Inc.
Product-data_protectorn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2010-3283
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 56.64%
||
7 Day CHG-0.05%
Published-24 Sep, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2010-3011
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-5||MEDIUM
EPSS-0.53% / 66.77%
||
7 Day CHG~0.00%
Published-17 Sep, 2010 | 17:46
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-system_management_homepagen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11968
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-8.8||HIGH
EPSS-3.36% / 87.06%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 15:22
Updated-04 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centerHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11967
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-8.8||HIGH
EPSS-3.36% / 87.06%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 15:22
Updated-04 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centerHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11980
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-8.8||HIGH
EPSS-0.51% / 65.74%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 15:28
Updated-04 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code exection vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centerHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-20
Improper Input Validation
CVE-2013-3575
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-5||MEDIUM
EPSS-25.00% / 96.04%
||
7 Day CHG~0.00%
Published-14 Jun, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

hpdiags/frontend2/help/pageview.php in HP Insight Diagnostics 9.4.0.4710 does not properly restrict PHP include or require statements, which allows remote attackers to include arbitrary hpdiags/frontend2/help/ .html files via the path parameter.

Action-Not Available
Vendor-n/aHP Inc.
Product-insight_diagnosticsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2009-0418
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.01% / 83.39%
||
7 Day CHG~0.00%
Published-04 Feb, 2009 | 19:00
Updated-07 Aug, 2024 | 04:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IPv6 Neighbor Discovery Protocol (NDP) implementation in HP HP-UX B.11.11, B.11.23, and B.11.31 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity), read private network traffic, and possibly execute arbitrary code via a spoofed message that modifies the Forward Information Base (FIB), a related issue to CVE-2008-2476.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-2002
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-8.3||HIGH
EPSS-1.21% / 78.71%
||
7 Day CHG~0.00%
Published-02 May, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in HP SNMP Agents for Linux before 9.0.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-snmp_agents_for_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-1849
Matching Score-6
Assigner-HP Inc.
ShareView Details
Matching Score-6
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-15.65% / 94.55%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7059
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-8.8||HIGH
EPSS-0.39% / 59.26%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aruba ClearPass prior to 6.6.9 has a vulnerability in the API that helps to coordinate cluster actions. An authenticated user with the "mon" permission could use this vulnerability to obtain cluster credentials which could allow privilege escalation. This vulnerability is only present when authenticated as a user with "mon" permission.

Action-Not Available
Vendor-n/aHP Inc.
Product-aruba_clearpass_policy_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-6490
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
CVSS Score-5.9||MEDIUM
EPSS-0.55% / 67.39%
||
7 Day CHG~0.00%
Published-02 Mar, 2018 | 01:00
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MFSBGN03801 rev.1 - Micro Focus Operations Orchestration, Remote Denial of Service (DoS)

Denial of Service vulnerability in Micro Focus Operations Orchestration Software, version 10.x. This vulnerability could be remotely exploited to allow Denial of Service.

Action-Not Available
Vendor-Micro Focus International LimitedHP Inc.
Product-operations_orchestrationOperations Orchestration Software
CWE ID-CWE-20
Improper Input Validation
CVE-2011-0922
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-82.01% / 99.18%
||
7 Day CHG~0.00%
Published-09 Feb, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The client in HP Data Protector allows remote attackers to execute arbitrary programs via an EXEC_SETUP command that references a UNC share pathname.

Action-Not Available
Vendor-n/aHP Inc.
Product-data_protectorn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-0924
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-13.35% / 94.02%
||
7 Day CHG~0.00%
Published-09 Feb, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The client in HP Data Protector does not verify the contents of files associated with the EXEC_CMD command, which allows remote attackers to execute arbitrary script code by providing this code with a trusted filename, as demonstrated by omni_chk_ds.sh.

Action-Not Available
Vendor-n/aHP Inc.
Product-data_protectorn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-1987
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-2.25% / 84.27%
||
7 Day CHG~0.00%
Published-18 Feb, 2016 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HPE IPFilter A.11.31.18.21 on HP-UX, when a certain keep-state configuration is enabled, allows remote attackers to cause a denial of service via unspecified UDP packets.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-ux_ipfiltern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2023-47746
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.71%
||
7 Day CHG+0.05%
Published-22 Jan, 2024 | 18:42
Updated-13 Feb, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Db2 denial of service

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 272644.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kerneldb2hp-uxlinux_on_ibm_zwindowsaixDb2 for Linux, UNIX and Windowsdb2_for_linux_unix_and_windows
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2023-47747
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.55%
||
7 Day CHG+0.04%
Published-22 Jan, 2024 | 19:57
Updated-13 Feb, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Db2 denial of service

IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 272646.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kerneldb2hp-uxlinux_on_ibm_zwindowsaixDb2 for Linux, UNIX and Windows
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 14
  • 15
  • Next
Details not found