Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-1004

Summary
Assigner-hp
Assigner Org ID-74586083-13ce-40fd-b46a-8e5d23cfbcb2
Published At-06 Feb, 2025 | 21:02
Updated At-12 Feb, 2025 | 19:41
Rejected At-
Credits

Certain HP LaserJet Pro Printers – Potential Denial of Service

Certain HP LaserJet Pro printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer via IPP (Internet Printing Protocol).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hp
Assigner Org ID:74586083-13ce-40fd-b46a-8e5d23cfbcb2
Published At:06 Feb, 2025 | 21:02
Updated At:12 Feb, 2025 | 19:41
Rejected At:
▼CVE Numbering Authority (CNA)
Certain HP LaserJet Pro Printers – Potential Denial of Service

Certain HP LaserJet Pro printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer via IPP (Internet Printing Protocol).

Affected Products
Vendor
HP Inc.HP Inc.
Product
Certain HP LaserJet Pro Printers
Default Status
unknown
Versions
Affected
  • See HP Security Bulletin reference for affected versions.
Problem Types
TypeCWE IDDescription
CWECWE-241CWE-241: Improper Handling of Unexpected Data Type
Type: CWE
CWE ID: CWE-241
Description: CWE-241: Improper Handling of Unexpected Data Type
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998
N/A
Hyperlink: https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:hp-security-alert@hp.com
Published At:06 Feb, 2025 | 21:15
Updated At:24 Feb, 2026 | 14:39

Certain HP LaserJet Pro printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer via IPP (Internet Printing Protocol).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CPE Matches

HP Inc.
hp
>>g3q78a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:g3q78a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q78a>>-
cpe:2.3:h:hp:g3q78a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q79a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:g3q79a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q79a>>-
cpe:2.3:h:hp:g3q79a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>q3q75a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:q3q75a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>q3q75a>>-
cpe:2.3:h:hp:q3q75a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q74a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:g3q74a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q74a>>-
cpe:2.3:h:hp:g3q74a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q77a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:g3q77a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q77a>>-
cpe:2.3:h:hp:g3q77a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q76a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:g3q76a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>g3q76a>>-
cpe:2.3:h:hp:g3q76a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa41a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:4pa41a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa41a>>-
cpe:2.3:h:hp:4pa41a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa42a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:4pa42a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa42a>>-
cpe:2.3:h:hp:4pa42a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa43a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:4pa43a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa43a>>-
cpe:2.3:h:hp:4pa43a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa44a_firmware>>Versions before 2024-10-25(exclusive)
cpe:2.3:o:hp:4pa44a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>4pa44a>>-
cpe:2.3:h:hp:4pa44a:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-241Secondaryhp-security-alert@hp.com
CWE ID: CWE-241
Type: Secondary
Source: hp-security-alert@hp.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998hp-security-alert@hp.com
Vendor Advisory
Hyperlink: https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998
Source: hp-security-alert@hp.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

27Records found

CVE-2025-2268
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.17% / 38.71%
||
7 Day CHG~0.00%
Published-14 Mar, 2025 | 13:33
Updated-16 Jan, 2026 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HP LaserJet MFP M232-M237 Printer Series - Potential Denial of Service

The HP LaserJet MFP M232-M237 Printer Series may be vulnerable to a denial of service attack when a specially crafted request message is sent via Internet Printing Protocol (IPP).

Action-Not Available
Vendor-HP Inc.
Product-7md70f7md70e_firmware1y7d4a6gx05e6gx06a_firmware6gx00a_firmware7md73a7md74a6gw99a_firmware9yf92a7md75a_firmware9yf91e7md74e2a130e_firmware7md70a6gx09e9yf88a2a130a9yf94a2u589a_firmware9yf88a_firmware9yf96a_firmware2u589e_firmware9yf91a7md72e2u589a9yf90a6gx00e6gw71a7md71a_firmware9yg02e_firmware7md69a_firmware9yf98a6gx06a9yf96a1y7d4a_firmware6gx04a_firmware6gx09e_firmware9yg02e9yg09a_firmware9yg10a_firmware9yg05a_firmware6gx03a_firmware9yg02a7md70a_firmware7md75a7md70f_firmware9yg11a_firmware6gx05e_firmware2a130a_firmware2a130e6gx09a_firmware9yf97a6gw99e_firmware6gx03a2u589e2a129a_firmware6gw99e6gx01a6gw71a_firmware9yf89a_firmware9yg08a6gx05a_firmware7md76a_firmware9yg05e_firmware7md73a_firmware6gw99a7md69a6gx02e_firmware7md76e_firmware7md72a_firmware2u589f_firmware7md70e9yg02a_firmware9yg05e9yf95a_firmware7md74a_firmware7md74e_firmware9yf92a_firmware9yf95a2u589f6gx02e9yf91a_firmware9yg10a7md72e_firmware9yg08a_firmware9yg09a6gx01a_firmware6hu08a6gx04a9yf97a_firmware9yf91e_firmware6gx00e_firmware9yf89a9yg05a7md76e9yf94a_firmware7md72a9yf98a_firmware6gx09a7md71a6hu08a_firmware6gx00a2a129a9yg11a9yf90a_firmware7md76a6gx05aHP LaserJet MFP M232-M237 Printer Series
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2024-9423
Matching Score-10
Assigner-HP Inc.
ShareView Details
Matching Score-10
Assigner-HP Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.19% / 41.24%
||
7 Day CHG+0.15%
Published-02 Oct, 2024 | 15:21
Updated-24 Feb, 2026 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP LaserJet Printers – Potential Denial of Service

Certain HP LaserJet printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer. The printer displays a “JPEG Unsupported” message which may not clear, potentially blocking queued print jobs.

Action-Not Available
Vendor-HP Inc.
Product-7md69a7md68a_firmware9yf97a_firmware2u582e2u589e9yg02e_firmware2a129a6gx06a6gx01a9yg08a381u6a_firmware7md65a9yg10a7md72e381v5a_firmware6gw62er2u589e_firmware6gx09e_firmware6gw62e7md75a9yf84a7md76e9yf82a2r7f3a7md73a_firmware2u587a381u6a9yf90a_firmware6gx02e6gw61a_firmware9yf80a9yf91a7md68e6gx05e381u5a2u584e7md74a2r7f5a2r3e3a6gx00e_firmware381u1a9yf91e7md70f7md66a9yf92a2u589a7md71a_firmware2r3e7a_firmware9yg09a_firmware9yf92a_firmware6gw71a9yf98a381u8a381u2a2r3e3a_firmware7md72a_firmware2r7f5a_firmware6gw63a_firmware2a130a2u584a381u8a_firmware1y7d4a2u581a_firmware7md70a9yf96a9yf94a7md67a6gw62a_firmware9yf88a_firmware7md70a_firmware6gw99a_firmware7md69a_firmware9yf84a_firmware6gw62a9yf89a381u0a_firmware7md74e9yf95a6gw63a381v1a_firmware2u589f9yf95a_firmware2u581a6gx04a_firmware9yg11a381u5a_firmware9yg05e_firmware9yf90a9yf91a_firmware2r3e1a7md74a_firmware7md76a6gw99e6gw99e_firmware2r3e2a7md67a_firmware7md74e_firmware6gx03a381u7a6gw61a9yf83a_firmware6gx09a_firmware2r3e1a_firmware6gw62er_firmware381u4a_firmware7md76a_firmware2r3e8a_firmware9yg05a_firmware381u3a_firmware9yf89a_firmware2u582e_firmware6gx03a_firmware9yf88a6gx09e2u582a_firmware9yf85a381v0a_firmware7md71a7md66e381l0a_firmware2r7f3a_firmware6gx06a_firmware6gx01a_firmware7md75a_firmware2u584a_firmware2u589a_firmware381v4a_firmware7md68a2u584e_firmware6gx05a7md68e_firmware9yg05e9yg02a_firmware7md66a_firmware6gw99a6gx04a381u3a381v1a381u1a_firmware9yg02a6gx05e_firmware381u9a_firmware2r3e2a_firmware9yf91e_firmware6gx02e_firmware6gw62e_firmware2u582a381l0a6gx09a2u587e_firmware7md73a9yf94a_firmware2r7f4a_firmware9yf83a2u587a_firmware2a129a_firmware2r3e8a2r3f0a6gx00a_firmware381v6a7md70e_firmware2r3f0a_firmware7md70e2r3e7a381v4a381u7a_firmware2r7f4a9yg05a381v0a381u4a381u2a_firmware9yf80a_firmware6gx05a_firmware381u9a6gx00e6gx00a9yf98a_firmware2u586a9yf97a9yg11a_firmware2u589f_firmware7md70f_firmware9yf85a_firmware2a130e_firmware2u586a_firmware1y7d4a_firmware381v6a_firmware6gw71a_firmware2a130e9yf96a_firmware7md66e_firmware9yf82a_firmware381u0a2u587e381v5a9yg02e9yg10a_firmware9yg09a2a130a_firmware7md76e_firmware7md65a_firmware7md72a7md72e_firmware9yg08a_firmwareCertain HP LaserJet Printerslaserjet_mfp_m232-m237_printer_series_firmware
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2019-2769
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.65% / 70.67%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 22:31
Updated-15 Oct, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewepolicy_orchestratorjreenterprise_linux_workstationenterprise_linuxenterprise_linux_eussatellitejdkenterprise_linux_desktopleapJava
CVE-2023-4063
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.67%
||
7 Day CHG~0.00%
Published-22 Mar, 2024 | 17:27
Updated-20 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain HP OfficeJet Pro printers are potentially vulnerable to a Denial of Service when using an improper eSCL URL GET request.

Action-Not Available
Vendor-HP Inc.
Product-1mr70a_firmware1mr79a1mr72a_firmware1kr55d_firmware1mr76a_firmware3uk91b3ul00d_firmware1kr48a_firmware1kr46a1kr42a_firmware1mr73a3uk96d_firmware1mr77a_firmware1kr48a3uk84a_firmware1kr54a1mr78b_firmware1mr75a3uk97d_firmware3uk99d1mr73d1mr66a3uk86b1mr80d_firmware3uk97d1kr49a3uk90d_firmware1mr71a_firmware3uk83a_firmwarey8m28d1kr54a_firmware1mr74a_firmware1kr46a_firmware1mr68a3uk83b_firmware1mr78a_firmware1mr70a1mr74a1kr45a1mr66a_firmware3uk84a3uk91b_firmware3uk96d3uk85d3uk93d_firmware1mr78a1mr79a_firmware1mr69a3uk99d_firmware1mr77a3uk83b1mr76a1kr55d1mr69a_firmware3ul00d1kr49a_firmware1kr45a_firmware1mr75a_firmware3uk98d_firmware1mr69c3ul05b_firmware1mr68a_firmware1mr71a1mr78b1mr80d3ul05b3uk93d1mr73d_firmware1kr55b1mr72a1kr55b_firmware3uk85d_firmwarey8m28d_firmware1mr67a_firmware3uk86b_firmware1kr55a_firmware1mr67a3uk90d1kr55a1mr69c_firmware1kr42a3uk98d3uk83a1mr73a_firmwareCertain HP OfficeJet Pro Printers
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-3214
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.41% / 61.38%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 01:00
Updated-02 Oct, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_eussatellitejdkenterprise_linux_server_tusenterprise_linux_desktopjrockitJava
CVE-2018-2797
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.03%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2018-2796
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.36%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eussatelliteJava
CVE-2018-2798
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.51%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eussatelliteJava
CVE-2018-2799
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 31.54%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.The Apache Software FoundationOracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationxerces-jsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2024-42399
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 37.32%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:48
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)Aruba Networks
Product-instantosarubaosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instantarubaos
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42397
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 33.06%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 18:51
Updated-19 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-instantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42398
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 37.32%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:37
Updated-24 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)HP Inc.Aruba Networks
Product-arubaosinstantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10arubaosinstant
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42400
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.14% / 34.03%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:51
Updated-13 Mar, 2025 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instantarubaos
CVE-2018-2815
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.69% / 71.66%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eusJava
CVE-2024-42396
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.80%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 18:54
Updated-25 Mar, 2025 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)Aruba Networks
Product-instantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instant
CVE-2026-1997
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.00% / 0.17%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:54
Updated-12 Feb, 2026 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP OfficeJet Pro Printers - Information Disclosure

Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.

Action-Not Available
Vendor-HP IncHP Inc.
Product-d9l63a_firmwarek7s39a_firmwarey0s19a_firmwarek7s40aj6x83a_firmwared9l18ak7s41a_firmwarej6x81a_firmwarek7s32a_firmwared9l18a_firmwaret0g70a_firmwarej3p68aj6x78ad9l63am9l67a_firmwarel3t99a_firmwarek7s32at0g46a_firmwarek7s40a_firmwaret0g70ak7s37a_firmwarem9l66a_firmwarel3t99ad9l20a_firmwareg5j38a_firmwarej3p67at0g47a_firmwarek7s42a_firmwarey0s19at0g47at1p99ak7s38at0g49aj3p65a_firmwarey0s18a_firmwaret0g48aj3p66a_firmwarem9l65a_firmwareg5j56a_firmwareg5j56at0g65a_firmwared9l20ad9l21ak7s43ag5j38ad9l64a_firmwarem9l70ak7s41ak7s43a_firmwarej3p68a_firmwarek7s38a_firmwaret0g46aj6x76aj6x81aj6x80a_firmwarej6x80am9l65aj6x77ad9l21a_firmwarej6x83aj6x79aj6x76a_firmwared9l64am9l70a_firmwarek7s42aj6x78a_firmwaret0g49a_firmwarej3p67a_firmwarem9l67at0g56aj6x79a_firmwaret0g56a_firmwaret1p99a_firmwarek7s39at0g65aj3p66ay0s18aj6x77a_firmwarej3p65am9l66ak7s37at0g48a_firmwareHP OfficeJet Pro 7720 Wide Format All-in-One Printer seriesHP OfficeJet Pro 7740 Wide Format All-in-One Printer seriesHP OfficeJet Pro 8730 Mono Printer seriesHP OfficeJet Pro 8740 All-in-One Printer seriesHP OfficeJet Pro 8730 All-in-One PrinterHP OfficeJet Pro 8710 All-in-One Printer seriesHP OfficeJet Pro 7730 Wide Format All-in-One PrinterHP OfficeJet Pro 8210 Printer series
CWE ID-CWE-346
Origin Validation Error
CVE-2026-1996
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 10.86%
||
7 Day CHG-0.02%
Published-10 Feb, 2026 | 17:34
Updated-24 Feb, 2026 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP OfficeJet Pro Printers – Denial of Service

Certain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection.

Action-Not Available
Vendor-HP IncHP Inc.
Product-m9l70ak7s38a_firmwaret0g46aj6x76ad9l18aj6x81aj6x80a_firmwarej6x80aj6x81a_firmwared9l18a_firmwarem9l65aj6x77aj6x78aj6x79aj6x76a_firmwarem9l67a_firmwarem9l70a_firmwaret0g46a_firmwarek7s37a_firmwarej6x78a_firmwaret0g49a_firmwarem9l67am9l66a_firmwarej6x79a_firmwaret0g47a_firmwaret0g47ak7s38at0g49at0g48am9l65a_firmwarej6x77a_firmwarem9l66ak7s37at0g48a_firmwareHP OfficeJet Pro 8710 All-in-One Printer series
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2019-2762
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.77% / 73.34%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 22:31
Updated-15 Oct, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxepolicy_orchestratorxp7_command_viewjreenterprise_linux_workstationenterprise_linuxenterprise_linux_eussatellitejdkenterprise_linux_desktopleapJava
CVE-2018-2603
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.97%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp7_command_viewenterprise_linux_server_eusenterprise_linux_server_aussatellitejdkstruxureware_data_center_expertjrockitxp_command_viewdebian_linuxxp_p9000_command_viewjreenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopJava
CVE-2024-31479
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.36%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:33
Updated-24 Jun, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31480
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.36%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:34
Updated-24 Jun, 2025 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31478
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.64%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:32
Updated-24 Jun, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31481
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.36%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:35
Updated-24 Jun, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31482
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.36%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:36
Updated-24 Jun, 2025 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10136
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-16.14% / 94.69%
||
7 Day CHG-3.69%
Published-02 Jun, 2020 | 08:35
Updated-03 Nov, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IP-in-IP protocol allows a remote, unauthenticated attacker to route arbitrary network traffic

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

Action-Not Available
Vendor-digitreckHP Inc.Cisco Systems, Inc.The IETF Administration LLC (IETF LLC)
Product-nexus_1000venexus_7000nexus_93180yc-exnexus_9396txnexus_5648qnexus_93180lc-exunified_computing_systemtcp\/ipnexus_6004sarosnexus_5548pnexus_9236cnexus_3172nexus_93216tc-fx2nexus_93240yc-fx2nexus_9372tx-enexus_9372pxucs_6324nexus_7700ucs_6332nexus_9372txucs_6248upnexus_56128pnexus_9396pxnexus_3132qnexus_6001nexus_92304qcnexus_92348gc-xnexus_5010nexus_9332pqnexus_9508nexus_93128txnexus_9516nexus_93120txnexus_3048nexus_1000vx3220nr_firmwarenexus_93360yc-fx2nexus_5548upnexus_9372px-enexus_93180yc-fxnexus_5596upucs_6296upnexus_9336pq_aci_spinenexus_9348gc-fxpucs_6332-16upnexus_93108tc-fxnexus_9272qnexus_5696qnexus_9332cucs_managernexus_3064-tnexus_5672upnexus_5624qnexus_3064nexus_3016nexus_9504nexus_9364cnexus_5020nx-osnexus_5596tnexus_9336c-fx2nexus_93108tc-exRFC2003 - IP Encapsulation within IP
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2018-2795
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.03%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2024-25966
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.51% / 66.25%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 07:07
Updated-09 Jan, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an improper handling of unexpected data type vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
Details not found