Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-1996

Summary
Assigner-hp
Assigner Org ID-74586083-13ce-40fd-b46a-8e5d23cfbcb2
Published At-10 Feb, 2026 | 17:34
Updated At-11 Feb, 2026 | 15:13
Rejected At-
Credits

Certain HP OfficeJet Pro Printers – Denial of Service

Certain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hp
Assigner Org ID:74586083-13ce-40fd-b46a-8e5d23cfbcb2
Published At:10 Feb, 2026 | 17:34
Updated At:11 Feb, 2026 | 15:13
Rejected At:
▼CVE Numbering Authority (CNA)
Certain HP OfficeJet Pro Printers – Denial of Service

Certain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection.

Affected Products
Vendor
HP Inc
Product
HP OfficeJet Pro 8710 All-in-One Printer series
Default Status
unaffected
Versions
Affected
  • From 0 before <001.2602A (custom)
Problem Types
TypeCWE IDDescription
CWECWE-703CWE-703
Type: CWE
CWE ID: CWE-703
Description: CWE-703
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hp.com/us-en/document/ish_14057472-14057502-16/hpsbpi04089
N/A
Hyperlink: https://support.hp.com/us-en/document/ish_14057472-14057502-16/hpsbpi04089
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:hp-security-alert@hp.com
Published At:10 Feb, 2026 | 18:16
Updated At:24 Feb, 2026 | 14:37

Certain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CPE Matches

HP Inc.
hp
>>d9l18a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:d9l18a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>d9l18a>>-
cpe:2.3:h:hp:d9l18a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l66a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:m9l66a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l66a>>-
cpe:2.3:h:hp:m9l66a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l67a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:m9l67a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l67a>>-
cpe:2.3:h:hp:m9l67a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g46a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:t0g46a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g46a>>-
cpe:2.3:h:hp:t0g46a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x76a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x76a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x76a>>-
cpe:2.3:h:hp:j6x76a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x78a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x78a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x78a>>-
cpe:2.3:h:hp:j6x78a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x80a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x80a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x80a>>-
cpe:2.3:h:hp:j6x80a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>k7s37a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:k7s37a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>k7s37a>>-
cpe:2.3:h:hp:k7s37a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l70a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:m9l70a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l70a>>-
cpe:2.3:h:hp:m9l70a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x77a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x77a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x77a>>-
cpe:2.3:h:hp:j6x77a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x81a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x81a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x81a>>-
cpe:2.3:h:hp:j6x81a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x79a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:j6x79a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>j6x79a>>-
cpe:2.3:h:hp:j6x79a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>k7s38a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:k7s38a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>k7s38a>>-
cpe:2.3:h:hp:k7s38a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g47a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:t0g47a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g47a>>-
cpe:2.3:h:hp:t0g47a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g48a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:t0g48a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g48a>>-
cpe:2.3:h:hp:t0g48a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g49a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:t0g49a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>t0g49a>>-
cpe:2.3:h:hp:t0g49a:-:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l65a_firmware>>Versions before 001.2602a(exclusive)
cpe:2.3:o:hp:m9l65a_firmware:*:*:*:*:*:*:*:*
HP Inc.
hp
>>m9l65a>>-
cpe:2.3:h:hp:m9l65a:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-703Secondaryhp-security-alert@hp.com
CWE ID: CWE-703
Type: Secondary
Source: hp-security-alert@hp.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.hp.com/us-en/document/ish_14057472-14057502-16/hpsbpi04089hp-security-alert@hp.com
Vendor Advisory
Hyperlink: https://support.hp.com/us-en/document/ish_14057472-14057502-16/hpsbpi04089
Source: hp-security-alert@hp.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

33Records found

CVE-2024-9423
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.19% / 40.87%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 15:21
Updated-24 Feb, 2026 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP LaserJet Printers – Potential Denial of Service

Certain HP LaserJet printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer. The printer displays a “JPEG Unsupported” message which may not clear, potentially blocking queued print jobs.

Action-Not Available
Vendor-HP Inc.
Product-7md69a7md68a_firmware9yf97a_firmware2u582e2u589e9yg02e_firmware2a129a6gx06a6gx01a9yg08a381u6a_firmware7md65a9yg10a7md72e381v5a_firmware6gw62er2u589e_firmware6gx09e_firmware6gw62e7md75a9yf84a7md76e9yf82a2r7f3a7md73a_firmware2u587a381u6a9yf90a_firmware6gx02e6gw61a_firmware9yf80a9yf91a7md68e6gx05e381u5a2u584e7md74a2r7f5a2r3e3a6gx00e_firmware381u1a9yf91e7md70f7md66a9yf92a2u589a7md71a_firmware2r3e7a_firmware9yg09a_firmware9yf92a_firmware6gw71a9yf98a381u8a381u2a2r3e3a_firmware7md72a_firmware2r7f5a_firmware6gw63a_firmware2a130a2u584a381u8a_firmware1y7d4a2u581a_firmware7md70a9yf96a9yf94a7md67a6gw62a_firmware9yf88a_firmware7md70a_firmware6gw99a_firmware7md69a_firmware9yf84a_firmware6gw62a9yf89a381u0a_firmware7md74e9yf95a6gw63a381v1a_firmware2u589f9yf95a_firmware2u581a6gx04a_firmware9yg11a381u5a_firmware9yg05e_firmware9yf90a9yf91a_firmware2r3e1a7md74a_firmware7md76a6gw99e6gw99e_firmware2r3e2a7md67a_firmware7md74e_firmware6gx03a381u7a6gw61a9yf83a_firmware6gx09a_firmware2r3e1a_firmware6gw62er_firmware381u4a_firmware7md76a_firmware2r3e8a_firmware9yg05a_firmware381u3a_firmware9yf89a_firmware2u582e_firmware6gx03a_firmware9yf88a6gx09e2u582a_firmware9yf85a381v0a_firmware7md71a7md66e381l0a_firmware2r7f3a_firmware6gx06a_firmware6gx01a_firmware7md75a_firmware2u584a_firmware2u589a_firmware381v4a_firmware7md68a2u584e_firmware6gx05a7md68e_firmware9yg05e9yg02a_firmware7md66a_firmware6gw99a6gx04a381u3a381v1a381u1a_firmware9yg02a6gx05e_firmware381u9a_firmware2r3e2a_firmware9yf91e_firmware6gx02e_firmware6gw62e_firmware2u582a381l0a6gx09a2u587e_firmware7md73a9yf94a_firmware2r7f4a_firmware9yf83a2u587a_firmware2a129a_firmware2r3e8a2r3f0a6gx00a_firmware381v6a7md70e_firmware2r3f0a_firmware7md70e2r3e7a381v4a381u7a_firmware2r7f4a9yg05a381v0a381u4a381u2a_firmware9yf80a_firmware6gx05a_firmware381u9a6gx00e6gx00a9yf98a_firmware2u586a9yf97a9yg11a_firmware2u589f_firmware7md70f_firmware9yf85a_firmware2a130e_firmware2u586a_firmware1y7d4a_firmware381v6a_firmware6gw71a_firmware2a130e9yf96a_firmware7md66e_firmware9yf82a_firmware381u0a2u587e381v5a9yg02e9yg10a_firmware9yg09a2a130a_firmware7md76e_firmware7md65a_firmware7md72a7md72e_firmware9yg08a_firmwareCertain HP LaserJet Printerslaserjet_mfp_m232-m237_printer_series_firmware
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2023-4063
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.74%
||
7 Day CHG~0.00%
Published-22 Mar, 2024 | 17:27
Updated-20 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain HP OfficeJet Pro printers are potentially vulnerable to a Denial of Service when using an improper eSCL URL GET request.

Action-Not Available
Vendor-HP Inc.
Product-1mr70a_firmware1mr79a1mr72a_firmware1kr55d_firmware1mr76a_firmware3uk91b3ul00d_firmware1kr48a_firmware1kr46a1kr42a_firmware1mr73a3uk96d_firmware1mr77a_firmware1kr48a3uk84a_firmware1kr54a1mr78b_firmware1mr75a3uk97d_firmware3uk99d1mr73d1mr66a3uk86b1mr80d_firmware3uk97d1kr49a3uk90d_firmware1mr71a_firmware3uk83a_firmwarey8m28d1kr54a_firmware1mr74a_firmware1kr46a_firmware1mr68a3uk83b_firmware1mr78a_firmware1mr70a1mr74a1kr45a1mr66a_firmware3uk84a3uk91b_firmware3uk96d3uk85d3uk93d_firmware1mr78a1mr79a_firmware1mr69a3uk99d_firmware1mr77a3uk83b1mr76a1kr55d1mr69a_firmware3ul00d1kr49a_firmware1kr45a_firmware1mr75a_firmware3uk98d_firmware1mr69c3ul05b_firmware1mr68a_firmware1mr71a1mr78b1mr80d3ul05b3uk93d1mr73d_firmware1kr55b1mr72a1kr55b_firmware3uk85d_firmwarey8m28d_firmware1mr67a_firmware3uk86b_firmware1kr55a_firmware1mr67a3uk90d1kr55a1mr69c_firmware1kr42a3uk98d3uk83a1mr73a_firmwareCertain HP OfficeJet Pro Printers
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42398
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.76%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:37
Updated-24 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)HP Inc.Aruba Networks
Product-arubaosinstantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10arubaosinstant
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42397
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 32.38%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 18:51
Updated-19 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-instantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-42400
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.14% / 33.50%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:51
Updated-13 Mar, 2025 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instantarubaos
CVE-2024-42396
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.16%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 18:54
Updated-25 Mar, 2025 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)Aruba Networks
Product-instantosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instant
CVE-2026-1997
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.01% / 0.21%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:54
Updated-12 Feb, 2026 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP OfficeJet Pro Printers - Information Disclosure

Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.

Action-Not Available
Vendor-HP IncHP Inc.
Product-d9l63a_firmwarek7s39a_firmwarey0s19a_firmwarek7s40aj6x83a_firmwared9l18ak7s41a_firmwarej6x81a_firmwarek7s32a_firmwared9l18a_firmwaret0g70a_firmwarej3p68aj6x78ad9l63am9l67a_firmwarel3t99a_firmwarek7s32at0g46a_firmwarek7s40a_firmwaret0g70ak7s37a_firmwarem9l66a_firmwarel3t99ad9l20a_firmwareg5j38a_firmwarej3p67at0g47a_firmwarek7s42a_firmwarey0s19at0g47at1p99ak7s38at0g49aj3p65a_firmwarey0s18a_firmwaret0g48aj3p66a_firmwarem9l65a_firmwareg5j56a_firmwareg5j56at0g65a_firmwared9l20ad9l21ak7s43ag5j38ad9l64a_firmwarem9l70ak7s41ak7s43a_firmwarej3p68a_firmwarek7s38a_firmwaret0g46aj6x76aj6x81aj6x80a_firmwarej6x80am9l65aj6x77ad9l21a_firmwarej6x83aj6x79aj6x76a_firmwared9l64am9l70a_firmwarek7s42aj6x78a_firmwaret0g49a_firmwarej3p67a_firmwarem9l67at0g56aj6x79a_firmwaret0g56a_firmwaret1p99a_firmwarek7s39at0g65aj3p66ay0s18aj6x77a_firmwarej3p65am9l66ak7s37at0g48a_firmwareHP OfficeJet Pro 7720 Wide Format All-in-One Printer seriesHP OfficeJet Pro 7740 Wide Format All-in-One Printer seriesHP OfficeJet Pro 8730 Mono Printer seriesHP OfficeJet Pro 8740 All-in-One Printer seriesHP OfficeJet Pro 8730 All-in-One PrinterHP OfficeJet Pro 8710 All-in-One Printer seriesHP OfficeJet Pro 7730 Wide Format All-in-One PrinterHP OfficeJet Pro 8210 Printer series
CWE ID-CWE-346
Origin Validation Error
CVE-2020-10136
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-15.08% / 94.64%
||
7 Day CHG-0.87%
Published-02 Jun, 2020 | 08:35
Updated-03 Nov, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IP-in-IP protocol allows a remote, unauthenticated attacker to route arbitrary network traffic

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

Action-Not Available
Vendor-digitreckHP Inc.Cisco Systems, Inc.The IETF Administration LLC (IETF LLC)
Product-nexus_1000venexus_7000nexus_93180yc-exnexus_9396txnexus_5648qnexus_93180lc-exunified_computing_systemtcp\/ipnexus_6004sarosnexus_5548pnexus_9236cnexus_3172nexus_93216tc-fx2nexus_93240yc-fx2nexus_9372tx-enexus_9372pxucs_6324nexus_7700ucs_6332nexus_9372txucs_6248upnexus_56128pnexus_9396pxnexus_3132qnexus_6001nexus_92304qcnexus_92348gc-xnexus_5010nexus_9332pqnexus_9508nexus_93128txnexus_9516nexus_93120txnexus_3048nexus_1000vx3220nr_firmwarenexus_93360yc-fx2nexus_5548upnexus_9372px-enexus_93180yc-fxnexus_5596upucs_6296upnexus_9336pq_aci_spinenexus_9348gc-fxpucs_6332-16upnexus_93108tc-fxnexus_9272qnexus_5696qnexus_9332cucs_managernexus_3064-tnexus_5672upnexus_5624qnexus_3064nexus_3016nexus_9504nexus_9364cnexus_5020nx-osnexus_5596tnexus_9336c-fx2nexus_93108tc-exRFC2003 - IP Encapsulation within IP
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2024-42399
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.76%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 19:48
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)Aruba Networks
Product-instantosarubaosHPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10instantarubaos
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-2769
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.54% / 67.80%
||
7 Day CHG-0.01%
Published-23 Jul, 2019 | 22:31
Updated-15 Oct, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewepolicy_orchestratorjreenterprise_linux_workstationenterprise_linuxenterprise_linux_eussatellitejdkenterprise_linux_desktopleapJava
CVE-2018-2795
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.06%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2024-31479
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.43%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:33
Updated-24 Jun, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31478
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.47%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:32
Updated-24 Jun, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31481
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.43%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:35
Updated-24 Jun, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-1004
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.20% / 41.57%
||
7 Day CHG~0.00%
Published-06 Feb, 2025 | 21:02
Updated-24 Feb, 2026 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certain HP LaserJet Pro Printers – Potential Denial of Service

Certain HP LaserJet Pro printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer via IPP (Internet Printing Protocol).

Action-Not Available
Vendor-HP Inc.
Product-4pa44ag3q79aq3q75a_firmware4pa43a4pa43a_firmwareg3q79a_firmwareg3q76ag3q77a_firmwareg3q74a_firmwareg3q74ag3q78a_firmwareq3q75ag3q77a4pa41a4pa41a_firmware4pa42ag3q76a_firmwareg3q78a4pa44a_firmware4pa42a_firmwareCertain HP LaserJet Pro Printers
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2024-31482
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.43%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:36
Updated-24 Jun, 2025 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31480
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.43%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 22:34
Updated-24 Jun, 2025 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.

Action-Not Available
Vendor-Aruba NetworksHP Inc.Hewlett Packard Enterprise (HPE)
Product-arubaosinstantosAOS-8 Instant and AOS-10 APinstantarubaos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-2798
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.06%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eussatelliteJava
CVE-2018-2815
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.69% / 71.99%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eusJava
CVE-2018-2796
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.60%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Debian GNU/LinuxSchneider Electric SEOracle CorporationHP Inc.Red Hat, Inc.Canonical Ltd.
Product-enterprise_linux_server_ausenterprise_linux_server_tusjdkjrockitenterprise_linux_serverenterprise_linux_workstationjrestruxureware_data_center_expertdebian_linuxxp7_command_viewubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eussatelliteJava
CVE-2018-2799
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 30.86%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.The Apache Software FoundationOracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationxerces-jsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2018-3214
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.32% / 55.02%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 01:00
Updated-02 Oct, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_eussatellitejdkenterprise_linux_server_tusenterprise_linux_desktopjrockitJava
CVE-2018-2797
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.06%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxxp7_command_viewenterprise_linux_server_eusjreenterprise_linux_server_ausenterprise_linux_workstationsatellitejdkenterprise_linux_server_tusenterprise_linux_desktopstruxureware_data_center_expertjrockitJava
CVE-2018-2603
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.51%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp7_command_viewenterprise_linux_server_eusenterprise_linux_server_aussatellitejdkstruxureware_data_center_expertjrockitxp_command_viewdebian_linuxxp_p9000_command_viewjreenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopJava
CVE-2019-2762
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.64% / 70.65%
||
7 Day CHG-0.01%
Published-23 Jul, 2019 | 22:31
Updated-15 Oct, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxepolicy_orchestratorxp7_command_viewjreenterprise_linux_workstationenterprise_linuxenterprise_linux_eussatellitejdkenterprise_linux_desktopleapJava
CVE-2025-2268
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.39% / 60.12%
||
7 Day CHG~0.00%
Published-14 Mar, 2025 | 13:33
Updated-16 Jan, 2026 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HP LaserJet MFP M232-M237 Printer Series - Potential Denial of Service

The HP LaserJet MFP M232-M237 Printer Series may be vulnerable to a denial of service attack when a specially crafted request message is sent via Internet Printing Protocol (IPP).

Action-Not Available
Vendor-HP Inc.
Product-7md70f7md70e_firmware1y7d4a6gx05e6gx06a_firmware6gx00a_firmware7md73a7md74a6gw99a_firmware9yf92a7md75a_firmware9yf91e7md74e2a130e_firmware7md70a6gx09e9yf88a2a130a9yf94a2u589a_firmware9yf88a_firmware9yf96a_firmware2u589e_firmware9yf91a7md72e2u589a9yf90a6gx00e6gw71a7md71a_firmware9yg02e_firmware7md69a_firmware9yf98a6gx06a9yf96a1y7d4a_firmware6gx04a_firmware6gx09e_firmware9yg02e9yg09a_firmware9yg10a_firmware9yg05a_firmware6gx03a_firmware9yg02a7md70a_firmware7md75a7md70f_firmware9yg11a_firmware6gx05e_firmware2a130a_firmware2a130e6gx09a_firmware9yf97a6gw99e_firmware6gx03a2u589e2a129a_firmware6gw99e6gx01a6gw71a_firmware9yf89a_firmware9yg08a6gx05a_firmware7md76a_firmware9yg05e_firmware7md73a_firmware6gw99a7md69a6gx02e_firmware7md76e_firmware7md72a_firmware2u589f_firmware7md70e9yg02a_firmware9yg05e9yf95a_firmware7md74a_firmware7md74e_firmware9yf92a_firmware9yf95a2u589f6gx02e9yf91a_firmware9yg10a7md72e_firmware9yg08a_firmware9yg09a6gx01a_firmware6hu08a6gx04a9yf97a_firmware9yf91e_firmware6gx00e_firmware9yf89a9yg05a7md76e9yf94a_firmware7md72a9yf98a_firmware6gx09a7md71a6hu08a_firmware6gx00a2a129a9yg11a9yf90a_firmware7md76a6gx05aHP LaserJet MFP M232-M237 Printer Series
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2022-23002
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 59.36%
||
7 Day CHG~0.00%
Published-29 Jul, 2022 | 18:52
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Point Compression/Decompression of NIST P-256 points with X coordinate of zero

When compressing or decompressing a point on the NIST P-256 elliptic curve with an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output will cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

Action-Not Available
Vendor-Western Digital Corp.
Product-sweet_bSweet B Library
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2022-23004
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 59.36%
||
7 Day CHG~0.00%
Published-29 Jul, 2022 | 18:55
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Algorithm incorrectly returning error and Invalid unreduced value written to output buffer

When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

Action-Not Available
Vendor-Western Digital Corp.
Product-sweet_bSweet B Library
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CWE ID-CWE-707
Improper Neutralization
CWE ID-CWE-682
Incorrect Calculation
CVE-2024-22023
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.72% / 72.65%
||
7 Day CHG~0.00%
Published-04 Apr, 2024 | 19:45
Updated-03 Oct, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS.

Action-Not Available
Vendor-Ivanti Software
Product-policy_secureconnect_securePolicy SecureConnect Securepolicy_secureconnect_secure
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-23003
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 59.36%
||
7 Day CHG~0.00%
Published-29 Jul, 2022 | 18:54
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shared secret or Point multiplication of NIST P-256 points with X coordinate of zero

When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario or incorrect choice of session key in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

Action-Not Available
Vendor-Western Digital Corp.
Product-sweet_bSweet B Library
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CWE ID-CWE-682
Incorrect Calculation
CVE-2026-21895
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.7||LOW
EPSS-0.02% / 6.60%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 14:06
Updated-12 Mar, 2026 | 19:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
rsa crate has potential panic on a prime being equal to 1

The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.

Action-Not Available
Vendor-rustcryptoRustCrypto
Product-rsaRSA
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2025-59836
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.59% / 69.38%
||
7 Day CHG+0.04%
Published-13 Oct, 2025 | 20:43
Updated-04 Dec, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Omni is Vulnerable to DoS via Empty Create/Update Resource Requests

Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to 1.1.5 and 1.0.2, there is a nil pointer dereference vulnerability in the Omni Resource Service allows unauthenticated users to cause a server panic and denial of service by sending empty create/update resource requests through the API endpoints. The vulnerability exists in the isSensitiveSpec function which calls grpcomni.CreateResource without checking if the resource's metadata field is nil. When a resource is created with an empty Metadata field, the CreateResource function attempts to access resource.Metadata.Version causing a segmentation fault. This vulnerability is fixed in 1.1.5 and 1.0.2.

Action-Not Available
Vendor-siderolabssiderolabs
Product-omniomni
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2024-26007
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-5||MEDIUM
EPSS-0.25% / 48.40%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 16:19
Updated-11 Dec, 2024 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS version 7.4.1 allows an unauthenticated attacker to provoke a denial of service on the administrative interface via crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortiOSfortios
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
Details not found