var-201801-0229
Vulnerability from variot
A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code. HP PageWide Printer and OfficeJet Pro The printer firmware contains an access control vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The HP Officejet 8500A is a print/copy/scan/fax MFP from HP
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "d3q21d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j6u55a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j6u55b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q15b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q20c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q21c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q16d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v82a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q17c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d9l21a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j6u55c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q20b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q17a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q17d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v82c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d9l63a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d9l64a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q15a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q15d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q21a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v82b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j6u55d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q19a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "t0g70a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j3p68a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q16b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v82d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v80a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q20a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q20d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "k9z76d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d9l20a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q16a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q19d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q16c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "k9z76a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j6u57b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "j9v80b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "1708d" }, { "model": "d3q17a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "d9l20a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "j3p68a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "j6u55a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "j6u57b", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "j9v80a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "j9v82a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "k9z76a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "t0g70a", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "1708d" }, { "model": "officejet pro", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "8210" }, { "model": "pagewide pro mfp 577z k9z76d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 577z k9z76a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 577dw d3q21d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 577dw d3q21c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 577dw d3q21a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dw d3q20d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dw d3q20c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dw d3q20b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dw d3q20a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dn d3q19d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro mfp 477dn d3q19a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 552dw d3q17d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 552dw d3q17c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 552dw d3q17a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dw d3q16d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dw d3q16c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dw d3q16b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dw d3q16a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dn d3q15d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dn d3q15b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide pro 452dn d3q15a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide mfp 377dw j9v80b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide mfp 377dw j9v80a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed p55250dw j6u55d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed p55250dw j6u55c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed p55250dw j6u55b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed p55250dw j6u55a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed p55250dw j6u55b", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed mfp p57750dw j9v82d", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed mfp p57750dw j9v82c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed mfp p57750dw j9v82b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide managed mfp p57750dw j9v82a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pagewide 352dw j6u57b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "officejet pro all-in-one printer d9l21a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "87400" }, { "model": "officejet pro all-in-one printer d9l20a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "87300" }, { "model": "officejet pro printer j3p68a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "82180" }, { "model": "officejet pro printer t0g70a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "82160" }, { "model": "officejet pro printer d9l64a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "82100" }, { "model": "officejet pro printer d9l63a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "82100" }, { "model": "pagewide pro mfp 577z k9z76d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 577z k9z76a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 577dw d3q21d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 577dw d3q21c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 577dw d3q21a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dw d3q20d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dw d3q20c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dw d3q20b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dw d3q20a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dn d3q19d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro mfp 477dn d3q19a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 552dw d3q17d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 552dw d3q17c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 552dw d3q17a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dw d3q16d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dw d3q16c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dw d3q16b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dw d3q16a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dn d3q15d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dn d3q15b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide pro 452dn d3q15a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide mfp 377dw j9v80b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide mfp 377dw j9v80a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed p55250dw j6u55d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed p55250dw j6u55c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed p55250dw j6u55b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed p55250dw j6u55a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed p55250dw j6u55b1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed mfp p57750dw j9v82d 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed mfp p57750dw j9v82c 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed mfp p57750dw j9v82b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide managed mfp p57750dw j9v82a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pagewide 352dw j6u57b 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "officejet pro all-in-one printer d9l21a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8740" }, { "model": "officejet pro all-in-one printer d9l20a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8730" }, { "model": "officejet pro printer j3p68a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8218" }, { "model": "officejet pro printer t0g70a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8216" }, { "model": "officejet pro printer d9l64a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8210" }, { "model": "officejet pro printer d9l63a 1708d", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8210" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "BID", "id": "102831" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v82b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v82c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j6u55b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j6u55c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q17c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q16b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q16c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d9l20a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d9l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d9l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1708d", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-2741" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP Product Security Response Team (PSRT)", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-1020" } ], "trust": 0.6 }, "cve": "CVE-2017-2741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2017-2741", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-13140", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-2741", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-2741", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2017-13140", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201711-1020", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2017-2741", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "VULMON", "id": "CVE-2017-2741" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" }, { "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code. HP PageWide Printer and OfficeJet Pro The printer firmware contains an access control vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The HP Officejet 8500A is a print/copy/scan/fax MFP from HP", "sources": [ { "db": "NVD", "id": "CVE-2017-2741" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "BID", "id": "102831" }, { "db": "VULMON", "id": "CVE-2017-2741" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=45273", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-2741" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2741", "trust": 3.4 }, { "db": "EXPLOIT-DB", "id": "42176", "trust": 2.3 }, { "db": "EXPLOIT-DB", "id": "45273", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-012233", "trust": 0.8 }, { "db": "EXPLOITDB", "id": "42176", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2017-13140", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201711-1020", "trust": 0.6 }, { "db": "BID", "id": "102831", "trust": 0.4 }, { "db": "VULMON", "id": "CVE-2017-2741", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "VULMON", "id": "CVE-2017-2741" }, { "db": "BID", "id": "102831" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" }, { "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "id": "VAR-201801-0229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" } ], "trust": 1.5166667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" } ] }, "last_update_date": "2023-12-18T12:19:15.752000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBPI03555", "trust": 0.8, "url": "https://support.hp.com/us-en/document/c05462914" }, { "title": "Multiple HP Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76729" }, { "title": "HP: HPSBPI03555 rev. 2 - HP PageWide Printers, HP OfficeJet Pro Printers, Arbitrary Code Execution", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbpi03555" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-2741" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.exploit-db.com/exploits/42176/" }, { "trust": 2.1, "url": "https://support.hp.com/us-en/document/c05462914" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/45273/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2741" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2741" }, { "trust": 0.3, "url": "http://www.hp.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/linux/misc/hp_jetdirect_path_traversal" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/102831" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "VULMON", "id": "CVE-2017-2741" }, { "db": "BID", "id": "102831" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" }, { "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-13140" }, { "db": "VULMON", "id": "CVE-2017-2741" }, { "db": "BID", "id": "102831" }, { "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "db": "NVD", "id": "CVE-2017-2741" }, { "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2017-13140" }, { "date": "2018-01-23T00:00:00", "db": "VULMON", "id": "CVE-2017-2741" }, { "date": "2017-03-17T00:00:00", "db": "BID", "id": "102831" }, { "date": "2018-02-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "date": "2018-01-23T16:29:00.787000", "db": "NVD", "id": "CVE-2017-2741" }, { "date": "2017-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-10T00:00:00", "db": "CNVD", "id": "CNVD-2017-13140" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-2741" }, { "date": "2017-03-17T00:00:00", "db": "BID", "id": "102831" }, { "date": "2018-02-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012233" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2017-2741" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-1020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-1020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP PageWide Printer and OfficeJet Pro Access control vulnerability in printer firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012233" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-1020" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.