CVE-2019-6337 (GCVE-0-2019-6337)
Vulnerability from cvelistv5
Published
2019-11-07 14:37
Modified
2024-08-04 20:16
Severity ?
CWE
  • Buffer Overflow, Disclosure of Information
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:16:24.827Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/c06458150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "001.1937C or later For all models"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer Overflow, Disclosure of Information",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-07T14:37:09",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hp.com/us-en/document/c06458150"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2019-6337",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "001.1937C or later For all models"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Buffer Overflow, Disclosure of Information"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hp.com/us-en/document/c06458150",
              "refsource": "MISC",
              "url": "https://support.hp.com/us-en/document/c06458150"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2019-6337",
    "datePublished": "2019-11-07T14:37:09",
    "dateReserved": "2019-01-15T00:00:00",
    "dateUpdated": "2024-08-04T20:16:24.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-6337\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2019-11-07T15:15:11.070\",\"lastModified\":\"2024-11-21T04:46:26.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.\"},{\"lang\":\"es\",\"value\":\"Para las impresoras listadas, un archivo de impresi\u00f3n dise\u00f1ado con fines maliciosos puede causar que determinadas impresoras HP Inkjet se confirmen. Bajo ciertas circunstancias, la impresora produce un volcado de n\u00facleo en un dispositivo local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L\",\"baseScore\":5.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.9,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"352A01F4-786C-47F3-91CD-C291F30322DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70003792-C31A-413D-A797-1ECD47DB40F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"0B1A3011-D519-4D84-BACC-7288F4D66EE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579CB9CB-AA44-4761-BB9A-F17648F08810\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"E0AA3854-7704-44FD-A5CA-4DD321B8093F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE2DE16-2E4D-4111-958C-611F1F8DA9C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"EEE3EFA6-C349-4088-9C9B-95DB9E812D74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C09B23-4574-4560-8676-C294D0205C71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937c\",\"matchCriteriaId\":\"DD58EBB2-6F62-45C9-9F03-A4E7C87BA323\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"9E896D6C-B17C-4C7A-BE2C-E1235515B49F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB02B60-DA6C-4775-8D73-389E30961432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7532069E-32F1-497E-8526-CDD79DA1CA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"4662B538-C208-458F-B64A-0877726371AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2B7993-1C87-4305-BFF9-98639CECBD3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"BFB2BBE2-2821-4994-8FA5-29298C6217D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1600E28F-767B-4495-8063-A66984484C94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"18ADF400-A200-428B-80FD-17E82137B54E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F8AE134F-52B0-474F-9BA6-5C125470DCC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB1F70D-EB33-497F-BC18-C197FAACAAD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"615ECDA7-2DFB-413F-BF21-077A4479CC1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C32078-2873-4B07-B218-DF2937C8E581\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"E206228B-8CD0-482F-9A83-FD400D8D65ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1184E875-E054-4D88-BBD8-93237C24B371\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"69B78A6D-FDAC-4BA6-8A4B-611673ADCD39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7625F93D-5E73-4AAD-99A3-8AC2AAAE0612\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"CE1A5C31-C198-45EB-A87F-A37C520DA520\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D8C5DC9-7082-4732-AF3F-599E595185D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"1E32A214-2672-4588-A72B-A0257C1C24F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"3406B9CC-8FC0-4283-9601-3D93CE246150\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA6A88E-B1ED-40EC-898E-490D803E1273\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"63BD439C-1171-4A77-9832-A54A8319D3F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"13CD5BBA-91BC-42E8-B05D-113D7C01CEB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0155AB-8D9E-4822-86B1-6702FD3A1F21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"586EFF40-D20C-4E65-A86D-7BFD69F26E44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B215E8-D636-418C-AB0C-3F23F36B37D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"71544467-64C7-4AB3-A94A-18A2F1EC268B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54254FBD-2197-4A39-9BD0-1D51C711046C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"ABCF860C-2FA3-42B1-8039-1D0B49157BA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DCA80B-8127-4011-B185-F14EAB8B89EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F181AF0B-B2BD-4781-9314-FD5E05D1A7DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A43BA0-2C47-4A57-BBE6-9A57ABB37212\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"765254C9-5A71-4E13-9288-7EB3AE8A47FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61942DC4-E95F-4A0F-95B1-304CEE7B569C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"86C3B42B-76A8-48A3-A836-8DB3F5F33D83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96E5227-0B40-493A-BC97-0944A88A3C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF2A84C2-DA6E-4C0A-86D4-185452936C66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"0A1EA4FC-8226-459C-A2C6-CD5370C40D09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC594695-B974-447F-8430-2928DE7D4C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34897D9B-C0AF-4411-85C7-586ED2C72218\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"932C298B-9160-43D2-9E76-A943526F40AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F64BDFC-D848-462C-84C4-0417622B0DEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"7840467A-7605-4CE5-B3EB-45F6D54CF74C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D110EEE-2A44-4BC5-90DB-C3D146EF08D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"8FEE20CA-EFE3-492C-BA2E-9C117F02D458\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491B07B3-E286-4046-98F1-D8BEFA526C80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"C5F22175-7EC3-41BE-B642-A333E0245A40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02206B82-E599-4B35-A60C-CA98A137B008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"F049DA70-73C6-4CB3-B744-4327F11ADF6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0541BF3-4A4B-424F-AC23-7026C7E35AB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"65AD0E29-057D-4E7C-80C2-D7A40401799E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"37BF997F-772A-4D06-8404-21F6E1CD10F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491BE10D-F37A-4FF7-8789-D0BA442F1E28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"82C5A28B-89C0-469A-BA77-C1B85CE5D711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AE3072-B57E-4CEB-A0C7-C4B87B194C30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"098D018F-A8BC-4FED-8AA4-9D032E9B3E8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C143BDCE-586F-479E-BC8E-385F3FA4FC0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"001.1937d\",\"matchCriteriaId\":\"8DA79564-DF22-42A0-AA2A-8D1E90C719BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB96063-CC55-4EA7-87E5-34A68322E7F7\"}]}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/c06458150\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hp.com/us-en/document/c06458150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…