Vulnerabilities (CVE)

Filtered by vendor Hp Subscribe
Filtered by product D3q15a
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-28722 1 Hp 198 A7w93a, A7w93a Firmware, D3q15a and 195 more 2023-12-10 N/A 9.8 CRITICAL
Certain HP Print Products are potentially vulnerable to Buffer Overflow.
CVE-2022-28721 1 Hp 600 1g5m0a, 1g5m0a Firmware, 1k7k6a and 597 more 2023-12-10 N/A 9.8 CRITICAL
Certain HP Print Products are potentially vulnerable to Remote Code Execution.
CVE-2019-10627 2 Hp, Qualcomm 83 2dr21d, 2dr21d Firmware, D3q15a and 80 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
CVE-2019-6337 1 Hp 82 2dr21d, 2dr21d Firmware, D3q15a and 79 more 2023-12-10 3.3 LOW 5.2 MEDIUM
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
CVE-2018-5925 1 Hp 540 1dt61a, 1dt61a Firmware, 1jl02a and 537 more 2023-12-10 9.3 HIGH 7.8 HIGH
A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a static buffer overflow, which could allow remote code execution.
CVE-2018-5924 1 Hp 540 1dt61a, 1dt61a Firmware, 1jl02a and 537 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution.
CVE-2017-2741 1 Hp 76 D3q15a, D3q15a Firmware, D3q15b and 73 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code.