TROYANOSYVIRUS
Back to CVEs

CVE-2018-5924

N/A

Description

A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution.

CVE Details

CVSS v3.1 ScoreN/A
Published8/13/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

hp:1dt61ahp:1dt61a_firmwarehp:1jl02ahp:1jl02a_firmwarehp:1jl02bhp:1jl02b_firmwarehp:1sh08hp:1sh08_firmwarehp:2nd31ahp:2nd31a_firmwarehp:3aw44ahp:3aw44a_firmwarehp:3aw51ahp:3aw51a_firmwarehp:3yz74ahp:3yz74a_firmwarehp:4sc29ahp:4sc29a_firmwarehp:4uj28bhp:4uj28b_firmwarehp:a7f64ahp:a7f64a_firmwarehp:a7f65ahp:a7f65a_firmwarehp:a7f66ahp:a7f66a_firmwarehp:a9j40ahp:a9j40a_firmwarehp:a9j41hp:a9j41_firmwarehp:a9t80ahp:a9t80a_firmwarehp:a9t80bhp:a9t80b_firmwarehp:a9t89ahp:a9t89a_firmwarehp:a9u19ahp:a9u19a_firmwarehp:a9u23hp:a9u23_firmwarehp:a9u28bhp:a9u28b_firmwarehp:b4l03hp:b4l03_firmwarehp:b4l08ahp:b4l08a_firmwarehp:b9s56ahp:b9s56a_firmwarehp:b9s57chp:b9s57c_firmwarehp:b9s58ahp:b9s58a_firmwarehp:b9s76hp:b9s76_firmwarehp:c9s13ahp:c9s13a_firmwarehp:cm749ahp:cm749a_firmwarehp:cm750ahp:cm750a_firmwarehp:cn216ahp:cn216a_firmwarehp:cn459ahp:cn459a_firmwarehp:cn460ahp:cn460a_firmwarehp:cn461ahp:cn461a_firmwarehp:cn463ahp:cn463a_firmwarehp:cn577ahp:cn577a_firmwarehp:cn581ahp:cn581a_firmwarehp:cn583ahp:cn583a_firmwarehp:cn598ahp:cn598a_firmwarehp:cq176hp:cq176_firmwarehp:cq176ahp:cq176a_firmwarehp:cq183ahp:cq183a_firmwarehp:cq761ahp:cq761a_firmwarehp:cq890ahp:cq890a_firmwarehp:cq890arhp:cq890ar_firmwarehp:cq890bhp:cq890b_firmwarehp:cq890chp:cq890c_firmwarehp:cq890dhp:cq890d_firmwarehp:cq890ehp:cq890e_firmwarehp:cq891ahp:cq891a_firmwarehp:cq891arhp:cq891ar_firmwarehp:cq891bhp:cq891b_firmwarehp:cq891chp:cq891c_firmwarehp:cq893ahp:cq893a_firmwarehp:cq893arhp:cq893ar_firmwarehp:cq893bhp:cq893b_firmwarehp:cq893chp:cq893c_firmwarehp:cq893ehp:cq893e_firmwarehp:cr768ahp:cr768a_firmwarehp:cr769ahp:cr769a_firmwarehp:cr771ahp:cr771a_firmwarehp:cr7770ahp:cr7770a_firmwarehp:cv037ahp:cv037a_firmwarehp:cv136ahp:cv136a_firmwarehp:cx017ahp:cx017a_firmwarehp:cx042hp:cx042_firmwarehp:cz025ahp:cz025a_firmwarehp:cz045ahp:cz045a_firmwarehp:cz152ahp:cz152a_firmwarehp:cz276ahp:cz276a_firmwarehp:cz282ahp:cz282a_firmwarehp:cz283ahp:cz283a_firmwarehp:cz284ahp:cz284a_firmwarehp:cz292ahp:cz292a_firmwarehp:cz293ahp:cz293a_firmwarehp:cz294ahp:cz294a_firmwarehp:cz992ahp:cz992a_firmwarehp:cz993ahp:cz993a_firmwarehp:d3a78bhp:d3a78b_firmwarehp:d3a82ahp:d3a82a_firmwarehp:d3p93ahp:d3p93a_firmwarehp:d3q15ahp:d3q15a_firmwarehp:d3q15bhp:d3q15b_firmwarehp:d3q15dhp:d3q15d_firmwarehp:d3q16ahp:d3q16a_firmwarehp:d3q16bhp:d3q16b_firmwarehp:d3q16chp:d3q16c_firmwarehp:d3q16dhp:d3q16d_firmwarehp:d3q17ahp:d3q17a_firmwarehp:d3q17chp:d3q17c_firmwarehp:d3q17dhp:d3q17d_firmwarehp:d3q19ahp:d3q19a_firmwarehp:d3q19dhp:d3q19d_firmwarehp:d3q20ahp:d3q20a_firmwarehp:d3q20bhp:d3q20b_firmwarehp:d3q20chp:d3q20c_firmwarehp:d3q20dhp:d3q20d_firmwarehp:d3q21ahp:d3q21a_firmwarehp:d3q21chp:d3q21c_firmwarehp:d3q21dhp:d3q21d_firmwarehp:d4h21ahp:d4h21a_firmwarehp:d4h22ahp:d4h22a_firmwarehp:d4h24bhp:d4h24b_firmwarehp:d4h25ahp:d4h25a_firmwarehp:d4j74hp:d4j74_firmwarehp:d4j85bhp:d4j85b_firmwarehp:d7z36ahp:d7z36a_firmwarehp:d7z37ahp:d7z37a_firmwarehp:d9l18ahp:d9l18a_firmwarehp:d9l19ahp:d9l19a_firmwarehp:d9l20ahp:d9l20a_firmwarehp:d9l63ahp:d9l63a_firmwarehp:d9l64ahp:d9l64a_firmwarehp:e1d34ahp:e1d34a_firmwarehp:e1d36ahp:e1d36a_firmwarehp:e2d42ahp:e2d42a_firmwarehp:e3e02ahp:e3e02a_firmwarehp:e3e03ahp:e3e03a_firmwarehp:e4w43hp:e4w43_firmwarehp:f0m65ahp:f0m65a_firmwarehp:f0v63hp:f0v63_firmwarehp:f0v64hp:f0v64_firmwarehp:f0v67hp:f0v67_firmwarehp:f1h96hp:f1h96_firmwarehp:f1h97hp:f1h97_firmwarehp:f1j00hp:f1j00_firmwarehp:f5r95hp:f5r95_firmwarehp:f5r96ahp:f5r96a_firmwarehp:f5s00hp:f5s00_firmwarehp:f5s43hp:f5s43_firmwarehp:f5s57ahp:f5s57a_firmwarehp:f5s60ahp:f5s60a_firmwarehp:f5s65ahp:f5s65a_firmwarehp:f8b04ahp:f8b04a_firmwarehp:f8b05ahp:f8b05a_firmwarehp:f8b06ahp:f8b06a_firmwarehp:f8b09hp:f8b09_firmwarehp:f8b12ahp:f8b12a_firmwarehp:f8b13ahp:f8b13a_firmwarehp:f9a28ahp:f9a28a_firmwarehp:f9a28bhp:f9a28b_firmwarehp:f9a29ahp:f9a29a_firmwarehp:f9a29bhp:f9a29b_firmwarehp:f9d36hp:f9d36_firmwarehp:g0450hp:g0450_firmwarehp:g0v47hp:g0v47_firmwarehp:g0v48bhp:g0v48b_firmwarehp:g0v48chp:g0v48c_firmwarehp:g1w52ahp:g1w52a_firmwarehp:g1x85ahp:g1x85a_firmwarehp:g3j47ahp:g3j47a_firmwarehp:g5j38ahp:g5j38a_firmwarehp:j2d37ahp:j2d37a_firmwarehp:j3p68ahp:j3p68a_firmwarehp:j5t77ahp:j5t77a_firmwarehp:j6u55ahp:j6u55a_firmwarehp:j6u55bhp:j6u55b_firmwarehp:j6u55chp:j6u55c_firmwarehp:j6u55dhp:j6u55d_firmwarehp:j6u57bhp:j6u57b_firmwarehp:j6u59hp:j6u59_firmwarehp:j6u63hp:j6u63_firmwarehp:j6u69hp:j6u69_firmwarehp:j6x76ahp:j6x76a_firmwarehp:j6x80ahp:j6x80a_firmwarehp:j7a28ahp:j7a28a_firmwarehp:j7a31ahp:j7a31a_firmwarehp:j7k33ahp:j7k33a_firmwarehp:j7k34ahp:j7k34a_firmwarehp:j9v80ahp:j9v80a_firmwarehp:j9v80bhp:j9v80b_firmwarehp:j9v82ahp:j9v82a_firmwarehp:j9v82bhp:j9v82b_firmwarehp:j9v82chp:j9v82c_firmwarehp:j9v82dhp:j9v82d_firmwarehp:j9v86ahp:j9v86a_firmwarehp:j9v87ahp:j9v87a_firmwarehp:k4t99bhp:k4t99b_firmwarehp:k4u04bhp:k4u04b_firmwarehp:k7c84hp:k7c84_firmwarehp:k7g18ahp:k7g18a_firmwarehp:k7g86hp:k7g86_firmwarehp:k7g93ahp:k7g93a_firmwarehp:k7s34ahp:k7s34a_firmwarehp:k7s37ahp:k7s37a_firmwarehp:k7s42ahp:k7s42a_firmwarehp:k7v35hp:k7v35_firmwarehp:k7v42chp:k7v42c_firmwarehp:k9h48hp:k9h48_firmwarehp:k9h57hp:k9h57_firmwarehp:k9t01hp:k9t01_firmwarehp:k9u05bhp:k9u05b_firmwarehp:k9v76hp:k9v76_firmwarehp:k9z76ahp:k9z76a_firmwarehp:k9z76dhp:k9z76d_firmwarehp:l8l91ahp:l8l91a_firmwarehp:l9b95ahp:l9b95a_firmwarehp:l9d57ahp:l9d57a_firmwarehp:m2q28ahp:m2q28a_firmwarehp:m2u75hp:m2u75_firmwarehp:m2u76hp:m2u76_firmwarehp:m2u81hp:m2u81_firmwarehp:m2u85hp:m2u85_firmwarehp:m2u86hp:m2u86_firmwarehp:m2u91hp:m2u91_firmwarehp:m9l65ahp:m9l65a_firmwarehp:m9l70ahp:m9l70a_firmwarehp:m9l73ahp:m9l73a_firmwarehp:m9l80ahp:m9l80a_firmwarehp:m9l81ahp:m9l81a_firmwarehp:n4k99chp:n4k99c_firmwarehp:n4l14chp:n4l14c_firmwarehp:n4l17ahp:n4l17a_firmwarehp:n4l18chp:n4l18c_firmwarehp:n9m07ahp:n9m07a_firmwarehp:p0r21ahp:p0r21a_firmwarehp:p4c78ahp:p4c78a_firmwarehp:t0a23ahp:t0a23a_firmwarehp:t0f28ahp:t0f28a_firmwarehp:t0f29ahp:t0f29a_firmwarehp:t0g25ahp:t0g25a_firmwarehp:t0g45ahp:t0g45a_firmwarehp:t0g50ahp:t0g50a_firmwarehp:t0g54ahp:t0g54a_firmwarehp:t0g56ahp:t0g56a_firmwarehp:t0g70ahp:t0g70a_firmwarehp:t0k98ahp:t0k98a_firmwarehp:t1p36hp:t1p36_firmwarehp:t1p99hp:t1p99_firmwarehp:t1q00hp:t1q00_firmwarehp:t3p03ahp:t3p03a_firmwarehp:t3p04ahp:t3p04a_firmwarehp:t5d66ahp:t5d66a_firmwarehp:t5d67ahp:t5d67a_firmwarehp:t6t77ahp:t6t77a_firmwarehp:t8w35ahp:t8w35a_firmwarehp:t8w51ahp:t8w51a_firmwarehp:t8x39hp:t8x39_firmwarehp:t8x44hp:t8x44_firmwarehp:v1n01ahp:v1n01a_firmwarehp:v1n02ahp:v1n02a_firmwarehp:v1n08ahp:v1n08a_firmwarehp:v6d27hp:v6d27_firmwarehp:w1b31hp:w1b31_firmwarehp:w1b33hp:w1b33_firmwarehp:w1b37hp:w1b37_firmwarehp:w1b38hp:w1b38_firmwarehp:w1b39hp:w1b39_firmwarehp:w3u23hp:w3u23_firmwarehp:w3u25hp:w3u25_firmwarehp:x3b09ahp:x3b09a_firmwarehp:y0s18ahp:y0s18a_firmwarehp:y0s19ahp:y0s19a_firmwarehp:y3z44hp:y3z44_firmwarehp:y3z45hp:y3z45_firmwarehp:y3z46hp:y3z46_firmwarehp:y3z47hp:y3z47_firmwarehp:y3z54hp:y3z54_firmwarehp:y3z57hp:y3z57_firmwarehp:y5h60ahp:y5h60a_firmwarehp:y5h80ahp:y5h80a_firmwarehp:y5z00ahp:y5z00a_firmwarehp:z4a54hp:z4a54_firmwarehp:z4b07ahp:z4b07a_firmwarehp:z4b12hp:z4b12_firmwarehp:z4b53ahp:z4b53a_firmwarehp:z4b56ahp:z4b56a_firmwarehp:z6z11ahp:z6z11a_firmwarehp:z6z95ahp:z6z95a_firmwarehp:z6z97ahp:z6z97a_firmware

Weaknesses (CWE)

CWE-787

References

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.