Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-cnxw-4ree-g3ez |
| Summary | The hpssd daemon might allow local attackers to execute arbitrary commands
with root privileges. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
| 0 |
| url |
pkg:deb/debian/hplip@0.9.2-2 |
| purl |
pkg:deb/debian/hplip@0.9.2-2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-8e1n-19ca-ayb4 |
|
| 1 |
| vulnerability |
VCID-a7h1-7a1g-vqa6 |
|
| 2 |
| vulnerability |
VCID-ajy8-wz5n-mfb2 |
|
| 3 |
| vulnerability |
VCID-cnxw-4ree-g3ez |
|
| 4 |
| vulnerability |
VCID-e7ce-ncn2-87dd |
|
| 5 |
| vulnerability |
VCID-f2yg-yaaj-uub1 |
|
| 6 |
| vulnerability |
VCID-f39n-wae1-n3cc |
|
| 7 |
| vulnerability |
VCID-f3w3-w65v-hyhm |
|
| 8 |
| vulnerability |
VCID-k8hw-71wj-dygy |
|
| 9 |
| vulnerability |
VCID-m5z3-fsqw-nue1 |
|
| 10 |
| vulnerability |
VCID-mfqk-y4g4-sfa5 |
|
| 11 |
| vulnerability |
VCID-y2pa-cbhj-r7az |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@0.9.2-2 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5208 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98802 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98805 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98809 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.9881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98814 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98818 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.73689 |
| scoring_system |
epss |
| scoring_elements |
0.98822 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5208 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
78 |
| name |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
| description |
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
|
|
| Exploits |
| 0 |
| date_added |
2010-10-09 |
| description |
hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit) |
| required_action |
null |
| due_date |
null |
| notes |
null |
| known_ransomware_campaign_use |
true |
| source_date_published |
2010-10-09 |
| exploit_type |
remote |
| platform |
linux |
| source_date_updated |
2011-03-06 |
| data_source |
Exploit-DB |
| source_url |
|
|
| 1 |
| date_added |
null |
| description |
This module exploits a command execution vulnerable in the hpssd.py
daemon of the Hewlett-Packard Linux Imaging and Printing Project.
According to MITRE, versions 1.x and 2.x before 2.7.10 are vulnerable.
This module was written and tested using the Fedora 6 Linux distribution.
On the test system, the daemon listens on localhost only and runs with
root privileges. Although the configuration shows the daemon is to
listen on port 2207, it actually listens on a dynamic port.
NOTE: If the target system does not have a 'sendmail' command installed,
this vulnerability cannot be exploited. |
| required_action |
null |
| due_date |
null |
| notes |
Reliability:
- unknown-reliability
Stability:
- unknown-stability
SideEffects:
- unknown-side-effects
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2007-10-04 |
| exploit_type |
null |
| platform |
Unix |
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/misc/hplip_hpssd_exec.rb |
|
|
| Severity_range_score | null |
| Exploitability | 2.0 |
| Weighted_severity | 0.7 |
| Risk_score | 1.4 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-cnxw-4ree-g3ez |