Vulnerability Database

326,690

Total vulnerabilities in the database

CVE-2012-5221

Directory traversal vulnerability in the PostScript Interpreter, as used on the HP LaserJet 4xxx, 5200, 90xx, M30xx, M4345, M50xx, M90xx, P3005, and P4xxx; LaserJet Enterprise P3015; Color LaserJet 3xxx, 47xx, 5550, 9500, CM60xx, CP35xx, CP4005, and CP6015; Color LaserJet Enterprise CP4xxx; and 9250c Digital Sender with model-dependent firmware through 52.x allows remote attackers to read arbitrary files via unknown vectors.

  • Published: Apr 29, 2013
  • Updated: Nov 9, 2025
  • CVE: CVE-2012-5221
  • Severity: Medium
  • Exploit:

CVSS v2:

  • Severity: Medium
  • Score: 5
  • AV:N/AC:L/Au:N/C:P/I:N/A:N

No CWE or OWASP classifications available.

Software From Fixed in
hp / color_laserjet_enterprise_cp4525 cc493a cc493a.x
hp / laserjet_4345_mfp q3942a q3942a.x
hp / laserjet_9040 q7697a q7697a.x
hp / laserjet_p4015 cb509a cb509a.x
hp / color_laserjet_cp3525 cc469a cc469a.x
hp / laserjet_m3035_mfp cc519a cc519a.x
hp / color_laserjet_cp4005 cb503a cb503a.x
hp / color_laserjet_cp3505 cb442a cb442a.x
hp / laserjet_9050_mfp q3721a q3721a.x
hp / laserjet_p3005 q7812a q7812a.x
hp / laserjet_m5025_mfp q7840a q7840a.x
hp / color_laserjet_cp6015 q3932a q3932a.x
hp / laserjet_5200n q7543a q7543a.x
hp / laserjet_m5035_mfp q7829a q7829a.x
hp / laserjet_m4345_mfp cb425a cb425a.x
hp / laserjet_m3027_mfp cb416a cb416a.x
hp / laserjet_4350 q5407a q5407a.x
hp / laserjet_p4515 cb514a cb514a.x
hp / laserjet_5200l q7543a q7543a.x
hp / color_laserjet_cm6030_mfp ce664a ce664a.x
hp / color_laserjet_cm6040_mfp q3939a q3939a.x
hp / color_laserjet_enterprise_cp4025 cc490a cc490a.x
hp / color_laserjet_4730_mfp cb480a cb480a.x
hp / laserjet_enterprise_p3015 ce526a ce526a.x
hp / laserjet_9040_mfp q3721a q3721a.x
hp / color_laserjet_4700 q7492a q7492a.x
hp / digital_sender_9250c cb472a cb472a.x
hp / laserjet_4240 q7785a q7785a.x
hp / laserjet_m9040_mpf cc394a cc394a.x
hp / color_laserjet_9500_mfp c8549a c8549a.x
hp / laserjet_p4014 cb507a cb507a.x
hp / laserjet_4250 q5400a q5400a.x
hp / color_laserjet_3800 q5981a q5981a.x
hp / laserjet_m9050_mpf cc395a cc395a.x
hp / laserjet_m3035_mfp cb414a cb414a.x
hp / laserjet_9050 q7697a q7697a.x
hp / color_laserjet_3000 q7534a q7534a.x
hp / color_laserjet_5550 q3714a q3714a.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.