Summary
Detail | |||
---|---|---|---|
Vendor | Ricoh | First view | 2020-01-10 |
Product | Sp 221snw Firmware | Last view | 2022-02-15 |
Version | 1.06 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:ricoh:sp_221snw_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2022-02-15 | CVE-2021-33945 | RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data. |
7.5 | 2020-01-10 | CVE-2019-14306 | Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2). |
8.8 | 2020-01-10 | CVE-2019-14304 | Ricoh SP C250DN 1.06 devices allow CSRF. |
6.8 | 2020-01-10 | CVE-2019-14302 | On Ricoh SP C250DN 1.06 devices, a debug port can be used. |
7.5 | 2020-01-10 | CVE-2019-14301 | Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-787 | Out-of-bounds Write |
33% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
33% (1) | CWE-200 | Information Exposure |