Vulnerabilities > Ricoh > SP C250Sf Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-15 | CVE-2021-33945 | Out-of-bounds Write vulnerability in Ricoh products RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. | 9.8 |
2020-03-13 | CVE-2019-14310 | Out-of-bounds Write vulnerability in Ricoh products Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). | 9.8 |
2020-03-13 | CVE-2019-14309 | Use of Hard-coded Credentials vulnerability in Ricoh products Ricoh SP C250DN 1.05 devices have a fixed password. | 7.5 |
2020-03-13 | CVE-2019-14303 | Unspecified vulnerability in Ricoh products Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). | 7.5 |
2020-03-13 | CVE-2019-14299 | Improper Restriction of Excessive Authentication Attempts vulnerability in Ricoh products Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. | 9.8 |
2020-01-10 | CVE-2019-14306 | Unspecified vulnerability in Ricoh products Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2). | 7.5 |
2020-01-10 | CVE-2019-14304 | Cross-Site Request Forgery (CSRF) vulnerability in Ricoh products Ricoh SP C250DN 1.06 devices allow CSRF. | 8.8 |
2020-01-10 | CVE-2019-14302 | Unspecified vulnerability in Ricoh products On Ricoh SP C250DN 1.06 devices, a debug port can be used. low complexity ricoh | 6.8 |
2020-01-10 | CVE-2019-14301 | Information Exposure vulnerability in Ricoh products Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2). | 7.5 |
2019-08-26 | CVE-2019-14307 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ricoh products Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. | 9.8 |