Логотип exploitDog
bind:CVE-2018-18006
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-18006

Количество 2

Количество 2

nvd логотип

CVE-2018-18006

около 7 лет назад

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mqxj-m3gw-p6fr

больше 3 лет назад

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-18006

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.

CVSS3: 9.8
2%
Низкий
около 7 лет назад
github логотип
GHSA-mqxj-m3gw-p6fr

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу