Filtered by vendor Epson
Subscribe
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-14903 | 1 Epson | 2 Wf-2750, Wf-2750 Firmware | 2018-11-08 | 5.0 MEDIUM | 7.5 HIGH |
EPSON WF-2750 printers with firmware JP02I2 do not properly validate files before running updates, which allows remote attackers to cause a printer malfunction or send malicious data to the printer. | |||||
CVE-2018-14902 | 1 Epson | 1 Iprint | 2018-11-08 | 5.0 MEDIUM | 7.5 HIGH |
The ContentProvider in the EPSON iPrint application 6.6.3 for Android does not properly restrict data access. This allows an attacker's application to read scanned documents. | |||||
CVE-2018-14900 | 1 Epson | 2 Wf-2750, Wf-2750 Firmware | 2018-11-08 | 5.0 MEDIUM | 7.5 HIGH |
On EPSON WF-2750 printers with firmware JP02I2, there is no filtering of print jobs. Remote attackers can send print jobs directly to the printer via TCP port 9100. | |||||
CVE-2018-14899 | 1 Epson | 2 Wf-2750, Wf-2750 Firmware | 2018-11-08 | 4.3 MEDIUM | 6.1 MEDIUM |
On the EPSON WF-2750 printer with firmware JP02I2, the Web interface AirPrint Setup page is vulnerable to HTML Injection that can redirect users to malicious sites. | |||||
CVE-2017-6443 | 1 Epson | 1 Tmnet Webconfig | 2017-03-16 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in EPSON TMNet WebConfig 1.00 allows remote attackers to inject arbitrary web script or HTML via the W_AD1 parameter to Forms/oadmin_1. | |||||
CVE-2015-6034 | 1 Epson | 1 Network Utility | 2015-10-29 | 6.9 MEDIUM | N/A |
EPSON Network Utility 4.10 uses weak permissions (Everyone: Full Control) for eEBSVC.exe, which allows local users to gain privileges via a Trojan horse file. | |||||
CVE-2010-3920 | 1 Epson | 6 Lp-s7100, Lp-s7100 Driver 4.1.0, Lp-s7100 Driver 4.1.7 and 3 more | 2011-03-10 | 4.6 MEDIUM | N/A |
The Seiko Epson printer driver installers for LP-S9000 before 4.1.11 and LP-S7100 before 4.1.7, or as downloaded from the vendor between May 2010 and 20101125, set weak permissions for the "C:\Program Files" folder, which might allow local users to bypass intended access restrictions and create or modify arbitrary files and directories. |