{"containers":{"cna":{"affected":[{"product":"RICOH Interactive Whiteboard","vendor":"RICOH COMPANY, LTD.","versions":[{"status":"affected","version":"D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400)"}]}],"datePublic":"2019-01-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors."}],"problemTypes":[{"descriptions":[{"description":"OS Command Injection","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-01-09T21:57:01.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"name":"JVN#55263945","tags":["third-party-advisory","x_refsource_JVN"],"url":"https://jvn.jp/en/jp/JVN55263945/index.html"},{"tags":["x_refsource_MISC"],"url":"https://www.ricoh.com/info/2018/1127_1.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2018-16184","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"RICOH Interactive Whiteboard","version":{"version_data":[{"version_value":"D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400)"}]}}]},"vendor_name":"RICOH COMPANY, LTD."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OS Command Injection"}]}]},"references":{"reference_data":[{"name":"JVN#55263945","refsource":"JVN","url":"https://jvn.jp/en/jp/JVN55263945/index.html"},{"name":"https://www.ricoh.com/info/2018/1127_1.html","refsource":"MISC","url":"https://www.ricoh.com/info/2018/1127_1.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T10:17:38.273Z"},"title":"CVE Program Container","references":[{"name":"JVN#55263945","tags":["third-party-advisory","x_refsource_JVN","x_transferred"],"url":"https://jvn.jp/en/jp/JVN55263945/index.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.ricoh.com/info/2018/1127_1.html"}]}]},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2018-16184","datePublished":"2019-01-09T22:00:00.000Z","dateReserved":"2018-08-30T00:00:00.000Z","dateUpdated":"2024-08-05T10:17:38.273Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}