3 results (0.004 seconds)

CVSS: 10.0EPSS: 8%CPEs: 472EXPL: 0

20 Jan 2022 — Embedded web server input sanitization vulnerability in Lexmark devices through 2021-12-07, which can which can lead to remote code execution on the device. Una vulnerabilidad en el saneo de entradas del servidor web integrado en los dispositivos Lexmark versiones hasta 07-12-2021, que puede conllevar a una ejecución de código remota en el dispositivo This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not re... • https://support.lexmark.com/alerts • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 472EXPL: 0

20 Jan 2022 — PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files. Una vulnerabilidad de salto de directorios PJL en dispositivos Lexmark versiones hasta 07-12-2021 que puede ser aprovechada para sobrescribir archivos de configuración internos This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability... • https://support.lexmark.com/alerts • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 0%CPEs: 472EXPL: 0

20 Jan 2022 — Buffer overflow vulnerability has been identified in Lexmark devices through 2021-12-07 in postscript interpreter. Se ha identificado una vulnerabilidad de desbordamiento del búfer en los dispositivos Lexmark versiones hasta 07-12-2021, en el intérprete de postscript This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of P... • https://support.lexmark.com/alerts • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •