Vulnerabilities > Canon > Lbp621C Firmware > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-11 | CVE-2023-0856 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in IPP sides attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |
2023-05-11 | CVE-2023-0855 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in IPP number-up attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |
2023-05-11 | CVE-2023-0854 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in NetBIOS QNAME registering and communication process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |
2023-05-11 | CVE-2023-0853 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in mDNS NSEC record registering process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |
2023-05-11 | CVE-2023-0852 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |
2023-05-11 | CVE-2023-0851 | Out-of-bounds Write vulnerability in Canon products Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. | 9.8 |