Vulnerabilities > Lexmark > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-20 | CVE-2021-44736 | Improper Authentication vulnerability in Lexmark Mc3224I Firmware The initial admin account setup wizard on Lexmark devices allow unauthenticated access to the “out of service erase” feature. | 9.8 |
2022-01-20 | CVE-2021-44738 | Classic Buffer Overflow vulnerability in Lexmark products Buffer overflow vulnerability has been identified in Lexmark devices through 2021-12-07 in postscript interpreter. | 9.8 |
2020-03-09 | CVE-2016-6918 | Unrestricted Upload of File with Dangerous Type vulnerability in Lexmark Markvision Enterprise 2.1/2.3.0 Lexmark Markvision Enterprise (MVE) before 2.4.1 allows remote attackers to execute arbitrary commands by uploading files. | 9.8 |
2020-01-27 | CVE-2014-8741 | Path Traversal vulnerability in Lexmark Markvision Enterprise Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors. | 9.8 |
2019-08-28 | CVE-2019-9933 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark products have a Buffer Overflow (issue 3 of 3). | 9.8 |
2019-08-28 | CVE-2019-9932 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark products have a Buffer Overflow (issue 2 of 3). | 9.8 |
2019-08-28 | CVE-2019-9930 | Integer Overflow or Wraparound vulnerability in Lexmark products Various Lexmark products have an Integer Overflow. | 9.8 |
2019-08-28 | CVE-2019-10058 | Unspecified vulnerability in Lexmark products Various Lexmark products have Incorrect Access Control. | 9.1 |
2019-06-28 | CVE-2018-15519 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark devices have a Buffer Overflow (issue 1 of 2). | 9.8 |
2019-06-28 | CVE-2018-15520 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark devices have a Buffer Overflow (issue 2 of 2). | 9.8 |