Lexmark Various vulnerabilities
5 known vulnerabilities affecting lexmark/various.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH1
Vulnerabilities
Page 1 of 1
CVE-2023-50733HIGHCVSS 8.6≤ 230.2112025-01-21
CVE-2023-50733 [HIGH] CWE-20 CVE-2023-50733: A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Web Services feature o
A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Web Services feature of newer
Lexmark devices.
cvelistv5nvd
CVE-2023-50737CRITICALCVSS 9.1vvarious2024-02-28
CVE-2023-50737 [CRITICAL] CWE-20 CVE-2023-50737: The SE menu contains information used by Lexmark to diagnose device errors. A vulnerability in one o
The SE menu contains information used by Lexmark to diagnose device errors. A vulnerability in one of the SE menu routines can be leveraged by an attacker to execute arbitrary code.
cvelistv5nvd
CVE-2023-50734CRITICALCVSS 9.0vvarious2024-02-28
CVE-2023-50734 [CRITICAL] CWE-121 CVE-2023-50734: A buffer overflow vulnerability has been identified in PostScript interpreter in various Lexmark dev
A buffer overflow vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
cvelistv5nvd
CVE-2023-50736CRITICALCVSS 9.0vvarious2024-02-28
CVE-2023-50736 [CRITICAL] CWE-131 CVE-2023-50736: A memory corruption vulnerability has been identified in PostScript interpreter in various Lexmark d
A memory corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
cvelistv5nvd
CVE-2023-50735CRITICALCVSS 9.0vvarious2024-02-28
CVE-2023-50735 [CRITICAL] CWE-465 CVE-2023-50735: A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark dev
A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
cvelistv5nvd