Vulnerabilities (CVE)

Filtered by vendor Lexmark Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24935 1 Lexmark 2 Lexmark, Lexmark Firmware 2023-08-08 5.0 MEDIUM 7.5 HIGH
Lexmark products through 2022-02-10 have Incorrect Access Control.
CVE-2022-29850 1 Lexmark 234 B2236, B2236 Firmware, B2338 and 231 more 2023-08-08 N/A 8.1 HIGH
Various Lexmark products through 2022-04-27 allow an attacker who has already compromised an affected Lexmark device to maintain persistence across reboots.
CVE-2021-44737 1 Lexmark 467 6500e, 6500e Firmware, B2236 and 464 more 2022-02-15 5.0 MEDIUM 7.5 HIGH
PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files.
CVE-2021-35449 1 Lexmark 4 G2 Driver, G3 Driver, G4 Driver and 1 more 2021-09-20 7.2 HIGH 7.8 HIGH
The Lexmark Universal Print Driver version 2.15.1.0 and below, G2 driver 2.7.1.0 and below, G3 driver 3.2.0.0 and below, and G4 driver 4.2.1.0 and below are affected by a privilege escalation vulnerability. A standard low priviliged user can use the driver to execute a DLL of their choosing during the add printer process, resulting in escalation of privileges to SYSTEM.
CVE-2019-9931 1 Lexmark 142 6500e, 6500e Firmware, C734 and 139 more 2021-07-21 7.8 HIGH 7.5 HIGH
Various Lexmark printers contain a denial of service vulnerability in the SNMP service that can be exploited to crash the device.
CVE-2018-18894 1 Lexmark 98 6500e, 6500e Firmware, C748 and 95 more 2020-03-20 5.0 MEDIUM 7.5 HIGH
Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.
CVE-2016-1487 1 Lexmark 1 Markvision Enterprise 2020-03-10 6.8 MEDIUM 8.8 HIGH
Lexmark Markvision Enterprise before 2.3.0 misuses the Apache Commons Collections Library, leading to remote code execution because of Java deserialization.
CVE-2011-3269 1 Lexmark 168 25xxn, 25xxn Firmware, 6500e and 165 more 2020-03-10 5.0 MEDIUM 7.5 HIGH
Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.
CVE-2014-8742 1 Lexmark 1 Markvision Enterprise 2020-01-29 7.8 HIGH 7.5 HIGH
Directory traversal vulnerability in the ReportDownloadServlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2019-16758 1 Lexmark 2 Services Monitor, Services Monitor Firmware 2019-12-19 5.0 MEDIUM 7.5 HIGH
In Lexmark Services Monitor 2.27.4.0.39 (running on TCP port 2070), a remote attacker can use a directory traversal technique using /../../../ or ..%2F..%2F..%2F to obtain local files on the host operating system.
CVE-2017-2821 1 Lexmark 1 Perceptive Document Filters 2017-09-07 6.8 MEDIUM 8.8 HIGH
An exploitable use-after-free exists in the PDF parsing functionality of Lexmark Perspective Document Filters 11.3.0.2400 and 11.4.0.2452. A crafted PDF document can lead to a use-after-free resulting in direct code execution.
CVE-2017-2822 1 Lexmark 1 Perceptive Document Filters 2017-09-07 6.8 MEDIUM 8.8 HIGH
An exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400. A specifically crafted PDF can cause a function call on a corrupted DCTStream to occur, resulting in user controlled data being written to the stack. A maliciously crafted PDF file can be used to trigger this vulnerability.
CVE-2016-4335 1 Lexmark 1 Perceptive Document Filters 2017-01-11 6.8 MEDIUM 8.4 HIGH
An exploitable buffer overflow exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a stack based buffer overflow resulting in remote code execution.
CVE-2016-5646 1 Lexmark 1 Perceptive Document Filters 2017-01-10 6.8 MEDIUM 7.8 HIGH
An exploitable heap overflow vulnerability exists in the Compound Binary File Format (CBFF) parser functionality of Lexmark Perceptive Document Filters library. A specially crafted CBFF file can cause a code execution. An attacker can send a malformed file to trigger this vulnerability.