Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lexmark e250 vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2013-6033
Multiple cross-site scripting (XSS) vulnerabilities on Lexmark W840 through LS.HA.P252, T64x before LS.ST.P344, C935dn through LC.JO.P091, C920 through LS.TA.P152, C53x through LS.SW.P069, C52x through LS.FA.P150, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through...
Lexmark E450
Lexmark C52x
Lexmark C53x
Lexmark C920
Lexmark C935dn
Lexmark E350
Lexmark W840
Lexmark E250
Lexmark T64x
10
CVSSv2
CVE-2013-6032
cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 ...
Lexmark X85x
Lexmark X644
Lexmark X646
Lexmark X642
Lexmark W840
Lexmark N4050e
Lexmark N70xxe
Lexmark E450
Lexmark E350
Lexmark C78x
Lexmark X78x
Lexmark C77x
Lexmark X772
Lexmark X94x
Lexmark X64xef
Lexmark C920
Lexmark C53x
Lexmark 25xxn
Lexmark T64x
Lexmark C935dn
Lexmark C52x
Lexmark N4000
7.8
CVSSv2
CVE-2010-0101
The embedded HTTP server in multiple Lexmark laser and inkjet printers and MarkNet devices, including X94x, W840, T656, N4000, E462, C935dn, 25xxN, and other models, allows remote malicious users to cause a denial of service (operating system halt) via a malformed HTTP Authorizat...
Lexmark X86x
Lexmark X85x
Lexmark X782e
Lexmark X772e
Lexmark X73x
Lexmark W840
Lexmark W850
Lexmark T656
Lexmark T650
Lexmark E360d
Lexmark C935dn
Lexmark C920
Lexmark C78x
Lexmark E350
Lexmark E34x
Lexmark E33x
Lexmark X642
Lexmark X546
Lexmark X543
Lexmark X544
Lexmark N4050e
Lexmark N70xxe
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started