2025-02-13 18:49:43
Lexmark
PUBLISHED
The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem.