{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T06:28:31.735","vulnerabilities":[{"cve":{"id":"CVE-2024-11347","sourceIdentifier":"7bc73191-a2b6-4c63-9918-753964601853","published":"2025-02-13T19:15:13.537","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Integer Overflow or Wraparound vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Forced Integer Overflow.The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user."},{"lang":"es","value":"La vulnerabilidad de desbordamiento de enteros o envolvente en Lexmark International CX, XC, CS, et. Al. (módulos de interpretación Postscript) permite un desbordamiento de enteros forzado. Un atacante puede aprovechar la vulnerabilidad para ejecutar código arbitrario como un usuario sin privilegios."}],"metrics":{"cvssMetricV31":[{"source":"7bc73191-a2b6-4c63-9918-753964601853","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}]},"weaknesses":[{"source":"7bc73191-a2b6-4c63-9918-753964601853","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]}],"references":[{"url":"https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html","source":"7bc73191-a2b6-4c63-9918-753964601853"}]}}]}