IoTSec Pulse
Home
Resources
Submit
Sign In
Home
Resources
Book
From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
View on Amazon
Explore Awesome IoT Security Insights
One-stop hub for IoT security insights, analyses, tools and more.
Search Help
Query Filter Values
Built with
Dirstarter
© 2025 IoTSec Pulse. All rights reserved.
Privacy Policy
Terms of Service
Sitemap
2024-09-27
Pwn2Own
Let's PWN WTM!
Lexmark
Printer
2024-09-27
2024-09-23
firmware
Retrofitting encrypted firmware is a Bad Idea
Lexmark
Printer
2024-09-23
2023-10-12
Pwn2Own
Exploiting the Lexmark PostScript Stack
Lexmark
Printer
2023-10-12
2023-08-24
slides
Pwn2Own
Exploiting the Lexmark PostScript Stack
Lexmark
Printer
2023-08-24
2023-08-11
CVE-2021-44737
slides
Pwn2Own
SysPWN - VR for Pwn2Own
Ubiquiti
Lexmark
Router
Printer
2023-08-11
2023-01-10
Pwn2Own
Lexmark printer stuff
Lexmark
Printer
2023-01-10
2022-10-27
CVE-2021-44737
CVE-2022-29850
Pwn2Own
PJL
Toner Deaf - Printing your next persistence
Lexmark
Printer
2022-10-27
2022-10-15
CVE-2021-44737
CVE-2022-29850
slides
Pwn2Own
PJL
Toner Deaf - Printing your next persistence
Lexmark
Printer
2022-10-15
2022-08-30
slides
Pwn2Own
Remotely Exploiting 3 Embedded Devices Pwn2Own 2021
NETGEAR
Western Digital
Lexmark
Router
NAS
Printer
2022-08-30
2022-02-18
CVE-2021-44737
Pwn2Own
PJL
Analyzing a PJL Directory Traversal Vulnerability: Exploiting the Lexmark MC3224i Printer - Part 2
Lexmark
Printer
2022-02-18
2022-02-17
Pwn2Own
firmware
Bypassing Software Update Package Encryption: Extracting the Lexmark MC3224i Printer Firmware - Part 1
Lexmark
Printer
2022-02-17
You've reached the end