Filter
17
0
6/23/2004
4/17/2006
2/8/2008
12/2/2009
9/26/2011
7/20/2013
5/13/2015
3/6/2017
12/29/2018
10/22/2020
8/15/2022

CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

First published (updated )

CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

7.5
First published (updated )

cups-browsed vulnerable to DDoS amplification attack

First published (updated )

CUPSA remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) an…

First published (updated )

Apple iOS and macOSCUPS. A logic issue was addressed with improved state management.

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian Linuxcups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could p…

First published (updated )

CUPSInfoleak

First published (updated )

CUPSThe sandbox profile dynamically generated by cupsdCreateProfile() unintentionally allows write acces…

First published (updated )

debian/cupsInput Validation

First published (updated )

Debian LinuxLast updated 24 July 2024

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSThe following flaw was found in CUPS: Cupsd uses reference-counted strings with global scope. When …

First published (updated )

CUPSBuffer Overflow

First published (updated )

CUPSThe web interface in CUPS before 2.0 does not check that files have world-readable permissions, whic…

First published (updated )

CUPSCUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (…

1.9
First published (updated )

UbuntuThe web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a sym…

1.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSThe web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files vi…

1.2
First published (updated )

CUPSXSS

First published (updated )

CUPSIt was reported that ANSI escape sequences could be added to printer names in CUPS. Becaue CUPS has…

First published (updated )

CUPSlppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read porti…

1.2
First published (updated )

CUPSCUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web int…

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSBuffer Overflow

First published (updated )

SWI-PrologBuffer Overflow

First published (updated )

CUPSUse After Free

First published (updated )

CUPSThe cupsDoAuthentication function in auth.c in the client in CUPS before 1.4.4, when HAVE_GSSAPI is …

First published (updated )

CUPSThe cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to over…

2.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSQuoting from the upstream bug report <a href="http://cups.org/str.php?L3510">http://cups.org/str.php…

First published (updated )

CUPSBuffer Overflow

First published (updated )

XpdfNull Pointer Dereference

7.5
First published (updated )

CUPSNull Pointer Dereference

First published (updated )

CUPSCUPS 1.3.x and earlier ships setuid binaries which use environment variables to set the directories …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203