Filter

CUPSA remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) an…

First published (updated )

CUPS (Common UNIX Printing System)Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values o…

7.5
First published (updated )

CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

7.5
First published (updated )

CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

First published (updated )

cups-browsed vulnerable to DDoS amplification attack

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPScups: ownership of /var/log/cups allows the lp user to create files as root

3.3
First published (updated )

CUPS (Common UNIX Printing System)CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows atta…

First published (updated )

redhat/cupsThe CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote…

First published (updated )

Ubuntu LinuxBuffer Overflow, Integer Overflow

First published (updated )

CUPSpstopdf in CUPS 1.3.8 allows local users to overwrite arbitrary files via a symlink attack on the /t…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSBuffer Overflow, Integer Overflow

7.5
First published (updated )

CUPSCSRF

First published (updated )

CUPSNull Pointer Dereference

7.5
First published (updated )

CUPSThe Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to …

First published (updated )

CUPSBuffer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSBuffer Overflow, Integer Overflow

First published (updated )

CUPSInteger Overflow

First published (updated )

CUPSThe scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a prin…

2.1
First published (updated )

CUPSBuffer Overflow

First published (updated )

Ubuntu LinuxUse After Free

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSNull Pointer Dereference

First published (updated )

CUPSThe directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attack…

First published (updated )

CUPSInteger Overflow

First published (updated )

CUPSBuffer Overflow

7.5
First published (updated )

CUPSThe JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, an…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPSThe JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and ot…

First published (updated )

CUPSNull Pointer Dereference

7.5
First published (updated )

CUPSCUPS on Mandriva Linux 2008.0, 2008.1, 2009.0, Corporate Server (CS) 3.0 and 4.0, and Multi Network …

First published (updated )

CUPSThe cupsDoAuthentication function in auth.c in the client in CUPS before 1.4.4, when HAVE_GSSAPI is …

First published (updated )

CUPSThe cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to over…

2.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203