Filter
AND

Apple CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

First published (updated )

Apple CUPSCUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port i…

7.5
First published (updated )

cups-browsed vulnerable to DDoS amplification attack

First published (updated )

Apple CUPSA remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) an…

First published (updated )

ubuntu/cupsCUPS vulnerable to use-after-free in cupsdAcceptClient()

7.7
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

macOS YosemiteCUPS. A logic issue was addressed with improved state management.

7.8
First published (updated )

Debian Debian Linuxcups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could p…

First published (updated )

Apple CUPSInfoleak

First published (updated )

Apple CUPSThe sandbox profile dynamically generated by cupsdCreateProfile() unintentionally allows write acces…

First published (updated )

debian/cupsInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian Debian LinuxLast updated 24 July 2024

7.5
First published (updated )

Apple CUPSThe following flaw was found in CUPS: Cupsd uses reference-counted strings with global scope. When …

First published (updated )

Apple CUPSBuffer Overflow

First published (updated )

Apple CUPSThe web interface in CUPS before 2.0 does not check that files have world-readable permissions, whic…

First published (updated )

Apple CUPSCUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (…

1.9
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Ubuntu LinuxThe web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a sym…

1.5
First published (updated )

Apple CUPSThe web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files vi…

1.2
First published (updated )

Apple CUPSXSS

First published (updated )

Apple CUPSIt was reported that ANSI escape sequences could be added to printer names in CUPS. Becaue CUPS has…

First published (updated )

Apple CUPSlppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read porti…

1.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple CUPSCUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web int…

7.2
First published (updated )

Apple CUPSBuffer Overflow

First published (updated )

SWI-Prolog SWI-PrologBuffer Overflow

First published (updated )

Apple CUPSUse After Free

First published (updated )

Apple CUPSThe cupsDoAuthentication function in auth.c in the client in CUPS before 1.4.4, when HAVE_GSSAPI is …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple CUPSThe cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to over…

2.6
First published (updated )

Apple CUPSQuoting from the upstream bug report <a href="http://cups.org/str.php?L3510">http://cups.org/str.php…

First published (updated )

Apple CUPSBuffer Overflow

First published (updated )

XpdfNull Pointer Dereference

7.5
First published (updated )

Apple CUPSNull Pointer Dereference

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203