Apple

Cups

56 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 26.05.2022 18:15:09
  • Last modified 21.11.2024 06:54:19

A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.

  • EPSS 0.69%
  • Published 20.12.2019 15:15:11
  • Last modified 21.11.2024 01:45:48

cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system

  • EPSS 0.38%
  • Published 03.04.2019 18:29:06
  • Last modified 21.11.2024 04:07:09

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

Exploit
  • EPSS 1.14%
  • Published 26.03.2018 17:29:00
  • Last modified 21.11.2024 03:19:40

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

Exploit
  • EPSS 0.7%
  • Published 16.02.2018 17:29:00
  • Last modified 21.11.2024 03:19:31

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost....

  • EPSS 7.36%
  • Published 19.02.2015 15:59:11
  • Last modified 12.04.2025 10:46:40

Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.

  • EPSS 1.62%
  • Published 29.07.2014 14:55:07
  • Last modified 12.04.2025 10:46:40

The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.

  • EPSS 0.05%
  • Published 29.07.2014 14:55:07
  • Last modified 12.04.2025 10:46:40

CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.

  • EPSS 0.05%
  • Published 29.07.2014 14:55:07
  • Last modified 12.04.2025 10:46:40

The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-...

  • EPSS 0.05%
  • Published 23.07.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.