Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple cups vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-0382
Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 with unknown impact, possibly related to a configuration file setting.
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3.3
7.2
CVSSv2
CVE-2009-2807
Heap-based buffer overflow in the USB backend in CUPS in Apple Mac OS X 10.5.8 allows local users to gain privileges via unspecified vectors.
Apple Mac Os X 10.5.8
Apple Mac Os X Server 10.5.8
7.2
CVSSv2
CVE-2007-5848
Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
Apple Mac Os X 10.4.11
5
CVSSv2
CVE-2002-1267
Mac OS X 10.2.2 allows remote malicious users to cause a denial of service by accessing the CUPS Printing Web Administration utility, aka "CUPS Printing Web Administration is Remotely Accessible."
Apple Mac Os X 10.2.2
7.5
CVSSv2
CVE-2010-3702
The Gfx::getPos function in the PDF parser in xpdf prior to 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent malicious users to cause a denial of service (crash) via unknown vectors that trigg...
Apple Cups
Freedesktop Poppler
Xpdfreader Xpdf
Xpdfreader Xpdf 3.02
Fedoraproject Fedora 12
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Opensuse Opensuse 11.1
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
6.8
CVSSv2
CVE-2009-0195
Heap-based buffer overflow in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9, and probably other products, allows remote malicious users to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
Glyphandcog Xpdfreader
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 0.6
Foolabs Xpdf 0.5a
Foolabs Xpdf 0.92c
Foolabs Xpdf 0.92d
Glyphandcog Xpdfreader 2.02
Glyphandcog Xpdfreader 2.00
Glyphandcog Xpdfreader 3.00
Apple Cups 1.3.9
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 0.92
Glyphandcog Xpdfreader 0.91
Foolabs Xpdf 0.92e
Glyphandcog Xpdfreader 1.00
Glyphandcog Xpdfreader 1.01
Foolabs Xpdf 0.93b
Glyphandcog Xpdfreader 0.93
Glyphandcog Xpdfreader 0.80
Foolabs Xpdf 0.7a
Glyphandcog Xpdfreader 0.5
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9