Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple cups vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0382
Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 with unknown impact, possibly related to a configuration file setting.
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3.3
NA
CVE-2009-2807
Heap-based buffer overflow in the USB backend in CUPS in Apple Mac OS X 10.5.8 allows local users to gain privileges via unspecified vectors.
Apple Mac Os X 10.5.8
Apple Mac Os X Server 10.5.8
NA
CVE-2007-5848
Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
Apple Mac Os X 10.4.11
NA
CVE-2002-1267
Mac OS X 10.2.2 allows remote malicious users to cause a denial of service by accessing the CUPS Printing Web Administration utility, aka "CUPS Printing Web Administration is Remotely Accessible."
Apple Mac Os X 10.2.2
NA
CVE-2010-3702
The Gfx::getPos function in the PDF parser in xpdf prior to 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent malicious users to cause a denial of service (crash) via unknown vectors that trigg...
Apple Cups
Freedesktop Poppler
Xpdfreader Xpdf
Xpdfreader Xpdf 3.02
Fedoraproject Fedora 12
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Opensuse Opensuse 11.1
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
NA
CVE-2009-0195
Heap-based buffer overflow in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9, and probably other products, allows remote malicious users to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
Glyphandcog Xpdfreader
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 0.6
Foolabs Xpdf 0.5a
Foolabs Xpdf 0.92c
Foolabs Xpdf 0.92d
Glyphandcog Xpdfreader 2.02
Glyphandcog Xpdfreader 2.00
Glyphandcog Xpdfreader 3.00
Apple Cups 1.3.9
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 0.92
Glyphandcog Xpdfreader 0.91
Foolabs Xpdf 0.92e
Glyphandcog Xpdfreader 1.00
Glyphandcog Xpdfreader 1.01
Foolabs Xpdf 0.93b
Glyphandcog Xpdfreader 0.93
Glyphandcog Xpdfreader 0.80
Foolabs Xpdf 0.7a
Glyphandcog Xpdfreader 0.5
NA
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9