Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cups vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-0882
Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipula...
Cups Cups 1.3.5
4.3
CVSSv2
CVE-2008-1722
Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow malicious users to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.
Cups Cups 1.3
7.5
CVSSv2
CVE-2005-4873
Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent malicious users to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.
Cups Cups 1.1.23
9.3
CVSSv2
CVE-2008-0047
Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote malicious users to execute arbitrary code via crafted search expressions.
Cups Cups 1.3.5
6.2
CVSSv2
CVE-2002-1366
Common Unix Printing System (CUPS) 1.1.14 up to and including 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.4
Easy Software Products Cups 1.1.13
Easy Software Products Cups 1.1.14
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.6
Easy Software Products Cups 1.1.7
Apple Mac Os X 10.2
Apple Mac Os X 10.2.2
7.2
CVSSv2
CVE-2002-1384
Integer overflow in pdftops, as used in Xpdf 2.01 and previous versions, xpdf-i, and CUPS prior to 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.4
Easy Software Products Cups 1.1.4 2
Xpdf Xpdf 1.0a
Xpdf Xpdf 1.1
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.4 3
Easy Software Products Cups 1.1.4 5
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.13
Easy Software Products Cups 1.1.6
Easy Software Products Cups 1.1.7
Xpdf Xpdf 0.90
Easy Software Products Cups 1.1.14
Easy Software Products Cups 1.1.17
Xpdf Xpdf 0.91
Xpdf Xpdf 1.0
7.5
CVSSv2
CVE-2009-1182
Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9 and previous versions, Poppler prior to 0.10.6, and other products allow remote malicious users to execute arbitrary code via a crafted PDF file.
Glyphandcog Xpdfreader
Glyphandcog Xpdfreader 1.01
Foolabs Xpdf 1.00a
Foolabs Xpdf 0.92d
Foolabs Xpdf 0.92c
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 0.80
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 0.2
Glyphandcog Xpdfreader 2.03
Glyphandcog Xpdfreader 2.02
Foolabs Xpdf 0.93b
Foolabs Xpdf 0.93a
Glyphandcog Xpdfreader 0.92
Foolabs Xpdf 0.91c
Foolabs Xpdf 0.91b
Glyphandcog Xpdfreader 0.6
Foolabs Xpdf 0.5a
Glyphandcog Xpdfreader 3.00
Glyphandcog Xpdfreader 3.01
Glyphandcog Xpdfreader 1.00
Foolabs Xpdf 0.93c
4.3
CVSSv2
CVE-2009-1183
The JBIG2 MMR decoder in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9 and previous versions, Poppler prior to 0.10.6, and other products allows remote malicious users to cause a denial of service (infinite loop and hang) via a crafted PDF file.
Foolabs Xpdf 0.91c
Foolabs Xpdf 0.91b
Foolabs Xpdf 0.93b
Foolabs Xpdf 1.00a
Foolabs Xpdf 0.91a
Foolabs Xpdf 0.92e
Foolabs Xpdf 0.5a
Foolabs Xpdf 0.92b
Foolabs Xpdf 0.93c
Foolabs Xpdf 0.92c
Foolabs Xpdf 0.7a
Foolabs Xpdf 0.93a
Foolabs Xpdf 0.92d
Foolabs Xpdf 0.92a
Glyphandcog Xpdfreader 0.2
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 0.5
Glyphandcog Xpdfreader 0.6
Glyphandcog Xpdfreader 0.80
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 1.00
4.3
CVSSv2
CVE-2009-0799
The JBIG2 decoder in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9 and previous versions, Poppler prior to 0.10.6, and other products allows remote malicious users to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
Glyphandcog Xpdfreader 3.00
Glyphandcog Xpdfreader 3.01
Glyphandcog Xpdfreader 1.00
Foolabs Xpdf 0.93c
Foolabs Xpdf 0.92b
Foolabs Xpdf 0.92a
Glyphandcog Xpdfreader 0.92
Foolabs Xpdf 0.7a
Glyphandcog Xpdfreader 0.7
Glyphandcog Xpdfreader 2.01
Glyphandcog Xpdfreader 2.00
Glyphandcog Xpdfreader 0.93
Foolabs Xpdf 0.92e
Foolabs Xpdf 0.91a
Glyphandcog Xpdfreader 0.91
Glyphandcog Xpdfreader 0.5
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 2.03
Glyphandcog Xpdfreader 2.02
Foolabs Xpdf 0.93b
Foolabs Xpdf 0.93a
Foolabs Xpdf 0.91c
6.8
CVSSv2
CVE-2009-0800
Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and previous versions, CUPS 1.3.9 and previous versions, Poppler prior to 0.10.6, and other products allow remote malicious users to execute arbitrary code via a crafted PDF file.
Foolabs Xpdf 0.91c
Foolabs Xpdf 0.91b
Foolabs Xpdf 0.93b
Foolabs Xpdf 1.00a
Foolabs Xpdf 0.91a
Foolabs Xpdf 0.92e
Foolabs Xpdf 0.5a
Foolabs Xpdf 0.92b
Foolabs Xpdf 0.93c
Foolabs Xpdf 0.92c
Foolabs Xpdf 0.7a
Foolabs Xpdf 0.93a
Foolabs Xpdf 0.92d
Foolabs Xpdf 0.92a
Glyphandcog Xpdfreader 0.2
Glyphandcog Xpdfreader 0.3
Glyphandcog Xpdfreader 0.4
Glyphandcog Xpdfreader 0.5
Glyphandcog Xpdfreader 0.6
Glyphandcog Xpdfreader 0.80
Glyphandcog Xpdfreader 0.90
Glyphandcog Xpdfreader 1.00
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »