Apple CUPS 2.0.4

CPE Details

Apple CUPS 2.0.4
2.0.4
2018-10-29 12:34 +00:00
2018-10-29 12:34 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:apple:cups:2.0.4:*:*:*:*:*:*:*

Informations

Vendor

apple

Product

cups

Version

2.0.4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-26691 2022-05-26 15:47 +00:00 A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.
6.7
MEDIUM
CVE-2018-4300 2019-04-03 15:54 +00:00 The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
5.9
MEDIUM
CVE-2017-18248 2018-03-26 15:00 +00:00 The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
5.3
MEDIUM
CVE-2017-18190 2018-02-16 16:00 +00:00 A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
7.5
HIGH
CVE-2009-0032 2009-01-27 19:00 +00:00 CUPS on Mandriva Linux 2008.0, 2008.1, 2009.0, Corporate Server (CS) 3.0 and 4.0, and Multi Network Firewall (MNF) 2.0 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file.
6.9
CVE-2008-1033 2008-06-02 12:00 +00:00 The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."
2.1
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.