Логотип exploitDog
bind:"CVE-2017-18190"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-18190"

Количество 9

Количество 9

ubuntu логотип

CVE-2017-18190

около 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2017-18190

около 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2017-18190

около 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-18190

около 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0618-1

около 8 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0604-1

около 8 лет назад

Security update for cups

EPSS: Низкий
github логотип

GHSA-vfqc-qhm9-65mm

почти 4 года назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2018-01423

около 8 лет назад

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2020-3864

больше 5 лет назад

ELSA-2020-3864: cups security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
1%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
около 8 лет назад
debian логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
1%
Низкий
около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0618-1

Security update for cups

1%
Низкий
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0604-1

Security update for cups

1%
Низкий
около 8 лет назад
github логотип
GHSA-vfqc-qhm9-65mm

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
почти 4 года назад
fstec логотип
BDU:2018-01423

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
1%
Низкий
около 8 лет назад
oracle-oval логотип
ELSA-2020-3864

ELSA-2020-3864: cups security and bug fix update (MODERATE)

больше 5 лет назад

Уязвимостей на страницу