Логотип exploitDog
bind:"CVE-2017-18190"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-18190"

Количество 9

Количество 9

ubuntu логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0618-1

почти 8 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0604-1

почти 8 лет назад

Security update for cups

EPSS: Низкий
github логотип

GHSA-vfqc-qhm9-65mm

больше 3 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2018-01423

почти 8 лет назад

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2020-3864

больше 5 лет назад

ELSA-2020-3864: cups security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0618-1

Security update for cups

1%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0604-1

Security update for cups

1%
Низкий
почти 8 лет назад
github логотип
GHSA-vfqc-qhm9-65mm

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-01423

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
oracle-oval логотип
ELSA-2020-3864

ELSA-2020-3864: cups security and bug fix update (MODERATE)

больше 5 лет назад

Уязвимостей на страницу