Логотип exploitDog
bind:"CVE-2017-18190" OR bind:"CVE-2019-8675" OR bind:"CVE-2019-8696"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-18190" OR bind:"CVE-2019-8675" OR bind:"CVE-2019-8696"

Количество 27

Количество 27

oracle-oval логотип

ELSA-2020-3864

больше 5 лет назад

ELSA-2020-3864: cups security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2575-1

около 6 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2573-1

около 6 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3057-1

около 6 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3030-1

около 6 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14229-1

около 6 лет назад

Security update for cups

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1765

почти 6 лет назад

ELSA-2020-1765: cups security and bug fix update (LOW)

EPSS: Низкий
ubuntu логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-18190

почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0618-1

почти 8 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0604-1

почти 8 лет назад

Security update for cups

EPSS: Низкий
github логотип

GHSA-vfqc-qhm9-65mm

больше 3 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2018-01423

почти 8 лет назад

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-8696

больше 5 лет назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-8696

больше 6 лет назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 3.5
EPSS: Низкий
nvd логотип

CVE-2019-8696

больше 5 лет назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-8696

больше 5 лет назад

A buffer overflow issue was addressed with improved memory handling. T ...

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2019-8675

больше 5 лет назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-3864

ELSA-2020-3864: cups security and bug fix update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2575-1

Security update for cups

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2573-1

Security update for cups

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3057-1

Security update for cups

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3030-1

Security update for cups

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14229-1

Security update for cups

около 6 лет назад
oracle-oval логотип
ELSA-2020-1765

ELSA-2020-1765: cups security and bug fix update (LOW)

почти 6 лет назад
ubuntu логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 5.8
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0618-1

Security update for cups

1%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0604-1

Security update for cups

1%
Низкий
почти 8 лет назад
github логотип
GHSA-vfqc-qhm9-65mm

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-01423

Уязвимость сервера печати CUPS, связанная с возможностью выполнения произвольных IPP-команд, позволяющая пользователю нарушить целостность данных

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2019-8696

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-8696

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 3.5
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-8696

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-8696

A buffer overflow issue was addressed with improved memory handling. T ...

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-8675

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

CVSS3: 8.8
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу