Количество 9
Количество 9
CVE-2023-4504
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
CVE-2023-4504
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
CVE-2023-4504
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
CVE-2023-4504
CVE-2023-4504
Due to failure in validating the length provided by an attacker-crafte ...
BDU:2023-06408
Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
SUSE-SU-2023:3707-1
Security update for cups
ROS-20240729-08
Уязвимость cups
SUSE-SU-2023:3706-1
Security update for cups
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-4504 Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | CVSS3: 7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-4504 Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | CVSS3: 7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-4504 Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | CVSS3: 7 | 0% Низкий | больше 2 лет назад | |
CVSS3: 7 | 0% Низкий | почти 2 года назад | ||
CVE-2023-4504 Due to failure in validating the length provided by an attacker-crafte ... | CVSS3: 7 | 0% Низкий | больше 2 лет назад | |
BDU:2023-06408 Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
SUSE-SU-2023:3707-1 Security update for cups | больше 2 лет назад | |||
ROS-20240729-08 Уязвимость cups | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2023:3706-1 Security update for cups | больше 2 лет назад |
Уязвимостей на страницу