Количество 38
Количество 38
ELSA-2024-7553
ELSA-2024-7553: cups-filters security update (IMPORTANT)
RLSA-2024:7463
Important: cups-filters security update
RLSA-2024:7346
Important: cups-filters security update
ELSA-2024-7463
ELSA-2024-7463: cups-filters security update (IMPORTANT)
ELSA-2024-7346
ELSA-2024-7346: cups-filters security update (IMPORTANT)
SUSE-SU-2024:3711-1
Security update for cups-filters
SUSE-SU-2024:3570-1
Security update for cups-filters
CVE-2024-47176
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVE-2024-47176
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVE-2024-47176
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVE-2024-47176
CUPS is a standards-based, open-source printing system, and `cups-brow ...
SUSE-SU-2024:3863-1
Security update for cups-filters
SUSE-SU-2024:3523-1
Security update for cups-filters
BDU:2024-07643
Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию
CVE-2024-47850
CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
CVE-2024-47850
CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
CVE-2024-47850
CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
CVE-2024-47850
CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
CVE-2024-47850
CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an ar ...
SUSE-SU-2024:3756-1
Security update for cups-filters
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2024-7553 ELSA-2024-7553: cups-filters security update (IMPORTANT) | 12 месяцев назад | |||
RLSA-2024:7463 Important: cups-filters security update | около 1 года назад | |||
RLSA-2024:7346 Important: cups-filters security update | около 1 года назад | |||
ELSA-2024-7463 ELSA-2024-7463: cups-filters security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-7346 ELSA-2024-7346: cups-filters security update (IMPORTANT) | около 1 года назад | |||
SUSE-SU-2024:3711-1 Security update for cups-filters | около 1 года назад | |||
SUSE-SU-2024:3570-1 Security update for cups-filters | около 1 года назад | |||
CVE-2024-47176 CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. | CVSS3: 5.3 | 87% Высокий | около 1 года назад | |
CVE-2024-47176 CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. | CVSS3: 7.5 | 87% Высокий | около 1 года назад | |
CVE-2024-47176 CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. | CVSS3: 5.3 | 87% Высокий | около 1 года назад | |
CVE-2024-47176 CUPS is a standards-based, open-source printing system, and `cups-brow ... | CVSS3: 5.3 | 87% Высокий | около 1 года назад | |
SUSE-SU-2024:3863-1 Security update for cups-filters | около 1 года назад | |||
SUSE-SU-2024:3523-1 Security update for cups-filters | 87% Высокий | около 1 года назад | ||
BDU:2024-07643 Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию | CVSS3: 9 | 87% Высокий | около 1 года назад | |
CVE-2024-47850 CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
CVE-2024-47850 CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
CVE-2024-47850 CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
CVE-2024-47850 CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) | CVSS3: 7.5 | 0% Низкий | 2 месяца назад | |
CVE-2024-47850 CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an ar ... | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
SUSE-SU-2024:3756-1 Security update for cups-filters | 0% Низкий | около 1 года назад |
Уязвимостей на страницу