Easy Software Products Cups : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-b... oval:org.mitre.oval:def:10830 Vulnerability unix
Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attac... oval:org.mitre.oval:def:10620 Vulnerability unix
Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF f... oval:org.mitre.oval:def:11479 Vulnerability unix
CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local us... oval:org.mitre.oval:def:10710 Vulnerability unix
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass inte... oval:org.mitre.oval:def:9940 Vulnerability unix
CVE-2004-0558 oval:org.opensuse.security:def:20040558 Vulnerability unix
CVE-2004-0888 oval:org.opensuse.security:def:20040888 Vulnerability unix
CVE-2004-0889 oval:org.opensuse.security:def:20040889 Vulnerability unix
CVE-2004-1125 oval:org.opensuse.security:def:20041125 Vulnerability unix
CVE-2004-1267 oval:org.opensuse.security:def:20041267 Vulnerability unix
CVE-2004-1268 oval:org.opensuse.security:def:20041268 Vulnerability unix
CVE-2007-3387 oval:org.opensuse.security:def:20073387 Vulnerability unix
CVE-2008-0596 oval:org.opensuse.security:def:20080596 Vulnerability unix
CVE-2008-0597 oval:org.opensuse.security:def:20080597 Vulnerability unix
CVE-2008-1373 oval:org.opensuse.security:def:20081373 Vulnerability unix
Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows... oval:org.mitre.oval:def:9636 Vulnerability unix
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2... oval:org.mitre.oval:def:11149 Vulnerability unix
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt th... oval:org.mitre.oval:def:10398 Vulnerability unix
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to... oval:org.mitre.oval:def:9545 Vulnerability unix
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lpp... oval:org.mitre.oval:def:11507 Vulnerability unix
Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (me... oval:org.mitre.oval:def:10857 Vulnerability unix
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphic... oval:org.mitre.oval:def:9714 Vulnerability unix
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextra... oval:org.mitre.oval:def:9437 Vulnerability unix
The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause ... oval:org.mitre.oval:def:9303 Vulnerability unix
The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of s... oval:org.mitre.oval:def:11732 Vulnerability unix
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to caus... oval:org.mitre.oval:def:9774 Vulnerability unix
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architecture... oval:org.mitre.oval:def:11107 Vulnerability unix
Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a deni... oval:org.mitre.oval:def:9492 Vulnerability unix
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attacker... oval:org.mitre.oval:def:9575 Vulnerability unix
Total number of results : 29
Page : 1 (This Page)

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html