Search for packages
purl | pkg:deb/ubuntu/cups@2.2.9-1 |
Next non-vulnerable version | 2.3.1-9ubuntu1.1 |
Latest non-vulnerable version | 2.3.1-9ubuntu1.1 |
Risk | 3.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-3dsn-2jt3-aaak
Aliases: CVE-2018-4300 |
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10. |
Affected by 0 other vulnerabilities. |
VCID-cs84-z94n-aaac
Aliases: CVE-2019-2228 |
In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196 |
Affected by 2 other vulnerabilities. Affected by 3 other vulnerabilities. |
VCID-hcxc-ggtu-aaaf
Aliases: CVE-2020-3898 |
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges. |
Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-qmhw-fw7n-aaah
Aliases: CVE-2019-2180 |
In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|