Search for vulnerabilities
Vulnerability details: VCID-8mdh-jvmn-aaak
Vulnerability ID VCID-8mdh-jvmn-aaak
Aliases CVE-2010-2431
Summary The cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to overwrite arbitrary files via a symlink attack on the (1) /var/cache/cups/remote.cache or (2) /var/cache/cups/job.cache file.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2010:0811
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2010-2431
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2010-2431
Reference id Reference type URL
http://cups.org/articles.php?L596
http://cups.org/str.php?L3510
http://rhn.redhat.com/errata/RHSA-2010-0811.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2431.json
https://api.first.org/data/v1/epss?cve=CVE-2010-2431
https://bugzilla.redhat.com/show_bug.cgi?id=605397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431
http://secunia.com/advisories/43521
http://security.gentoo.org/glsa/glsa-201207-10.xml
http://www.debian.org/security/2011/dsa-2176
http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
http://www.vupen.com/english/advisories/2010/2856
http://www.vupen.com/english/advisories/2011/0535
cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
CVE-2010-2431 https://nvd.nist.gov/vuln/detail/CVE-2010-2431
GLSA-201207-10 https://security.gentoo.org/glsa/201207-10
RHSA-2010:0811 https://access.redhat.com/errata/RHSA-2010:0811
No exploits are available.
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-2431
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.05275
EPSS Score 0.0003
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.