Page 21 of 103 results (0.003 seconds)

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000386 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3 •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 0

Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000386 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in httpGets function in CUPS 1.1.5 allows remote attackers to execute arbitrary commands via a long input line. • http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-020.php3 http://www.osvdb.org/6064 https://exchange.xforce.ibmcloud.com/vulnerabilities/6043 •