
CVE-2002-1366
https://notcve.org/view.php?id=CVE-2002-1366
26 Dec 2002 — Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html •

CVE-2002-1368 – CUPS 1.1.x - Negative Length HTTP Header
https://notcve.org/view.php?id=CVE-2002-1368
20 Dec 2002 — Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding. • https://www.exploit-db.com/exploits/22106 •

CVE-2002-1383
https://notcve.org/view.php?id=CVE-2002-1383
20 Dec 2002 — Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun. Múltiples desbordamientos de enteros en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 permiten a atacantes remotos ejecutar código arbitrario mediante el interfaz HTTP CUPSd, como ha sido demostrado por vanilla-coke, y el código ... • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt •

CVE-2002-0063
https://notcve.org/view.php?id=CVE-2002-0063
08 Mar 2002 — Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values. El desbordamiento del búfer en la función ippRead de CUPS anteriores a la 1.1.14 podrían permitir a atacantes ejecutar código arbitrario mediante valores largos en los atributos 'names' o 'language'. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-008.0.txt •

CVE-2001-1333
https://notcve.org/view.php?id=CVE-2001-1333
10 May 2001 — Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 •

CVE-2001-1332
https://notcve.org/view.php?id=CVE-2001-1332
10 May 2001 — Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 •

CVE-2001-0194
https://notcve.org/view.php?id=CVE-2001-0194
03 May 2001 — Buffer overflow in httpGets function in CUPS 1.1.5 allows remote attackers to execute arbitrary commands via a long input line. • http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-020.php3 •