cups-filesystem vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cups-filesystem package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Authentication

<1:1.6.3-52.el7_9.1
  • M
NULL Pointer Dereference

*
  • L
Arbitrary Command Injection

*
  • H
Information Exposure

<1:1.6.3-52.el7_9
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Improper Access Control

<1:1.6.3-51.el7
  • M
Session Fixation

<1:1.6.3-43.el7
  • M
Use of Insufficiently Random Values

<1:1.6.3-43.el7
  • M
Incorrect Privilege Assignment

<1:1.6.3-43.el7
  • M
External Control of Critical State Data

<1:1.6.3-43.el7
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Insecure Inherited Permissions

*
  • M
Heap-based Buffer Overflow

*
  • H
Information Exposure

<1:1.6.3-52.el7_9
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • L
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
External Control of Critical State Data

<1:1.6.3-43.el7
  • M
Session Fixation

<1:1.6.3-43.el7
  • M
Incorrect Privilege Assignment

<1:1.6.3-43.el7
  • M
Use of Insufficiently Random Values

<1:1.6.3-43.el7
  • M
Improper Access Control

<1:1.6.3-51.el7
  • L
Improper Input Validation

*
  • L
Incorrect Default Permissions

*
  • M
Buffer Overflow

*