cups-libs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cups-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Arbitrary Command Injection

*
  • H
Information Exposure

<1:1.6.3-52.el7_9
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Improper Access Control

<1:1.6.3-51.el7
  • M
Session Fixation

<1:1.6.3-43.el7
  • M
Use of Insufficiently Random Values

<1:1.6.3-43.el7
  • M
Incorrect Privilege Assignment

<1:1.6.3-43.el7
  • M
External Control of Critical State Data

<1:1.6.3-43.el7
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Insecure Inherited Permissions

*
  • M
Heap-based Buffer Overflow

*
  • H
Information Exposure

<1:1.6.3-52.el7_9
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Cross-site Scripting (XSS)

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Security Features

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • H
Out-of-Bounds

<1:1.6.3-17.el7_1.1
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Link Following

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • M
Cross-site Scripting (XSS)

<1:1.6.3-17.el7
  • L
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
Stack-based Buffer Overflow

<1:1.6.3-51.el7
  • M
External Control of Critical State Data

<1:1.6.3-43.el7
  • M
Session Fixation

<1:1.6.3-43.el7
  • M
Incorrect Privilege Assignment

<1:1.6.3-43.el7
  • M
Use of Insufficiently Random Values

<1:1.6.3-43.el7
  • M
Improper Access Control

<1:1.6.3-51.el7
  • L
Improper Input Validation

*
  • L
Incorrect Default Permissions

*
  • M
Buffer Overflow

*