cups-lpd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cups-lpd package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Authentication

<1:2.2.6-33.el8_2.3
  • H
Improper Authentication

<1:2.2.6-45.el8_6.6
  • H
Improper Authentication

<1:2.2.6-45.el8_6.6
  • H
Improper Authentication

<1:2.2.6-45.el8_6.6
  • H
Improper Authentication

<1:2.2.6-38.el8_4.3
  • H
Improper Authentication

<1:2.2.6-51.el8_8.5
  • H
Improper Authentication

<1:2.2.6-51.el8_8.5
  • H
Improper Authentication

<1:2.2.6-63.el8_10
  • M
NULL Pointer Dereference

*
  • L
Arbitrary Command Injection

<1:2.2.6-62.el8_10
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-60.el8_10
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Heap-based Buffer Overflow

*
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-28.el8_1.2
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • M
Use After Free

<1:2.2.6-54.el8_9
  • M
Out-of-Bounds

<1:2.2.6-54.el8_9
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-28.el8_1.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Incorrect Default Permissions

*
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8