apple/cups vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|apple/cups package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Denial of Service (DoS)

[0,)
  • H
Access Restriction Bypass

[,2.3.6)
  • M
Integer Overflow or Wraparound

[,1.4.0)
  • C
Denial of Service (DoS)

[,1.3.4)
  • C
Incorrect Authorization

[,1.5.4-1.1)
  • M
Information Exposure

[1.0.4_8,1.1.21]
  • M
Information Exposure

[,2.2.10)
  • L
Symlink Attack

[,1.7.5)
  • H
Denial of Service (DoS)

[1.2.4,1.3.3]
  • C
Out-of-Bounds

[,1.3.6)
  • M
Resource Management Errors

[,1.3.10)
  • M
Resource Management Errors

[1.1.17,1.1.22]
  • H
Arbitrary Code Execution

[1.0.4,1.1.17]
  • M
Resource Management Errors

[,1.1.22)
  • H
Improper Input Validation

[,1.6)
  • M
Out-of-Bounds

[,1.3.10)
  • H
NULL Pointer Dereference

[,1.4.0)
  • M
Denial of Service (DoS)

[,1.1.23)
  • M
Out-of-Bounds

[1.0.4_8,1.1.22_rc1]
  • M
Cross-site Scripting (XSS)

[,2.0.3)
  • M
Denial of Service (DoS)

[,1.3.9)
  • H
Symlink Attack

[,1.3.8]
  • M
Integer Overflow or Wraparound

[,1.4.0)
  • H
Resource Management Errors

[,1.4.5)
  • M
Remote Code Execution (RCE)

[1.0.4_8,1.1.22_rc1]
  • M
Out-of-Bounds

[,1.4.4)
  • H
Access Restriction Bypass

[,1.4.4]
  • M
Out-of-Bounds

[0,1.3.6-4.fc8)
  • C
Resource Management Errors

[1.1.22_rc1,1.1.23]
  • M
Improper Input Validation

[,1.3.10)
  • H
Out-of-Bounds

[,1.3.9)
  • M
Out-of-Bounds

[,1.4.7)
  • M
Out-of-Bounds

[,2.0.2)
  • M
Denial of Service (DoS)

[1.0.4_8,1.1.17]
  • M
Resource Management Errors

[1.1.22_rc1,1.1.23]
  • C
Arbitrary Code Execution

[1.0.4_8,1.1.21]
  • M
Denial of Service (DoS)

[1.1.22_rc1,1.1.23]
  • H
Denial of Service (DoS)

[1.0.4_8,1.1.17]
  • M
Symlink Attack

[,1.4.4)
  • M
Denial of Service (DoS)

[,1.3.10)
  • M
Denial of Service (DoS)

[,1.1.17]
  • C
Arbitrary Code Execution

[1.0.4_8,1.1.17]
  • H
Information Exposure

[1.0.4_8,1.1.20]
  • H
Improper Input Validation

[,1.1.20]
  • C
Denial of Service (DoS)

[1.0.4_8,1.1.20]
  • M
CVE-2004-0927

[1.0.4_8,1.1.21]
  • M
Denial of Service (DoS)

[,1.2.0)
  • L
Symlink Attack

[,1.7.4)
  • M
Denial of Service (DoS)

[,1.3.10)
  • M
Resource Management Errors

[1.3.7,1.3.10]
  • L
Symlink Attack

[,1.7.4]
  • C
Arbitrary Code Execution

[1.0.4_8,1.1.17]
  • M
Denial of Service (DoS)

[1.0.4_8,1.1.22_rc1]
  • L
Symlink Attack

[,1.7)
  • M
Resource Management Errors

[,1.3.10)
  • H
Arbitrary Code Execution

[1.0.4_8,1.1.17]
  • M
Resource Management Errors

[,1.1.22)
  • M
Resource Management Errors

[,1.3.10)
  • C
Security Features

[,2.0.3)
  • M
Resource Management Errors

[,1.4.4)
  • M
Denial of Service (DoS)

[1.0.4_8,1.1.22_rc1]
  • M
Resource Management Errors

[,1.3.8)
  • M
Out-of-Bounds

[,1.3.9]
  • C
Out-of-Bounds

[0,1.3.6-2.fc8)
  • M
Denial of Service (DoS)

[,1.2.8)
  • M
Denial of Service (DoS)

[,1.3.10)
  • M
Improper Input Validation

[,1.3.10)
  • H
Arbitrary Code Execution

[,1.1.18)
  • H
Access Restriction Bypass

[1.2.2,1.4.1]
  • M
Denial of Service (DoS)

[1.1.17,1.3.7]
  • C
Resource Management Errors

[,1.3.9)
  • M
CVE-2004-0924

[1.0.4_8,1.1.21]
  • M
Out-of-Bounds

[,1.3.10)
  • M
Denial of Service (DoS)

[,1.2.10]
  • H
Denial of Service (DoS)

[1.1.17,1.3.9]
  • C
Denial of Service (DoS)

[1.0.4_8,1.1.20]
  • M
Resource Management Errors

[,1.4.4)
  • M
Out-of-Bounds

[,1.5)
  • M
Resource Management Errors

[,1.3.10)
  • M
Cross-site Scripting (XSS)

[,1.7.2)
  • H
Out-of-Bounds

[,1.1.23]
  • M
Improper Input Validation

[,2.2.6)
  • M
Resource Management Errors

[,1.3.10)
  • M
Access Restriction Bypass

[,1.4.4)
  • L
Access Restriction Bypass

[,10.5.3)
  • M
Denial of Service (DoS)

[,1.2.10]
  • H
Symlink Attack

[0,)
  • C
Insufficiently Protected Credentials

[,1.3.8)
  • H
Security Features

[,2.2.2)
  • H
Information Exposure

[,1.1.21)
  • H
Out-of-Bounds

[,1.3.10)
  • C
Access Restriction Bypass

[1.0.4_8,1.1.17]
  • M
Improper Input Validation

[0,1.3.7-2.fc8)
  • H
Out-of-Bounds

[,1.3.5]
  • M
Access Restriction Bypass

[,1.7.5)
  • M
Denial of Service (DoS)

[,1.1.19)