Vulnerability Database

With exploit

easy_software_products / cups

Title Severity Exploit Date Affected Version
CVE-2005-0206 High Apr 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0888 High Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0889 High Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0923 Low Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0924 Medium Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0926 High Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-0927 Medium Jan 27, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-1125 High Jan 10, 2005 == 1.1.20
CVE-2004-1267 Medium Jan 10, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.22_rc1
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2004-1268 Low Jan 10, 2005 == 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19_rc5
== 1.1.20
== 1.1.21
== 1.1.22_rc1
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7

apple / cups

Title Severity Exploit Date Affected Version
CVE-2014-2856 Low Apr 18, 2014 == 1.1.20
== 1.4-b1
== 1.6.2
== 1.1.5-2
== 1.5.3
== 1.3.9
== 1.1.14
== 1.5.0
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.7.0
== 1.1.12
== 1.3.11
== 1.7.1-b1
== 1.5.2
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.5-b2
== 1.1.16
== 1.4.1
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.6.4
== 1.1.17
== 1.4-rc1
== 1.1.20-rc6
== 1.6.3
== 1.2.4
== 1.1.19-rc1
== 1.7-rc1
== 1.3.2
== 1.4.8
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.4.0
== 1.2.9
== 1.2.10
== 1.4.4
== 1.1.4
== 1.1.23
== 1.4.6
== 1.2.6
== 1.6-b1
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.4.7
== 1.3.10
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.6.1
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
== 1.6-rc1
== 1.4.3
== 1.1.1
== 1.2.8
<= 1.7.1
== 1.2.2
== 1.4.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.5.1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.5.4
== 1.5-rc1
== 1.3.0
== 1.4-b3
== 1.4.5
== 1.5-b1
== 1.4-b2
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2
CVE-2013-6891 Low Jan 26, 2014 <= 1.7.0
== 1.7-rc1
== 1.7.1-b1
CVE-2012-5519 High Nov 20, 2012 == 1.4.4
CVE-2011-2896 Medium Aug 19, 2011 <= 1.4.6
CVE-2011-3170 Medium Aug 19, 2011 == 1.1.20
== 1.4-b1
== 1.1.5-2
== 1.3.9
== 1.1.14
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.1.12
== 1.3.11
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.1.16
== 1.4.1
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.1.17
== 1.4-rc1
== 1.1.20-rc6
== 1.2.4
== 1.1.19-rc1
== 1.3.2
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.4.0
== 1.2.9
== 1.2.10
== 1.4.4
== 1.1.4
== 1.1.23
== 1.4.6
== 1.2.6
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.4.7
== 1.3.10
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
<= 1.4.8
== 1.4.3
== 1.1.1
== 1.2.8
== 1.2.2
== 1.4.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.3.0
== 1.4-b3
== 1.4.5
== 1.4-b2
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2
CVE-2010-3702 High Nov 5, 2010 <= 1.3.11
CVE-2010-2941 Critical Nov 5, 2010 <= 1.4.4
CVE-2010-2431 Low Jun 22, 2010 == 1.1.20
== 1.1.5-2
== 1.3.9
== 1.1.14
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.1.12
<= 1.4.3
== 1.3.11
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.1.16
== 1.4.1
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.1.17
== 1.1.20-rc6
== 1.2.4
== 1.1.19-rc1
== 1.3.2
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.4.0
== 1.2.9
== 1.2.10
== 1.1.4
== 1.1.23
== 1.2.6
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.3.10
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
== 1.1.1
== 1.2.8
== 1.2.2
== 1.4.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.3.0
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2
CVE-2010-2432 Medium Jun 22, 2010 == 1.1.20
== 1.1.5-2
== 1.3.9
== 1.1.14
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.1.12
<= 1.4.3
== 1.3.11
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.1.16
== 1.4.1
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.1.17
== 1.1.20-rc6
== 1.2.4
== 1.1.19-rc1
== 1.3.2
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.4.0
== 1.2.9
== 1.2.10
== 1.1.4
== 1.1.23
== 1.2.6
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.3.10
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
== 1.1.1
== 1.2.8
== 1.2.2
== 1.4.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.3.0
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2
CVE-2010-0542 Medium Jun 21, 2010 == 1.1.20
== 1.1.5-2
== 1.3.9
== 1.1.14
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.1.12
<= 1.4.3
== 1.3.11
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.1.16
== 1.4.1
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.1.17
== 1.1.20-rc6
== 1.2.4
== 1.1.19-rc1
== 1.3.2
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.4.0
== 1.2.9
== 1.2.10
== 1.1.4
== 1.1.23
== 1.2.6
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.3.10
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
== 1.1.1
== 1.2.8
== 1.2.2
== 1.4.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.3.0
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2