CVE-2024-40507
Jue, 26/09/2024 – 22:15
CVE-2024-40507
CVE-2024-40507
Jue, 26/09/2024 – 22:15
CVE-2024-40507
CVE-2024-40506
Jue, 26/09/2024 – 22:15
CVE-2024-40506
CVE-2024-47177
Jue, 26/09/2024 – 22:15
CVE-2024-47177
CVE-2024-47176
Jue, 26/09/2024 – 22:15
CVE-2024-47176
Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled.
CVE-2024-47175
Jue, 26/09/2024 – 22:15
CVE-2024-47175
CVE-2024-47076
Jue, 26/09/2024 – 22:15
CVE-2024-47076
CVE-2024-47179
Jue, 26/09/2024 – 20:15
CVE-2024-47179
CVE-2024-7594
Jue, 26/09/2024 – 20:15
CVE-2024-7594
CVE-2024-47180
Jue, 26/09/2024 – 20:15
CVE-2024-47180
CVE-2024-47123
Jue, 26/09/2024 – 18:15
CVE-2024-47123