Vendor Information for VU#810572

CUPS print service is vulnerable to privilege escalation and cross-site scripting

  • VendorStatusDate NotifiedDate Updated
  • AppleAffected06 May 201508 May 2015
  • FreeBSD ProjectAffected08 May 201510 Jun 2015
  • openSUSE projectAffected08 May 201510 Jun 2015
  • SUSE LinuxAffected08 May 201510 Jun 2015
  • CentOSUnknown08 May 201508 May 2015
  • Debian GNU/LinuxUnknown08 May 201508 May 2015
  • DesktopBSDUnknown08 May 201508 May 2015
  • DragonFly BSD ProjectUnknown08 May 201508 May 2015
  • EMC CorporationUnknown08 May 201508 May 2015
  • F5 Networks, Inc.Unknown08 May 201508 May 2015
  • Fedora ProjectUnknown08 May 201508 May 2015
  • Gentoo LinuxUnknown08 May 201508 May 2015
  • Hewlett-Packard CompanyUnknown08 May 201508 May 2015
  • HitachiUnknown08 May 201508 May 2015
  • IBM CorporationUnknown08 May 201508 May 2015
  • IBM eServerUnknown08 May 201508 May 2015
  • Juniper NetworksUnknown08 May 201508 May 2015
  • m0n0wallUnknown08 May 201508 May 2015
  • Mandriva S. A.Unknown08 May 201508 May 2015
  • NetBSDUnknown08 May 201508 May 2015
  • NokiaUnknown08 May 201508 May 2015
  • OmniTIUnknown08 May 201508 May 2015
  • OpenBSDUnknown08 May 201508 May 2015
  • Openwall GNU/*/LinuxUnknown08 May 201508 May 2015
  • Oracle CorporationUnknown08 May 201508 May 2015
  • QNX Software Systems Inc.Unknown08 May 201508 May 2015
  • Red Hat, Inc.Unknown08 May 201508 May 2015
  • Slackware Linux Inc.Unknown08 May 201508 May 2015
  • Sony CorporationUnknown08 May 201508 May 2015
  • TurbolinuxUnknown08 May 201508 May 2015
  • UbuntuUnknown08 May 201508 May 2015
  • UnisysUnknown08 May 201508 May 2015