Multiple Vulnerabilities in CUPS Allow Code Execution, Privilege Escalation, Data Manipulation, and Denial of Service
72% confidence
Description
Multiple vulnerabilities in CUPS can be exploited by an attacker to bypass security measures, execute arbitrary code, gain elevated privileges, manipulate data, or cause a denial-of-service condition.