Note:
This project will be discontinued after December 13, 2021. [more]
Product:
A2ps
(Gnu)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-04-13 | CVE-2015-8107 | Format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code. | A2ps | 7.8 | ||
2014-04-03 | CVE-2014-0466 | The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file. | A2ps | N/A | ||
2004-12-27 | CVE-2004-1377 | The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files. | A2ps, Turbolinux_home, Turbolinux_server, Turbolinux_workstation | N/A | ||
2005-01-10 | CVE-2004-1170 | a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename. | A2ps, Java_desktop_system, Suse_linux | N/A | ||
2014-04-05 | CVE-2001-1593 | The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file. | A2ps | N/A |