Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Enscript
(Gnu)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2008-10-23 | CVE-2008-3863 | Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command. | Enscript | N/A | ||
2004-12-31 | CVE-2004-1186 | Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash). | Enscript | N/A | ||
2005-01-21 | CVE-2004-1185 | Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames. | Enscript | N/A | ||
2005-01-21 | CVE-2004-1184 | The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. | Enscript, Fedora_core, Propack, Suse_linux | N/A | ||
2002-01-31 | CVE-2002-0044 | GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files. | Debian_linux, Enscript, Linux | N/A |