Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu enscript 1.6.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1185
Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
Gnu Enscript 1.3.0
Gnu Enscript 1.5.0
Gnu Enscript 1.6.3
Gnu Enscript 1.6.0
Gnu Enscript 1.6.2
Gnu Enscript 1.6.1
Gnu Enscript 1.4.0
4.6
CVSSv2
CVE-2004-1184
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Gnu Enscript 1.6.3
Sgi Propack 3.0
Gnu Enscript 1.4
Gnu Enscript 1.6.4
Gnu Enscript 1.6.2
Gnu Enscript 1.5
Gnu Enscript 1.6.1
Gnu Enscript 1.6
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Fedora Core Core 2.0
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
3.6
CVSSv2
CVE-2002-0044
GNU Enscript 1.6.1 and previous versions allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
Gnu Enscript
Debian Debian Linux 2.2
Redhat Linux 7.0
Redhat Linux 6.1
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 6.0
Redhat Linux 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started