Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu enscript 1.6.4 vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2008-3863
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote malicious users to execute arbitrary code via a crafted ASCII file, rel...
Gnu Enscript 1.6.4
Gnu Enscript 1.6.1
7.5
CVSSv2
CVE-2004-1185
Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
Gnu Enscript 1.6.0
Gnu Enscript 1.6.1
Gnu Enscript 1.4.0
Gnu Enscript 1.5.0
Gnu Enscript 1.3.0
Gnu Enscript 1.6.2
Gnu Enscript 1.6.3
5
CVSSv2
CVE-2004-1186
Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
Gnu Enscript 1.6.3
4.6
CVSSv2
CVE-2004-1184
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Gnu Enscript 1.5
Gnu Enscript 1.6.3
Gnu Enscript 1.6.4
Gnu Enscript 1.6.1
Gnu Enscript 1.6.2
Gnu Enscript 1.6
Gnu Enscript 1.4
Sgi Propack 3.0
Suse Suse Linux 3.0
Suse Suse Linux 4.0
Suse Suse Linux 4.2
Suse Suse Linux 5.3
Suse Suse Linux 6.0
Suse Suse Linux 6.4
Suse Suse Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 1.0
Suse Suse Linux 2.0
Suse Suse Linux 5.1
Suse Suse Linux 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started