gv 3.5.8, and possibly earlier versions, allows remote malicious users to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gv gv 2.7b1 |
||
gv gv 2.7b2 |
||
gv gv 3.1.4 |
||
gv gv 3.1.6 |
||
gv gv 3.5.8 |
||
ghostview ghostview 1.4 |
||
ghostview ghostview 1.4.1 |
||
gv gv 2.7b5 |
||
gv gv 2.9.4 |
||
gv gv 3.4.2 |
||
gv gv 3.4.3 |
||
ghostview ghostview 1.3 |
||
gv gv 2.7b3 |
||
gv gv 2.7b4 |
||
gv gv 3.2.4 |
||
gv gv 3.4.12 |
||
ghostview ghostview 1.5 |
||
gv gv 2.7.6 |
||
gv gv 3.0.0 |
||
gv gv 3.0.4 |
||
gv gv 3.5.2 |
||
gv gv 3.5.3 |