5 results (0.002 seconds)

CVSS: 7.8EPSS: 17%CPEs: 2EXPL: 0

23 Oct 2008 — Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command. Desbordamiento de búfer basado en la función read_special_escape en src/psgen.c en GNU Enscript 1.6.1 y 1.6.4 beta, cuando la opción -e (también conocido como procesado de escapados especiales) está habili... • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 59EXPL: 0

21 Jan 2005 — The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html •

CVSS: 9.1EPSS: 7%CPEs: 7EXPL: 0

21 Jan 2005 — Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames. • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html •

CVSS: 5.5EPSS: 8%CPEs: 1EXPL: 0

31 Dec 2004 — Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash). • http://lists.apple.com/archives/security-announce/2009/May/msg00002.html •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

31 Jan 2002 — GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files. Enscript 1.5.1 y anteriores permiten a usaurios locales sobreescribir ficheros arbitrarios del usuario Enscript mediante un ataque de enlaces simbólicos (symlink attack) en ficheros temporales. • http://www.debian.org/security/2002/dsa-105 •