Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2008-4306
Description:Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.
Test IDs: 1.3.6.1.4.1.25623.1.0.61821   1.3.6.1.4.1.25623.1.0.61933   1.3.6.1.4.1.25623.1.0.61824   1.3.6.1.4.1.25623.1.0.122538   1.3.6.1.4.1.25623.1.0.61920  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2008-4306
20081117 rPSA-2008-0321-1 enscript
http://www.securityfocus.com/archive/1/498385/100/0/threaded
32521
http://secunia.com/advisories/32521
32530
http://secunia.com/advisories/32530
32753
http://secunia.com/advisories/32753
32854
http://secunia.com/advisories/32854
32970
http://secunia.com/advisories/32970
33109
http://secunia.com/advisories/33109
49569
http://osvdb.org/49569
DSA-1670
http://www.debian.org/security/2008/dsa-1670
FEDORA-2008-9351
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html
FEDORA-2008-9372
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html
GLSA-200812-02
http://security.gentoo.org/glsa/glsa-200812-02.xml
MDVSA-2008:243
http://www.mandriva.com/security/advisories?name=MDVSA-2008:243
RHSA-2008:1016
http://www.redhat.com/support/errata/RHSA-2008-1016.html
RHSA-2008:1021
http://rhn.redhat.com/errata/RHSA-2008-1021.html
SUSE-SR:2008:024
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
USN-660-1
http://www.ubuntu.com/usn/usn-660-1
http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321
https://issues.rpath.com/browse/RPL-2887
https://issues.rpath.com/browse/RPL-2887
oval:org.mitre.oval:def:10718
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10718




© 1998-2025 E-Soft Inc. All rights reserved.