296,202
Total vulnerabilities in the database
gv 3.5.8, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the filename for (1) a PDF file or (2) a gzip file.
Software | From | Fixed in |
---|---|---|
gv / gv | 3.4.2 | 3.4.2.x |
ghostview / ghostview | 1.5 | 1.5.x |
gv / gv | 3.5.2 | 3.5.2.x |
gv / gv | 3.1.4 | 3.1.4.x |
gv / gv | 3.4.12 | 3.4.12.x |
gv / gv | 2.7b4 | 2.7b4.x |
gv / gv | 3.5.3 | 3.5.3.x |
gv / gv | 3.2.4 | 3.2.4.x |
gv / gv | 2.9.4 | 2.9.4.x |
gv / gv | 2.7b1 | 2.7b1.x |
ghostview / ghostview | 1.4.1 | 1.4.1.x |
gv / gv | 2.7b5 | 2.7b5.x |
gv / gv | 3.1.6 | 3.1.6.x |
gv / gv | 2.7.6 | 2.7.6.x |
gv / gv | 3.0.0 | 3.0.0.x |
ghostview / ghostview | 1.3 | 1.3.x |
gv / gv | 3.0.4 | 3.0.4.x |
gv / gv | 3.4.3 | 3.4.3.x |
gv / gv | 2.7b3 | 2.7b3.x |
gv / gv | 3.5.8 | 3.5.8.x |
gv / gv | 2.7b2 | 2.7b2.x |
ghostview / ghostview | 1.4 | 1.4.x |