Security Advisories (3)
CVE-2009-3743 (2010-08-26)

Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.

CVE-2015-0852 (2015-09-29)

Multiple integer underflows in PluginPCX.cpp in FreeImage 3.17.0 and earlier allow remote attackers to cause a denial of service (heap memory corruption) via vectors related to the height and width of a window.

CVE-2016-9601 (2018-04-24)

ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.

NAME

Win32::Printer::Direct - Perl extension for direct Win32 printing

SYNOPSIS

use Win32::Printer::Direct;

Printfile("HP LaserJet 8150", "test.prn");

ABSTRACT

Win32 direct printing

INSTALLATION

See Win32::Printer! This module depends on it.

Printfile

Printfile($printer_name, $file_name);

$printer_name is printer's friendly name and $file_name is name of the file to print.

Return value is error code:

 1	Success
-1	Memory allocation error
-2	Error opening the file
-3	Error opening the printer
-4	Error startint the print job
-5	Error writing to printer
-6	Error ending the print job
-7	Error closing printer

DESCRIPTION

SEE ALSO

Win32::Printer, Win32 Platform SDK GDI documentation.

AUTHOR

Edgars Binans

COPYRIGHT AND LICENSE

Win32::Printer, Copyright (C) 2005 Edgars Binans.

THIS LIBRARY IS LICENSED UNDER THE TERMS OF GNU LESSER GENERAL PUBLIC LICENSE V2.1