Количество 12
Количество 12
BDU:2018-01518
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм изолированной программной среды и раскрыть защищаемую информацию
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection me ...
GHSA-38q2-vj2m-g35p
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
openSUSE-SU-2018:4140-1
Security update for ghostscript
openSUSE-SU-2018:4138-1
Security update for ghostscript
SUSE-SU-2018:4090-2
Security update for ghostscript
SUSE-SU-2018:4090-1
Security update for ghostscript
SUSE-SU-2018:4087-1
Security update for ghostscript
ELSA-2018-3834
ELSA-2018-3834: ghostscript security and bug fix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2018-01518 Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм изолированной программной среды и раскрыть защищаемую информацию | CVSS3: 5.5 | 0% Низкий | около 7 лет назад | |
CVE-2018-18073 Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. | CVSS3: 6.3 | 0% Низкий | около 7 лет назад | |
CVE-2018-18073 Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. | CVSS3: 7.5 | 0% Низкий | около 7 лет назад | |
CVE-2018-18073 Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. | CVSS3: 6.3 | 0% Низкий | около 7 лет назад | |
CVE-2018-18073 Artifex Ghostscript allows attackers to bypass a sandbox protection me ... | CVSS3: 6.3 | 0% Низкий | около 7 лет назад | |
GHSA-38q2-vj2m-g35p Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. | CVSS3: 6.3 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2018:4140-1 Security update for ghostscript | почти 7 лет назад | |||
openSUSE-SU-2018:4138-1 Security update for ghostscript | почти 7 лет назад | |||
SUSE-SU-2018:4090-2 Security update for ghostscript | больше 6 лет назад | |||
SUSE-SU-2018:4090-1 Security update for ghostscript | почти 7 лет назад | |||
SUSE-SU-2018:4087-1 Security update for ghostscript | почти 7 лет назад | |||
ELSA-2018-3834 ELSA-2018-3834: ghostscript security and bug fix update (IMPORTANT) | почти 7 лет назад |
Уязвимостей на страницу