Количество 22
Количество 22

SUSE-SU-2024:2292-1
Security update for ghostscript

SUSE-SU-2024:2276-1
Security update for ghostscript
ELSA-2024-6197
ELSA-2024-6197: ghostscript security update (MODERATE)

ROS-20240923-05
Множественные уязвимости ghostscript

CVE-2024-29510
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

CVE-2024-29510
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

CVE-2024-29510
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
CVE-2024-29510
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER ...
GHSA-r824-gq56-gjgx
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

BDU:2024-05062
Уязвимость интерпретатора набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить выход из изолированной программной среды

CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There i ...

CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.

CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path tr ...
GHSA-v6hc-9c6c-f599
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
GHSA-3xr3-vrm2-6jc7
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2024:2292-1 Security update for ghostscript | 12 месяцев назад | ||
![]() | SUSE-SU-2024:2276-1 Security update for ghostscript | 12 месяцев назад | ||
ELSA-2024-6197 ELSA-2024-6197: ghostscript security update (MODERATE) | 10 месяцев назад | |||
![]() | ROS-20240923-05 Множественные уязвимости ghostscript | CVSS3: 8.8 | 9 месяцев назад | |
![]() | CVE-2024-29510 Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. | CVSS3: 6.3 | 6% Низкий | 12 месяцев назад |
![]() | CVE-2024-29510 Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. | CVSS3: 5.5 | 6% Низкий | около 1 года назад |
![]() | CVE-2024-29510 Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. | CVSS3: 6.3 | 6% Низкий | 12 месяцев назад |
CVE-2024-29510 Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER ... | CVSS3: 6.3 | 6% Низкий | 12 месяцев назад | |
GHSA-r824-gq56-gjgx Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. | CVSS3: 6.3 | 6% Низкий | 12 месяцев назад | |
![]() | BDU:2024-05062 Уязвимость интерпретатора набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить выход из изолированной программной среды | CVSS3: 5.5 | 6% Низкий | 12 месяцев назад |
![]() | CVE-2024-33870 An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. | CVSS3: 6.3 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-33870 An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. | CVSS3: 6.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-33870 An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. | CVSS3: 6.3 | 0% Низкий | 12 месяцев назад |
CVE-2024-33870 An issue was discovered in Artifex Ghostscript before 10.03.1. There i ... | CVSS3: 6.3 | 0% Низкий | 12 месяцев назад | |
![]() | CVE-2024-33869 An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. | CVSS3: 5.3 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-33869 An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. | CVSS3: 5.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-33869 An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. | CVSS3: 5.3 | 0% Низкий | 12 месяцев назад |
CVE-2024-33869 An issue was discovered in Artifex Ghostscript before 10.03.1. Path tr ... | CVSS3: 5.3 | 0% Низкий | 12 месяцев назад | |
GHSA-v6hc-9c6c-f599 An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. | CVSS3: 5.3 | 0% Низкий | 12 месяцев назад | |
GHSA-3xr3-vrm2-6jc7 An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted. | CVSS3: 6.3 | 0% Низкий | 12 месяцев назад |
Уязвимостей на страницу