Логотип exploitDog
bind:CVE-2023-43115
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-43115

Количество 10

Количество 10

ubuntu логотип

CVE-2023-43115

почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
EPSS: Средний
redhat логотип

CVE-2023-43115

почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
EPSS: Средний
nvd логотип

CVE-2023-43115

почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
EPSS: Средний
debian логотип

CVE-2023-43115

почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead ...

CVSS3: 8.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:3984-1

почти 2 года назад

Security update for ghostscript

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:3938-1

почти 2 года назад

Security update for ghostscript

EPSS: Средний
github логотип

GHSA-9p55-888j-qxrh

почти 2 года назад

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 9.8
EPSS: Средний
oracle-oval логотип

ELSA-2023-6732

почти 2 года назад

ELSA-2023-6732: ghostscript security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6265

почти 2 года назад

ELSA-2023-6265: ghostscript security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2023-06329

почти 2 года назад

Уязвимость компонента gdevijs.c набора программного обеспечения обработки документов Ghostscript, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
20%
Средний
почти 2 года назад
redhat логотип
CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
20%
Средний
почти 2 года назад
nvd логотип
CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 8.8
20%
Средний
почти 2 года назад
debian логотип
CVE-2023-43115

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead ...

CVSS3: 8.8
20%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3984-1

Security update for ghostscript

20%
Средний
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3938-1

Security update for ghostscript

20%
Средний
почти 2 года назад
github логотип
GHSA-9p55-888j-qxrh

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

CVSS3: 9.8
20%
Средний
почти 2 года назад
oracle-oval логотип
ELSA-2023-6732

ELSA-2023-6732: ghostscript security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6265

ELSA-2023-6265: ghostscript security update (IMPORTANT)

почти 2 года назад
fstec логотип
BDU:2023-06329

Уязвимость компонента gdevijs.c набора программного обеспечения обработки документов Ghostscript, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
20%
Средний
почти 2 года назад

Уязвимостей на страницу