Show filters
148 Total Results
Displaying 1-10 of 148
Sort by:
Attacker Value
High
CVE-2023-28879
Disclosure Date: March 31, 2023 (last updated October 08, 2023)
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
2
Attacker Value
Unknown
CVE-2017-8291
Disclosure Date: April 27, 2017 (last updated July 03, 2024)
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
2
Attacker Value
Moderate
CVE-2020-15900
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
1
Attacker Value
Unknown
CVE-2025-27092
Disclosure Date: February 19, 2025 (last updated February 20, 2025)
GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application pr…
0
Attacker Value
Unknown
CVE-2024-46956
Disclosure Date: November 10, 2024 (last updated November 15, 2024)
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2024-46955
Disclosure Date: November 10, 2024 (last updated November 14, 2024)
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color space.
0
Attacker Value
Unknown
CVE-2024-46954
Disclosure Date: November 10, 2024 (last updated November 14, 2024)
An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal.
0
Attacker Value
Unknown
CVE-2024-46953
Disclosure Date: November 10, 2024 (last updated November 14, 2024)
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.
0
Attacker Value
Unknown
CVE-2024-46952
Disclosure Date: November 10, 2024 (last updated November 14, 2024)
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values).
0
Attacker Value
Unknown
CVE-2024-46951
Disclosure Date: November 10, 2024 (last updated November 14, 2024)
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.
0