Show filters
203 Total Results
Displaying 21-30 of 203
Sort by:
Attacker Value
Unknown

CVE-2024-23724

Disclosure Date: February 11, 2024 (last updated September 06, 2024)
Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor does not view this as a valid vector."
Attacker Value
Unknown

CVE-2020-36773

Disclosure Date: February 04, 2024 (last updated March 05, 2024)
Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).
Attacker Value
Unknown

CVE-2024-23725

Disclosure Date: January 21, 2024 (last updated January 30, 2024)
Ghost before 5.76.0 allows XSS via a post excerpt in excerpt.js. An XSS payload can be rendered in post summaries.
Attacker Value
Unknown

CVE-2023-46751

Disclosure Date: December 06, 2023 (last updated December 09, 2023)
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
Attacker Value
Unknown

CVE-2023-43115

Disclosure Date: September 18, 2023 (last updated February 23, 2024)
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
Attacker Value
Unknown

CVE-2023-4042

Disclosure Date: August 23, 2023 (last updated April 25, 2024)
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
Attacker Value
Unknown

CVE-2020-21890

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Buffer Overflow vulnerability in clj_media_size function in devices/gdevclj.c in Artifex Ghostscript 9.50 allows remote attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document.
Attacker Value
Unknown

CVE-2020-21710

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
A divide by zero issue discovered in eps_print_page in gdevepsn.c in Artifex Software GhostScript 9.50 allows remote attackers to cause a denial of service via opening of crafted PDF file.
Attacker Value
Unknown

CVE-2023-40028

Disclosure Date: August 15, 2023 (last updated October 08, 2023)
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-38560

Disclosure Date: August 01, 2023 (last updated April 25, 2024)
An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.