Show filters
203 Total Results
Displaying 51-60 of 203
Sort by:
Attacker Value
Unknown

CVE-2021-45949

Disclosure Date: January 01, 2022 (last updated February 23, 2025)
Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp).
Attacker Value
Unknown

CVE-2021-45944

Disclosure Date: January 01, 2022 (last updated February 23, 2025)
Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
Attacker Value
Unknown

CVE-2021-39192

Disclosure Date: September 03, 2021 (last updated February 23, 2025)
Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround.
Attacker Value
Unknown

CVE-2021-29484

Disclosure Date: April 29, 2021 (last updated February 22, 2025)
Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site. The issue has been fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. As a workaround blocking access to /ghost/preview can also mitigate the issue.
0
Attacker Value
Unknown

CVE-2020-35185

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
The official ghost docker images before 2.16.1-alpine (Alpine specific) contain a blank password for a root user. System using the ghost docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
Attacker Value
Unknown

CVE-2020-14373

Disclosure Date: September 03, 2020 (last updated February 22, 2025)
A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
Attacker Value
Unknown

CVE-2020-16296

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A buffer overflow vulnerability in GetNumWrongData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
Attacker Value
Unknown

CVE-2020-16291

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A buffer overflow vulnerability in contrib/gdevdj9.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
Attacker Value
Unknown

CVE-2020-16295

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A null pointer dereference vulnerability in clj_media_size() in devices/gdevclj.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
Attacker Value
Unknown

CVE-2020-16289

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A buffer overflow vulnerability in cif_print_page() in devices/gdevcif.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.