Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ghostscript ghostscript 8.70 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-4270
Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 up to and including 8.70 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logg...
Ghostscript Ghostscript 8.64
Ghostscript Ghostscript 8.70
NA
CVE-2010-1869
Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent malicious users to execute arbitrary code via a crafted PostScript file.
Artifex Gpl Ghostscript 8.70
Artifex Gpl Ghostscript 8.64
1 EDB exploit
NA
CVE-2010-1628
Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent malicious users to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
Artifex Gpl Ghostscript 8.64
Artifex Gpl Ghostscript 8.70
NA
CVE-2010-2055
Ghostscript 8.71 and previous versions reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using...
Artifex Afpl Ghostscript 7.03
Artifex Afpl Ghostscript 7.00
Artifex Afpl Ghostscript 6.50
Artifex Afpl Ghostscript 6.01
Artifex Gpl Ghostscript 8.01
Artifex Ghostscript Fonts 6.0
Artifex Gpl Ghostscript 8.62
Artifex Gpl Ghostscript 8.63
Artifex Afpl Ghostscript 8.14
Artifex Afpl Ghostscript 8.13
Artifex Afpl Ghostscript 8.12
Artifex Afpl Ghostscript 8.11
Artifex Gpl Ghostscript 8.51
Artifex Gpl Ghostscript 8.54
Artifex Afpl Ghostscript 8.53
Artifex Afpl Ghostscript 8.54
Artifex Gpl Ghostscript
Artifex Afpl Ghostscript 7.04
Artifex Afpl Ghostscript 6.0
Artifex Afpl Ghostscript 8.52
Artifex Afpl Ghostscript 8.50
Artifex Afpl Ghostscript 8.00
NA
CVE-2009-4897
Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and previous versions allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
Artifex Gpl Ghostscript 8.63
Artifex Gpl Ghostscript 8.62
Artifex Gpl Ghostscript 8.61
Artifex Afpl Ghostscript 8.13
Artifex Afpl Ghostscript 8.12
Artifex Gpl Ghostscript 8.56
Artifex Gpl Ghostscript 8.57
Artifex Afpl Ghostscript 7.00
Artifex Afpl Ghostscript 6.0
Artifex Afpl Ghostscript 8.52
Artifex Afpl Ghostscript 8.51
Artifex Gpl Ghostscript 8.15
Artifex Gpl Ghostscript 8.50
Artifex Gpl Ghostscript 8.71
Artifex Afpl Ghostscript 8.53
Artifex Gpl Ghostscript
Artifex Afpl Ghostscript 8.50
Artifex Afpl Ghostscript 8.14
Artifex Ghostscript Fonts 8.11
Artifex Gpl Ghostscript 8.01
Artifex Afpl Ghostscript 8.54
Artifex Afpl Ghostscript 7.04
NA
CVE-2010-4054
The gs_type2_interpret function in Ghostscript allows remote malicious users to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
Artifex Afpl Ghostscript 7.00
Artifex Afpl Ghostscript 6.50
Artifex Afpl Ghostscript 6.01
Artifex Afpl Ghostscript 6.0
Artifex Ghostscript Fonts 8.11
Artifex Gpl Ghostscript 8.01
Artifex Ghostscript Fonts 6.0
Artifex Gpl Ghostscript 8.62
Artifex Gpl Ghostscript 8.63
Artifex Afpl Ghostscript 8.50
Artifex Afpl Ghostscript 8.14
Artifex Afpl Ghostscript 8.13
Artifex Afpl Ghostscript 8.12
Artifex Gpl Ghostscript 8.51
Artifex Gpl Ghostscript 8.54
Artifex Gpl Ghostscript 8.71
Artifex Afpl Ghostscript 8.53
Artifex Afpl Ghostscript 7.03
Artifex Gpl Ghostscript 8.70
Artifex Afpl Ghostscript 8.52
Artifex Afpl Ghostscript 8.00
Artifex Gpl Ghostscript 8.50
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started