Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
psi vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-14373
A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
Artifex Ghostscript 9.25
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
8.8
CVSSv3
CVE-2019-6528
PSI GridConnect GmbH Telecontrol Gateway and Smart Telecontrol Unit family, IEC104 Security Proxy versions Telecontrol Gateway 3G Versions 4.2.21, 5.0.27, 5.1.19, 6.0.16 and prior, and Telecontrol Gateway XS-MU Versions 4.2.21, 5.0.27, 5.1.19, 6.0.16 and prior, and Telecontrol Ga...
Psigridconnect Telecontrol Gateway Xs-mu Firmware
Psigridconnect Telecontrol Gateway Vm Firmware
Psigridconnect Telecontrol Gateway 3g Firmware
Psigridconnect Smart Telecontrol Unit Tcg Firmware
Psigridconnect Iec104 Security Proxy Firmware
NA
CVE-2009-4897
Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and previous versions allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
Artifex Gpl Ghostscript 8.63
Artifex Gpl Ghostscript 8.62
Artifex Gpl Ghostscript 8.61
Artifex Afpl Ghostscript 8.13
Artifex Afpl Ghostscript 8.12
Artifex Gpl Ghostscript 8.56
Artifex Gpl Ghostscript 8.57
Artifex Afpl Ghostscript 7.00
Artifex Afpl Ghostscript 6.0
Artifex Afpl Ghostscript 8.52
Artifex Afpl Ghostscript 8.51
Artifex Gpl Ghostscript 8.15
Artifex Gpl Ghostscript 8.50
Artifex Gpl Ghostscript 8.71
Artifex Afpl Ghostscript 8.53
Artifex Gpl Ghostscript
Artifex Afpl Ghostscript 8.50
Artifex Afpl Ghostscript 8.14
Artifex Ghostscript Fonts 8.11
Artifex Gpl Ghostscript 8.01
Artifex Afpl Ghostscript 8.54
Artifex Afpl Ghostscript 7.04
5.5
CVSSv3
CVE-2020-16307
A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote malicious user to cause a denial of service via a crafted postscript file. This is fixed in v9.51.
Artifex Ghostscript 9.50
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
7.8
CVSSv3
CVE-2017-9835
The gs_alloc_ref_array function in psi/ialloc.c in Artifex Ghostscript 9.21 allows remote malicious users to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document. This is related t...
Artifex Ghostscript 9.21
Debian Debian Linux 8.0
Debian Debian Linux 9.0
7.8
CVSSv3
CVE-2018-19475
psi/zdevice2.c in Artifex Ghostscript prior to 9.26 allows remote malicious users to bypass intended access restrictions because available stack space is not checked when the device remains the same.
Artifex Ghostscript
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Openshift Container Platform 3.11
Redhat Enterprise Linux Server 7.6
1 Github repository
7.8
CVSSv3
CVE-2018-19476
psi/zicc.c in Artifex Ghostscript prior to 9.26 allows remote malicious users to bypass intended access restrictions because of a setcolorspace type confusion.
Artifex Ghostscript
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Openshift Container Platform 3.11
Redhat Enterprise Linux Server 7.6
7.8
CVSSv3
CVE-2018-19477
psi/zfjbig2.c in Artifex Ghostscript prior to 9.26 allows remote malicious users to bypass intended access restrictions because of a JBIG2Decode type confusion.
Artifex Ghostscript
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Openshift Container Platform 3.11
Redhat Enterprise Linux Server 7.6
7.8
CVSSv3
CVE-2019-6116
In Artifex Ghostscript up to and including 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
Artifex Ghostscript
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 15.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
1 EDB exploit
8.8
CVSSv3
CVE-2019-14869
A flaw was found in all versions of ghostscript 9.x prior to 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScri...
Artifex Ghostscript
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Opensuse Leap 15.0
Opensuse Leap 15.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »