hackerone.com
Open in
urlscan Pro
2606:4700::6810:6334
Public Scan
URL:
https://hackerone.com/hacktivity/cve_discovery?search=ghostscript
Submission: On August 16 via manual from US — Scanned from DE
Submission: On August 16 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content > Hacktivity Opportunities Directory Leaderboard Learn more about HackerOne Log in HACKTIVITY OverviewCVE DiscoveryCWE Discovery CVE DISCOVERY The Common Vulnerabilities and Exposures Discovery Index ranks the top CVEs by recency and instances. CVE data extracted every 6 hours; ranking updated hourly. SearchSearch H1 Rank CVE IDNumber of reportsVendorProductDescription77CVE-2023-3666410artifex, debian, fedoraprojectdebian_linux, fedora, ghostscriptArtifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).120CVE-2023-288799artifex, debiandebian_linux, ghostscriptIn Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.483CVE-2021-37819artifex, fedoraprojectfedora, ghostscriptA trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.555CVE-2018-165097artifex, canonical, debian, redhatdebian_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_eus, enterprise_linux_workstation, ghostscript, gpl_ghostscript, ubuntu_linuxAn issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.604CVE-2019-102166artifex, redhat3scale_api_management, enterprise_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_server_tus, enterprise_linux_workstation, ghostscriptIn ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.604CVE-2019-148126artifex, fedoraprojectfedora, ghostscriptA flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.604CVE-2019-148116artifex, debian, fedoraproject, opensuse, redhatdebian_linux, fedora, ghostscript, leap, openshift_container_platformA flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.663CVE-2018-194095artifex, canonical, debian, redhatdebian_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_workstation, ghostscript, ubuntu_linuxAn issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.741CVE-2017-82914artifexghostscriptArtifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.741CVE-2019-38354artifex, debian, fedoraproject, opensuse, redhatansible_tower, debian_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_server_tus, enterprise_linux_workstation, fedora, ghostscript, leapIt was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.1189CVE-2019-250592artifex, debiandebian_linux, ghostscriptArtifex Ghostscript through 9.26 mishandles .completefont. NOTE: this issue exists because of an incomplete fix for CVE-2019-3839.1189CVE-2020-159002artifex, canonical, opensuseghostscript, leap, ubuntu_linuxA memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.1835CVE-2016-79761artifexghostscriptThe PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.1835CVE-2019-61161artifex, canonical, debian, fedoraproject, opensuse, redhatdebian_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_server_tus, enterprise_linux_workstation, fedora, ghostscript, leap, ubuntu_linuxIn Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.1835CVE-2019-38381artifex, debian, fedoraproject, opensuse, redhatansible_tower, debian_linux, enterprise_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_server_tus, enterprise_linux_workstation, fedora, ghostscript, leapIt was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.1835CVE-2016-79771artifexghostscriptGhostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.1835CVE-2019-148131artifex, debian, fedoraproject, opensuse, redhatdebian_linux, enterprise_linux, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_eus, enterprise_linux_server_tus, enterprise_linux_workstation, fedora, ghostscript, leap, openshift_container_platformA flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.1835CVE-2019-38391artifex, canonical, debian, fedoraproject, opensuse, redhatdebian_linux, enterprise_linux, fedora, ghostscript, leap, ubuntu_linuxIt was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.5630CVE-2020-163020artifex, canonical, debiandebian_linux, ghostscript, ubuntu_linuxA buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.5630CVE-2017-97270artifex, debiandebian_linux, ghostscript_ghostxpsThe gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.5630CVE-2017-97400artifexghostscript_ghostxpsThe xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.5630CVE-2009-05840argyllcms, ghostscriptcms, ghostscripticc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.5630CVE-2008-66790ghostscriptghostscriptBuffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.5630CVE-2020-163010artifex, canonical, debiandebian_linux, ghostscript, ubuntu_linuxA buffer overflow vulnerability in okiibm_print_page1() in devices/gdevokii.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.5630CVE-2020-162930artifex, canonical, debiandebian_linux, ghostscript, ubuntu_linuxA null pointer dereference vulnerability in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. 1-25 of 147 Previous pagePrevious page Next pageNext page It looks like your JavaScript is disabled. To use HackerOne, enable JavaScript in your browser and refresh this page. CloseClose No matching CVE entry found for null