A vulnerability in Ghostscript, a widely used interpreter for Adobe PostScript and PDF page description languages, could allow attackers to remotely take control of vulnerable systems -- and there's ...
Tavis Ormandy, a Google Project Zero security researcher, has revealed details about a new major vulnerability discovered in Ghostscript, an interpreter for Adobe's PostScript and PDF page description ...
A remote code execution vulnerability in the Ghostscript document conversion toolkit, widely used on Linux systems, is currently being exploited in attacks. Ghostscript comes pre-installed on many ...
Ghostscript gives you the power to combine files, convert files, and much more, all from the command line. The default PostScript language output level is 2. Using "1.5" is also supported, which is ...
Topic ===== ghostscript can be tricked into executing arbitrary code Problem Description ===== An untrusted PostScript file can cause ghostscript to execute arbitrary commands due to insufficient ...
IT security researchers have discovered five security vulnerabilities in Ghostscript. Attackers can, for example, bypass the sandbox and execute arbitrary code. A proof-of-concept exploit is publicly ...
This week Ghostscript, an open source postscript processor, released version 8.60. Ghostscript releases are not normally newsworthy since they are frequent and incremental, but this release is special ...
Linux distributors and application developers using the open-source Ghostscript interpreter for the PostScript language and PDFs are being urged to apply the latest security patch for the utility ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results