Total vulnerabilities in the database
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
Software | From | Fixed in |
---|---|---|
artifex / ghostscript | - | 9.21 |
debian / debian_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
redhat / enterprise_linux_server_tus | 7.3 | 7.3.x |
redhat / enterprise_linux_server_aus | 7.3 | 7.3.x |
redhat / enterprise_linux_server_aus | 7.4 | 7.4.x |
redhat / enterprise_linux_eus | 7.3 | 7.3.x |
redhat / enterprise_linux_eus | 7.4 | 7.4.x |
redhat / enterprise_linux_eus | 7.5 | 7.5.x |
redhat / enterprise_linux_server_tus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.6 | 7.6.x |
redhat / enterprise_linux_eus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.7 | 7.7.x |
redhat / enterprise_linux_server_tus | 7.7 | 7.7.x |
redhat / enterprise_linux_eus | 7.7 | 7.7.x |