Page 4 of 16 results (0.003 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 1

Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file. Desbordamiento de búffer basado en el parseo de la función de GhostScript v8.70 y v8.64 permite a atacantes dependiendo del contexto ejecutar código de su elección a través de la manipulación del fichero PostScript. • https://www.exploit-db.com/exploits/14406 http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://secunia.com/advisories/39753 http://secunia.com/advisories/40580 http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html http://www.mandriva.com/security/advisories?name=MDVSA-2010:102 http://www.securityfocus.com/archive/1/511243/100/0/threaded http://www.securityfocus.com/bid/40103 http://www.securitytracker.com/id?1024003 http://www. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •