#ghostscript search results

csirt_it: Aggiornamento di sicurezza sana 8 nuove vulnerabilità nella suite #Ghostscript Rischio:🟡 Tipologia: 🔸Arbitrary Code Execution 🔸Information Disclosure 🔗acn.gov.it/portale/w/riso… 🔄 Aggiornamenti disponibili 🔄

Vulcanux_'s tweet image. csirt_it: Aggiornamento di sicurezza sana 8 nuove vulnerabilità nella suite #Ghostscript

Rischio:🟡

Tipologia:
🔸Arbitrary Code Execution
🔸Information Disclosure

🔗acn.gov.it/portale/w/riso…

🔄 Aggiornamenti disponibili 🔄

csirt_it: ‼ Disponibile un #PoC per lo sfruttamento della CVE-2024-29510 che interessa la suite #Ghostscript Rischio: 🟠 Tipologia: 🔸 Arbitrary Code Execution 🔸 Information Disclosure 🔗 csirt.gov.it/contenuti/ghos… ⚠ Importante aggiornare i sistemi

Vulcanux_'s tweet image. csirt_it: ‼ Disponibile un #PoC per lo sfruttamento della CVE-2024-29510 che interessa la suite #Ghostscript

Rischio: 🟠

Tipologia:
🔸   Arbitrary Code Execution
🔸   Information Disclosure

🔗 csirt.gov.it/contenuti/ghos…

⚠ Importante aggiornare i sistemi

17MB optimization/reduction to 3MB for PDFs quiet impressive performance. Just use #Python and #GhostScript alone without API token or licensing. *supercompressPDF* github.com/booluckgmie/tr…

najmi_ariffin's tweet image. 17MB optimization/reduction to 3MB for PDFs quiet impressive performance. Just use #Python and #GhostScript alone without API token or licensing.

*supercompressPDF*
github.com/booluckgmie/tr…

Critical vulnerabilities found in Ghostscript may allow unauthorized file access and code execution. Upgrading is crucial to protect systems from these severe threats. ⚠️ #Ghostscript #TechSafety #USA link: ift.tt/gXtl8jz

TweetThreatNews's tweet image. Critical vulnerabilities found in Ghostscript may allow unauthorized file access and code execution. Upgrading is crucial to protect systems from these severe threats. ⚠️ #Ghostscript #TechSafety #USA

link: ift.tt/gXtl8jz

The #Ghostscript bug could allow rogue documents to run system commands. #CyberSecurity #infosec buff.ly/3pvcINc

twelvesec's tweet image. The #Ghostscript bug could allow rogue documents to run system commands.
#CyberSecurity #infosec
buff.ly/3pvcINc

Remote Code Execution vulnerability - Artifex Ghostscript (CVE-2024-29510). Memory corruption allows to bypass the SAFER sandbox and execute arbitrary code. Оn July 19, a module for Metasploit was released. #Ghostscript #CodeanLabs ➡️ t.me/avleonovcom/14…

leonov_av's tweet image. Remote Code Execution  vulnerability - Artifex Ghostscript (CVE-2024-29510). Memory corruption  allows to bypass the SAFER sandbox and execute arbitrary code. Оn July 19, a module for Metasploit was released.
#Ghostscript #CodeanLabs
➡️ t.me/avleonovcom/14…

There is an RCE bug in a widely used #Ghostscript library that is currently being exploited in #cyberattacks. #Cybersecurity #infosec #cybercrime buff.ly/3zwiGls

twelvesec's tweet image. There is an RCE bug in a widely used #Ghostscript library that is currently being exploited in #cyberattacks.
#Cybersecurity #infosec #cybercrime
buff.ly/3zwiGls

🚨 New #SUSE Linux security update: SUSE-2025-03460-1 patches a low-severity #Ghostscript vulnerability. Read more: 👉 tinyurl.com/3rfa743t #Security

Cezar_H_Linux's tweet image. 🚨 New #SUSE Linux security update: SUSE-2025-03460-1 patches a low-severity #Ghostscript vulnerability.   Read more: 👉 tinyurl.com/3rfa743t  #Security

در این پست به بررسی آسیب پذیری بحرانی #CVE_2023_36664 در #Ghostscript پرداختیم که امکان اجرای کد از راه دور میده. onhexgroup.ir/ghostscript-cv…


cybersecurity-help.cz/blog/4129.html Security researchers are warning of active exploitation of a high-severity vulnerability in Ghostscript, a widely-used interpreter for the PostScript language and PDF files #Ghostscript #vulnerability

Cybershelp's tweet image. cybersecurity-help.cz/blog/4129.html

Security researchers are warning of active exploitation of a high-severity vulnerability in Ghostscript, a widely-used interpreter for the PostScript language and PDF files

#Ghostscript #vulnerability

We all heard about #ghostscript command execution CVE-2023-36664 👾 Now a PoC and Exploit have been developed at #vsociety by Ákos Jakab 🚀 Check it out: vicarius.io/vsociety/posts… Join vsociety 🔥: vsociety.io vsociety discord 💪: discord.gg/sHJtMteYHQ 🧵


I am officially old: I’m about to install #ghostscript by Artix Software to convert EPS figures into fine PDF files.


#Ghostscript Update Patches Six Vulnerabilities: Code Execution, Buffer Overflow, and Path Traversal Risks CVE-2024-46951, CVE-2024-46952, CVE-2024-46953, CVE-2024-46954, CVE-2024-46955, CVE-2024-46956 securityonline.info/ghostscript-up…


🚨 New #SUSE Linux security update: SUSE-2025-03460-1 patches a low-severity #Ghostscript vulnerability. Read more: 👉 tinyurl.com/3rfa743t #Security

Cezar_H_Linux's tweet image. 🚨 New #SUSE Linux security update: SUSE-2025-03460-1 patches a low-severity #Ghostscript vulnerability.   Read more: 👉 tinyurl.com/3rfa743t  #Security

I am officially old: I’m about to install #ghostscript by Artix Software to convert EPS figures into fine PDF files.


The hackers exploited a flaw allowing them to upload malicious PostScript files disguised as PDFs. 4chan used a version of Ghostscript (image software) from 2012 🗓️ to process these, which was easily exploitable! HUGE security lapse. #Ghostscript #securityfail


I posted recently about using #ColdFusion with #ghostscript to optimize bloated PDFs. I was using v9.54 from 2021 & just updated to v10.5. (There's been lots of updates since 2012.) grok.com/share/bGVnYWN5…

grok.com

Ghostscript Updates: Breaking Changes for Windows 64-bit | Shared Grok Conversation

When updating Ghostscript for Windows 64bit over the past couple of years, have there been any break

4chan allegedly used a 2012 GhostScript build to generate PDF thumbnails on uploaded PDFs

m40282845's tweet image. 4chan allegedly used a 2012 GhostScript build to generate PDF thumbnails on uploaded PDFs
m40282845's tweet image. 4chan allegedly used a 2012 GhostScript build to generate PDF thumbnails on uploaded PDFs


So, here is another gift for you about Imagemagick RCE 0-day that afftceted to GhostScript-9.50 😀 github.com/duc-nt/RCE-0-d… #RCE #imagemagick #ghostscript

ducnt_'s tweet image. So, here is another gift for you about Imagemagick RCE 0-day that afftceted to GhostScript-9.50 😀

github.com/duc-nt/RCE-0-d…

#RCE #imagemagick #ghostscript

ふと思い立って「原ノ味フォント」を縦書き PostScript に指定してみた。古い gs-7.07 で変換したら,ちゃんと使えた(素敵☃) #原ノ味 #Ghostscript

aminophen's tweet image. ふと思い立って「原ノ味フォント」を縦書き PostScript に指定してみた。古い gs-7.07 で変換したら,ちゃんと使えた(素敵☃) #原ノ味 #Ghostscript

Злая картинка. Разбираем уязвимость в GhostScript, чтобы эксплуатировать Pillow и ImageMagick #ghostscript #hack #подписчикам xakep.ru/2019/02/11/gho…

XakepRU's tweet image. Злая картинка. Разбираем уязвимость в GhostScript, чтобы эксплуатировать Pillow и ImageMagick #ghostscript #hack #подписчикам

xakep.ru/2019/02/11/gho…

Stroked and filled rectangle created by PyX is rendered incorrectly by Ghostscript stackoverflow.com/questions/6580… #ghostscript #python #pdf #pyx

overflow_meme's tweet image. Stroked and filled rectangle created by PyX is rendered incorrectly by Ghostscript stackoverflow.com/questions/6580… #ghostscript #python #pdf #pyx

#ghostscript 10 released \o/ silent install parameters don't work anymore /o\

KiPos_info's tweet image. #ghostscript 10 released \o/
silent install parameters don't work anymore /o\

Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts…

TheHackersNews's tweet image. Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…

How to change the width of lines in a PDF/PostScript file stackoverflow.com/questions/5546… #ghostscript #pdf #postscript

overflow_meme's tweet image. How to change the width of lines in a PDF/PostScript file stackoverflow.com/questions/5546… #ghostscript #pdf #postscript

Think I'm gonna call it #Ghostscript oh no wait ....😂 #Exiles #B6 The Ghost Dimension script v0.1z

EsRevorTeR's tweet image. Think I'm gonna call it #Ghostscript oh no wait ....😂
#Exiles #B6 The Ghost Dimension script v0.1z

Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts…

YourAnonRiots's tweet image. Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks  thehackernews.com/2018/08/ghosts… …

Ghostscript to "shrink" files after saving on file system. Using PHP script and possible a CRON job stackoverflow.com/questions/6896… #ghostscript #php #mysqli #cron #exec

overflow_meme's tweet image. Ghostscript to "shrink" files after saving on file system. Using PHP script and possible a CRON job stackoverflow.com/questions/6896… #ghostscript #php #mysqli #cron #exec

0day RCE in #Ghostscript going wild. This issue was found independently by @emil_lerner and @jensvoid. Fun fact: GS is everywhere. Even LESS(1) is affected.


Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published "Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by @mmolgtm

TheHackersNews's tweet image. Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published
 
"Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by @mmolgtm

TheHackersNews : Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts… (via Twitter )

byHoRRoR's tweet image. TheHackersNews : Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…  (via Twitter )
byHoRRoR's tweet image. TheHackersNews : Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…  (via Twitter )

Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts…

TheHackersNews's tweet image. Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…


TheHackersNews : RT TheHackersNews: Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts… (via Twitter )

byHoRRoR's tweet image. TheHackersNews : RT TheHackersNews: Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…  (via Twitter )
byHoRRoR's tweet image. TheHackersNews : RT TheHackersNews: Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…  (via Twitter )

Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks thehackernews.com/2018/08/ghosts…

TheHackersNews's tweet image. Critical Sandbox Bypass Vulnerabilities in #Ghostscript Interpreter Could Expose Many Systems and Software to Remote Code Execution Attacks

thehackernews.com/2018/08/ghosts…


TheHackersNews : Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published "Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by mmolgtm … )

byHoRRoR's tweet image. TheHackersNews : Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published
 
"Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by mmolgtm … )

Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published "Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by @mmolgtm

TheHackersNews's tweet image. Technical details for a recently discovered sandbox escape bug (CVE-2018-19475) in #Ghostscript (before 9.26) has been published
 
"Ghostscript shell command execution in SAFER mode" → lgtm.com/blog/ghostscri… by @mmolgtm


Loading...

Something went wrong.


Something went wrong.


United States Trends