NVD Description Note: Versions mentioned in the description apply only to the upstream ghostscript-doc package and not the ghostscript-doc package as distributed by Oracle . TOTAL CVE Records: 217725 NOTICE: Transition to the all-new CVE website at WWW. 8, signifying its potential to facilitate…Summary: CVE-2023-36664 ghostscript: vulnerable to OS command injection due to mishand. php. 2-64570 Update 1 (2023-06-19) Important notes. Max Base ScoreCVE - CVE-2023-31664. To protect against this threat, it is essential for users to update their software to the latest version and stay informed about any future security releases or patches. NVD Analysts use publicly available information to associate vector strings and CVSS scores. Fixed a security vulnerability regarding OpenSSL (CVE-2023-1255). I've been an Ambulance driver with my Father in AKF since I was 10y old. 6/7. 11. Upstream information. el9_2 0. Fixed a security vulnerability regarding Ghostscript (CVE-2023-36664). 【訳】人気のオープンソースPDFライブラリGhostscriptにクリティカルなRCEが見つかる 【概要】 公開日 登録日 CVE番号 NVD ベンダー CVSS v3 CWE 脆弱性 備考 2023/07/12 2023/06/25 CVE-2023-36664 NVD ベンダー - - - 【ニュース】 Critical RCE. CVE-2023-36664. Keymaster. Home > CVE > CVE-2023-31664. Changes in percentiles are ignored as they change everyday, because a change in a single EPSS score affects every other EPSS percentile. Keywords: Status: CLOSED ERRATA Alias: CVE-2023-36664 Product: Security Response Classification: Other Component: vulnerability Sub Component: Version: unspecified Hardware: All. md","contentType":"file"}],"totalCount":1. 2 leads to code execution (CVSS score 9. Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability. 1. Home > CVE > CVE-2023-3664 CVE-ID; CVE-2023-3664: Learn more at National Vulnerability Database (NVD) • CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP. CVSS v3. maestrion Posted 2023-08-01 Thank you so much for a great release of the best operating system in the world! progmatist Posted 2022-05-13{"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"README. Am 11. 50~dfsg-5ubuntu4. Description; ai-dev aicombinationsonfly before v0. CVE-2023-4042: A flaw was found in ghostscript. 5 and 3. 2. CVE-2023-0950 Array Index UnderFlow in Calc Formula Parsing. Mitre link : CVE-2020-36664. A logged in Windows user can leverage functionality of the Pulse Secure / Ivanti Secure Access Client or Pulse Secure Installer Service to carry out a privilege escalation on the user machine. prototype by adding and overwriting its data and functions. This vulnerability is due to insufficient request validation when using the REST API feature. 0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the. 9 and below, 6. x through 1. The most common reason for this is that publicly available information does not provide sufficient. NOTICE: Legacy CVE List download formats will be phased out beginning January 1, 2024. CVE-2023-36664 Published on: Not Yet Published Last Modified on: 09/17/2023 07:15:00 AM UTC CVE-2023-36664 Source: Mitre Source: NIST CVE. 8, and could allow for code execution caused by Ghostscript mishandling permission validation for pipe devices. Latest information about CVE-2023-24329 (Python Blocklist Bypass) Latest information about CVE-2023-36664 (Proof-of-Concept Exploit in Ghostscript) Latest information about Text4Shell vulnerability CVE-2022-42889 in VertiGIS products; FME Server Security Update; Information about Spring4Shell vulnerability CVE-2022-22965;. Description "protobuf. 01. 2 due to a critical security flaw in lower versions. VertiGIS utilise cette page pour fournir des informations centralisées sur la vulnérabilité critique CVE-2023-36664, connue sous le nom de "Proof-of-Concept Exploit in Ghostscript", divulguée le 11. py --HOST 127. TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things - GitHub - hktalent/TOP: TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload ThingsThe ArcGIS Server Security 2021 Update 2 Patch is now available for ArcGIS Enterprise 10. 11 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Published: 27 June 2023. 01. 2-64570 Update 3To dig deeper into the technical aspects, refer to CVE-2023-36664 in the Common Vulnerabilities and Exposures (CVE) database. 6 import argparse. The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. JSON object : View. Detail. CVE-2022-36963. This allows Hazelcast Management Center users to view some of the secrets. Updated to Ghostscript 10. For example: nc -l -p 1234. CVE (2023-34298) Ivanti Secure Access Client Local Privilege Escalation. 2. Platform Package. 50~dfsg-5ubuntu4. Ghostscript command injection vulnerability PoC (CVE-2023-36664) General Vulnerability disclosed in Ghostscript prior to version 10. 1. Kroll Launches Cyber Partner Program Delivering Lifetime Returns. For those unacquainted with the backstage of software utilities, Ghostscript is the unsung hero of the PostScript and PDF world. 2 By Artifex - Wednesday, June 28, 2023. 2. twitter (link is external) facebook (link is external) linkedin (link is external) youtube (link is external) rss; govdelivery (link is. x and below. 56. CVE. CVE-2023-36664: N/A: N/A: Not Vulnerable. The identification of this vulnerability is CVE-2023-36664 since 06/25/2023. September 2023 Patch Tuesday is here, with fixes for actively exploited vulnerabilities: CVE-2023-26369, CVE-2023-36761, and CVE-2023-36802. 4. 8) CVE-2023-36664 in libgs | CVE-2023-36664. 7. Lightweight Endpoint Agent. Version: 7. CVSS v3 Base Score. 6. Ubuntu Local Privilege Escalation (CVE-2023-2640 & CVE-2023-32629) Ghostscript (CVE-2023-36664) xmapp. Note that Nessus has not tested for this issue but has instead. To mitigate this, the fix has been. 0, there is a buffer overflow lea. Nitro Pro v14. IT-Integrated Remediation Projects. Open jpotier opened this issue Jul 13, 2023 · 0 comments · May be fixed by #243316. WebKit. Exploit for CVE-2023-36664 2023-08-12T18:33:57 Description # Ghostscript command injection vulnerability PoC (CVE-2023-3666. Easy-to-Use RESTful API. Severity CVSS. 9. 0 and 2. 04 LTS / 22. 0. 2. VertiGIS nutzt diese Seite, um zentrale Informationen über die Sicherheitslücke CVE-2023-36664, bekannt als "Proof-of-Concept Exploit in Ghostscript", die am 11. 2-64570 Update 1 (2023-06-19) Important notes. Gentoo Linux Security Advisory 202309-03. April 3, 2023: Ghostscript/GhostPDL 10. g. 2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix). exe file on the target computer. – Scott Cheney, Manager of. Resolution. The Ghostscript suite contains utilities for rendering PostScript and PDF documents. 34 installer revision 2 Fix security issues in Ghostscript (CVE-2023-36664), OpenSSL (#9397 and more fixed in 3. - fix for CVE-2023-38559 - Resolves: rhbz#2224372 [9. This vulnerability affects the function setTitle of the file SEOMeta. A security vulnerability in Artifex Ghostscript. The CNA has not provided a score within the CVE. A security vulnerability has been identified in Artifex Ghostscript, which is used for file rendering and conversion. the latest industry news and security expertise. The software mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix). A high-severity vulnerability in Ghostscript tagged as CVE-2023-36664 could allow an attacker to take over a routine and even execute commands on systems. A security issue rated high has been found in Ghostscript (CVE-2023-36664). Go to for: CVSS Scores CPE Info CVE List. 2. CVE-2023-20593 at MITRE. The NVD will only audit a subset of scores provided by this CNA. Security issue in PowerFactory licence component (CVE-2023-3935) Latest information about CVE-2023-36664 (Proof-of-Concept Exploit in Ghostscript) in context UT for ArcGIS; UT for ArcGIS R3 Desktop Build 6705; UT for ArcGIS R3 Server Build 6705; UT for ArcGIS R3 Server Build 6604; UT for ArcGIS R3 Desktop Build 6604; UT CBYD 10. The remote Fedora 37 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2023-83c805b441 advisory. CVE-2023-36464 at MITRE. CVSS 3. The software does not properly handle permission validation for pipe devices, which could. Report As Exploited in the Wild. Execute the compiled reverse_shell. Legacy CVE List download formats will be phased out beginning January. Hey There! My name is Usman! I'm 18y old individual from Pakistan. The vulnerability has a Common Vulnerability Scoring System (CVSSv3) score of 9. CVE-2022-32744 Common Vulnerabilities and Exposures. 0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp. This vulnerability affects the function setTitle of the file SEOMeta. Go to for: CVSS Scores. Published: 2023-10-10 Updated: 2023-11-06. 2 is able to address this issue. [German]A security researcher has developed a proof of concept to exploit a remote code execution vulnerability CVE-2023-36664, rated critical (CVSS score 9. 01. 5. CVE. This vulnerability, CVE-2023-36664, was assigned a CVSS score of 9. It arose from Ghostscript's handling of filenames for output, which could be manipulated to send the output into a pipe rather than a regular file. CVE-2022-36664 Password Manager for IIS 20 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManagerdll ResultURL parameter authentication complexity vector not available not available not available confidentiality integrity availability not available not available not available CVSS Score: not available References. June 27, 2023: Ghostscript/GhostPDL 10. 01. 7. Updated : 2023-03-09 21:02. 8. 54. 2023) – Hinweis bezüglich CorelDRAW Graphics Suite und CorelDRAW Technical Suite. 8. See our blog post for more informationCVE-2023-36664. Susanne. twitter (link is external) facebook (link is external) linkedin (link is external) youtube (link. - Artifex Ghostscript through 10. TOTAL CVE Records: Transition to the all-new CVE website at Legacy CVE List download formats will be phased out beginning January 1, 2024 New CVE List download format is. 1 allows memory corruption. 4. do of WSO2 API Manager before 4. 8 out of 10. 0 7. Juli 2023 wurde zu einer kritischen Schwachstelle in der Open-Source PDF Bibliothek Ghostscript ein Proof-of-Concept Exploit veröffentlicht [KRO2023]. 4 # Tested with Ghostscript version 10. The most common reason for this is that publicly available information does not provide sufficient detail or that information simply was not available at the time the CVSS vector string was assigned. Notifications Fork 14; Star 58. This could have led to malicious websites storing tracking data. Alma Linux: CVE-2023-36664: Important: ghostscript security update (ALSA-2023-5459). We also display any CVSS information provided within the CVE List from the CNA. Severity CVSS. Addressed in LibreOffice 7. This patch also addresses CVE-2023-28319 CVE-2023-28320 CVE-2023-28321 CVE-2023-28322. 1 which has a CVE-2023-36664. CVE reports. CVE-ID; CVE-2023-36764: Learn more at National Vulnerability Database (NVD)NVD Analysts use publicly available information to associate vector strings and CVSS scores. 2. Provide mediation and resolution when conflict arises between CNAs or. 2 mishandles permission validation for pipe devices (with the %pipe% prefix or the pipe character prefix). Artifex Ghostscript. CVE. . 8. A type confusion vulnerability exists in the Javascript checkThisBox method as implemented in Foxit Reader 12. CVE-2023-0950 Array Index UnderFlow in Calc Formula Parsing. Artifex Ghostscript through 10. 2 version that allows for remote code execution. VertiGIS nutzt diese Seite, um zentrale Informationen über die Sicherheitslücke CVE-2023-36664, bekannt als "Proof-of-Concept Exploit in Ghostscript", die am 11. Description. Looking for email notifications? Please create your profile with your preferred email address to sign up for notifications. 01. jaikishantulswani opened this issue Aug 17, 2023 · 0 comments Comments. A vulnerability denoted as CVE-2023–36664 emerged in Ghostscript versions prior to 10. Provide CNA information on automated ID reservation and publication. CVE-2023-2255 Remote documents loaded without prompt via IFrame. Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Updates are released. This affects ADC hosts configured in any of the "gateway" roles (VPN. CVE cache of the official CVE List in CVE JSON 5. Published: 20 August 2023. No known source code Dependabot alerts are not supported on this advisory because it does not have a package. 7. 36. This vulnerability is due to insufficient validation of user-supplied input. 1. The software mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix). 4. Severity. 10. Specially crafted Javascript code inside a malicious PDF document can cause memory corruption and lead to remote code execution. g. 54. 0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. 1 release fixes CVE-2023-28879. SAP NetWeaver Application Server ABAP (Applications based on Web Dynpro ABAP), versions - SAP_UI - 750,752,753,754,755, SAP_BASIS - 702, 731 does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. 0. 1-8. (CVE-2023-36664) Note that Nessus has not tested. System administrators: take the time to install this patch at your earliest opportunity. 6/7. CVE-2022-32744 Common Vulnerabilities and Exposures. SLES15-SP4-CHOST-BYOS: kernel-default: Released: SLES15-SP4-CHOST-BYOS-AliyunFixed a security vulnerability regarding Ghostscript (CVE-2023-36664). Version: 7. 1 release fixes CVE-2023-28879. The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. As of July 11, 2023 (patch day), another 0-day vulnerability (CVE-2023-36884) has become public, which allows remote code execution in Microsoft Windows and Office. NOTICE: Legacy CVE List download formats will be phased out beginning January 1, 2024. 01. 8, and impacts all versions of Ghostscript before 10. 3. Fixed a security vulnerability regarding Sudo (CVE-2023-22809). Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them. For more. This issue was introduced in pull request #969 and. Previous message (by thread): [ubuntu/focal-security] ghostscript 9. 0~dfsg-11+deb12u1. EPM 2022 - EOF May 2023CVE-2023-36664 affecting Ghostscript before version 10. Vector: CVSS:3. 01. 4. 9, 10. See what this means. 0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp. 13-0615 or above. The NVD will only audit a subset of scores provided by this CNA. 5. The record creation date may. Your Synology NAS may not notify you of this DSM update because of the following reasons. Note: It is possible that the NVD CVSS may not match that of the CNA. This patch addresses one high severity vulnerability and three moderate severity vulnerabilities. Kroll Cyber Threat Intelligence expert, Dave Truman, walks through a proof of concept for the recent Ghostscript vulnerability, CVE-2023-36664, that could al. The vulnerability has already been exploited by hackers from the group Storm-0978 for attacks on various targets (e. 2023-07-16T01:27:12. A reflected cross-site scripting (XSS) vulnerability in /authenticationendpoint/login. - Artifex Ghostscript through 10. Timescales for releasing a fix vary according to complexity and severity. Fixed a security vulnerability regarding Ghostscript (CVE-2023-36664). Description. Lightweight Endpoint Agent; Live Dashboards; Real Risk Prioritization; IT-Integrated Remediation Projects; Cloud, Virtual, and Container Assessment; Integrated Threat Feeds;CVE-2023-36664 affects all Ghostscript/GhostPDL versions prior to 10. ORG and CVE Record Format JSON are underway. CVE-2023-36664. 2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix). The list is not intended to be complete. This patch addresses one high severity vulnerability and three moderate severity vulnerabilities. This vulnerability has been attributed a sky-high CVSS score of 9. 7. 1 # @jakabakos 2 # Exploit script for CVE-2023-36664 3 # Injects code into a PS or EPS file that is triggered when opened with Ghostscript version prior to 10. Fixed a security vulnerability regarding Ghostscript (CVE-2023-36664). 2 through 5. 7. org? This cannot be undone. 01. 30 to 8. 2023-07-14 at 16:55 #63280. CWE-79. 8 (Accepted) Next message (by thread): [ubuntu/focal-updates] ubuntu-advantage-tools. Postscript, PDF and EPS. Affected Packages. The summary by CVE is: Artifex Ghostscript through 10. New CVE List download format is available now. IT-Integrated Remediation Projects. If you want. . for example Ghostscript Debian has version 10 and has fixed CVE-2023-36664 in july-3-2023 but its Aug-3-2023 and Mx-linux has not implemented this correction. On June 25, 2023, a vulnerability was disclosed in Ghostscript CVE-2023-36664 prior to the 10. Amazon Linux 2023 : ghostscript, ghostscript-gtk, ghostscript-tools-dvipdf (ALAS2023-2023-276)CVE-2023-0975 – Improper Preservation of Permissions: A vulnerability exists in TA for Windows 5. 2, which is the latest available version. 2. User would need to open a malicious file to trigger the vulnerability. View records in the new format using the CVE ID lookup above or download them on the Downloads page. Description The remote Fedora 39 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2023-b240ebd9aa advisory. Related CVEs. x CVSS Version 2. Version: 7. CVE-2023-36664: N/A: N/A: Not Vulnerable. 2 # Exploit script for CVE-2023-36664. 19 when executing the GregorianCalender. CVSS Version 2. New CVE List download format is available now. Language: C . We will see that the file has been extracted and then we can do a. 01. 0. MLIST: [oss-security] 20220728 CVE-2022-36364: Apache Calcite Avatica JDBC driver `connection property can be used as an RCE vector. We also display any CVSS information provided within the CVE List from the CNA. 01. Overview. Home > CVE > CVE. 0-12] - fix for CVE-2023-36664 - Resolves: rhbz#2217810. For more details look. - Artifex Ghostscript through 10. An issue was discovered in MediaWiki before 1. See How to fix? for Oracle:9 relevant fixed versions and status. Die Schwachstelle mit der CVE-Nummer CVE-2023-36664 und einer CVSS-Bewertung von 9. com Mon Jul 10 13:58:55 UTC 2023. may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. 2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe. NVD Analysts use publicly available information to associate vector strings and CVSS scores. Description. There are a total of five vulnerabilities addressed in the patch: CVE-2023-24483 (allows for privilege escalation), CVE-2023-24484 (allows for access to log files otherwise out of. 01. exe" --filename file. 15. CVE-ID; CVE-2023-36665: Learn more at National Vulnerability Database (NVD) • CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information. For more information about these vulnerabilities, see the Details section of this advisory. Description. CVE-2023-43115: Updated. 2-64570 Update 3 Am 11. 1. 1. 10 / 23. This article will be updated as new information becomes available. 01. 1. Score breakdown. Was ZDI-CAN-15876. 5. Source: CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) References: DSA-5446-1 CVE-2023-36664 Common Vulnerabilities and Exposures. Debian released a security advisory mentioning possible execution of arbitrary commands: The flaw is tracked as CVE-2023-36664, having a CVSS v3 rating of 9. Security Vulnerability Fixed in Ghostscript 10. Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. 2. 4. Vector: CVSS:3. 8. 9. 01. April 3, 2023: Ghostscript/GhostPDL 10. When. Version: 7. Microsoft WordPad Information Disclosure Vulnerability. 2-64570 Update 3Am 11. This vulnerability affects the function setTitle of the file SEOMeta. New CVE List download format is available now. - fix for CVE-2023-38559 - Resolves: rhbz#2224372 [9. CVSS. NVD Analysts use publicly available information to associate vector strings and CVSS scores. Read developer tutorials and download Red. 6, and 5. 64) Jul, 25 2023. . yoctoproject. Juli 2023 veröffentlicht wurde, und ihre Auswirkungen auf Produkte der 3A/LM-Produktfamilie bereitzustellen. Third-Party Component CVEs More Information; JRE-8u381: CVE-2023-22043, CVE-2023-22045, CVE-2023-22049: See NVD link below for individual scores for each CVE. - GitHub - dhmosfunk/CVE-2023-25690-POC: CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2. 01. Title: CVE-2023-1183: Arbitrary File Write in hsqldb 1. Prerequisites: virtualenv --python=python3 . Read more, 8:58 AM · Jul 18, 2023Thomas Boldt. Developer Tools Snyk Learn Snyk Advisor Code Checker About Snyk Snyk Vulnerability Database; Linux; oracle; oracle:9; ghostscript; CVE-2023-36664. 2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix). - Outcome of the update: SUCCESSFUL - DSM version prior update: DSM 7. PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability. 0 together with Spring Boot 2. 10.