Known Vulnerabilities for Ghostscript by Artifex

Listed below are 10 of the newest known vulnerabilities associated with "Ghostscript" by "Artifex".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-43115 json In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript docume... 9.8 - CRITICAL 2023-09-18 2023-11-07
CVE-2023-38560 json An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attac... 5.5 - MEDIUM 2023-08-01 2023-11-07
CVE-2023-38559 json A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local... 5.5 - MEDIUM 2023-08-01 2024-03-08
CVE-2023-36664 json Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe c... 7.8 - HIGH 2023-06-25 2023-11-07
CVE-2023-28879 json In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the Po... 9.8 - CRITICAL 2023-03-31 2023-11-07
CVE-2023-4042 json A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as ... 5.5 - MEDIUM 2023-08-23 2023-11-14
CVE-2022-2085 json A NULL pointer dereference vulnerability was found in Ghostscript, which occurs when it tries to render a large number of bit... 5.5 - MEDIUM 2022-06-16 2023-09-17
CVE-2021-45949 json Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_co... 5.5 - MEDIUM 2022-01-01 2023-11-07
CVE-2021-45944 json Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and i... 5.5 - MEDIUM 2022-01-01 2023-11-07
CVE-2021-3781 json A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a spe... 9.9 - CRITICAL 2022-02-16 2023-06-26

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationArtifexGhostscript9.53.1
ApplicationArtifexGhostscript9.53.0
ApplicationArtifexGhostscript9.53.0
ApplicationArtifexGhostscript9.52
ApplicationArtifexGhostscript9.51
ApplicationArtifexGhostscript9.51
ApplicationArtifexGhostscript9.50
ApplicationArtifexGhostscript9.28
ApplicationArtifexGhostscript9.27
ApplicationArtifexGhostscript9.26
ApplicationArtifexGhostscript9.25
ApplicationArtifexGhostscript9.24
ApplicationArtifexGhostscript9.23
ApplicationArtifexGhostscript9.22
ApplicationArtifexGhostscript9.21
ApplicationArtifexGhostscript9.20
ApplicationArtifexGhostscript9.19
ApplicationArtifexGhostscript9.18
ApplicationArtifexGhostscript9.16
ApplicationArtifexGhostscript9.15
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report