33 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-29510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T19:15:03.320",
"lastModified": "2024-07-05T12:55:51.367",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device."
},
{
"lang": "es",
"value": "Artifex Ghostscript anterior a 10.03.1 permite la corrupci\u00f3n de la memoria y una omisi\u00f3n M\u00c1S SEGURA de la sandbox mediante la inyecci\u00f3n de cadena de formato con un dispositivo uniprint."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=707662",
"source": "cve@mitre.org"
},
{
"url": "https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/07/03/7",
"source": "cve@mitre.org"
}
]
}