Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28879

EPSS 34.22% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-28879

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Artifex Software Ghostscript 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Artifex Software Ghostscript是美国Artifex Software公司的一款开源的PostScript(一种用于电子产业和桌面出版领域的页面描述语言和编程语言)解析器。该产品可显示Postscript文件以及在非Postscript打印机上打印Postscript文件。 Artifex Ghostscript 10.01.0版本及之前版本存在安全漏洞,该漏洞源于存在缓冲区溢出问题,导致内部数据损坏。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-28879

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-28879

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-03-31 · 24 CVEs total

CVE-2023-17736.3 MEDIUMRockoa Configuration File webmainConfig.php code injection
CVE-2023-17845.3 MEDIUMjeecg-boot API Documentation improper authentication
CVE-2023-17723.5 LOWDataGear Diagram Type cross site scripting
CVE-2023-29141MediaWiki 安全漏洞
CVE-2023-29140MediaWiki 安全漏洞
CVE-2023-29139MediaWiki 安全漏洞
CVE-2023-29137MediaWiki 安全漏洞
CVE-2023-28877VTEX apps-graphql 安全漏洞
CVE-2023-28862LemonLDAP::NG 授权问题漏洞
CVE-2023-28464Linux kernel 资源管理错误漏洞
CVE-2023-27163request-baskets 代码问题漏洞
CVE-2023-27162openapi-generator 代码问题漏洞
CVE-2023-27160forem 代码问题漏洞
CVE-2023-27159Appwrite 代码问题漏洞
CVE-2023-26925D-Link DIR-882 安全漏洞
CVE-2023-26858PrestaSHp faqs SQL注入漏洞
CVE-2023-26830Gladinet CentreStack 代码问题漏洞
CVE-2023-26829Gladinet CentreStack 安全漏洞
CVE-2023-23594SATO America CL4NX 安全漏洞
CVE-2022-4899Zstandard 资源管理错误漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-28879

No comments yet


Leave a comment