Browse all 3 CVE security advisories affecting Artifex Software Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Artifex Software Inc. develops Ghostscript, a widely used interpreter for PostScript and PDF files, enabling document rendering and conversion across platforms. Historically, their products have been susceptible to remote code execution vulnerabilities due to unsafe script handling, along with cross-site scripting flaws and privilege escalation issues through improper input validation. While no major public security incidents have been documented, the three CVEs on record highlight ongoing challenges in securing complex parsing operations against malformed inputs, emphasizing the need for robust sandboxing and input sanitization in document processing engines.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-40505 | MuPDF < 1.27 mutool ANSI Injection via Metadata — MuPDFCWE-150 | 3.3 | Low | 2026-04-16 |
| CVE-2016-8728 | Artifex MuPDF 缓冲区错误漏洞 — MuPDF | 7.8 | - | 2018-04-24 |
| CVE-2016-8729 | Artifex MuPDF JBIG2解析器缓冲区错误漏洞 — MuPDF | 7.8 | - | 2018-04-24 |
This page lists every published CVE security advisory associated with Artifex Software Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.