Ghostscript security update to fix CVE-2018-16509 bypass vulnerabilit
Reporter | Title | Published | Views | Family All 156 |
---|---|---|---|---|
![]() | Privilege Escalation | 15 Jan 201909:27 | – | veracode |
![]() | Arbitrary Command Execution | 15 Jan 201909:27 | – | veracode |
![]() | Design/Logic Flaw | 5 Sep 201806:29 | – | prion |
![]() | Design/Logic Flaw | 10 Sep 201816:29 | – | prion |
![]() | Design/Logic Flaw | 3 Dec 201817:29 | – | prion |
![]() | Oracle Linux 6 : ghostscript (ELSA-2018-3760) | 4 Dec 201800:00 | – | nessus |
![]() | CentOS 6 : ghostscript (CESA-2018:3760) | 7 Dec 201800:00 | – | nessus |
![]() | Amazon Linux AMI : ghostscript (ALAS-2018-1137) | 21 Dec 201800:00 | – | nessus |
![]() | Linux Distros Unpatched Vulnerability : CVE-2018-16509 | 4 Mar 202500:00 | – | nessus |
![]() | RHEL 6 : ghostscript (RHSA-2018:3760) | 4 Dec 201800:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | ppc | ghostscript-devel | 8.70-24.el6_10.2 | ghostscript-devel-8.70-24.el6_10.2.ppc.rpm |
RedHat | 6 | s390 | ghostscript-devel | 8.70-24.el6_10.2 | ghostscript-devel-8.70-24.el6_10.2.s390.rpm |
RedHat | 6 | s390x | ghostscript | 8.70-24.el6_10.2 | ghostscript-8.70-24.el6_10.2.s390x.rpm |
RedHat | 6 | ppc64 | ghostscript | 8.70-24.el6_10.2 | ghostscript-8.70-24.el6_10.2.ppc64.rpm |
RedHat | 6 | i686 | ghostscript-doc | 8.70-24.el6_10.2 | ghostscript-doc-8.70-24.el6_10.2.i686.rpm |
RedHat | 6 | i686 | ghostscript-devel | 8.70-24.el6_10.2 | ghostscript-devel-8.70-24.el6_10.2.i686.rpm |
RedHat | 6 | s390x | ghostscript-gtk | 8.70-24.el6_10.2 | ghostscript-gtk-8.70-24.el6_10.2.s390x.rpm |
RedHat | 6 | i686 | ghostscript-debuginfo | 8.70-24.el6_10.2 | ghostscript-debuginfo-8.70-24.el6_10.2.i686.rpm |
RedHat | 6 | i686 | ghostscript | 8.70-24.el6_10.2 | ghostscript-8.70-24.el6_10.2.i686.rpm |
RedHat | 6 | s390 | ghostscript | 8.70-24.el6_10.2 | ghostscript-8.70-24.el6_10.2.s390.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo