{"uuid": "5b42805e-e354-4697-945f-8c62633ca40f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "title": "Detecting script in Postscript - if you run a vulnerable version of Ghostscript", "description": "Detecting script in Postscript - if you run a vulnerable version of Ghostscript\n\nhttps://codeanlabs.com/wp-content/uploads/2024/06/CVE-2024-29510_testkit.ps\n\n~~~\nghostscript -q -dNODISPLAY -dBATCH CVE-2024-29510_testkit.ps\n~~~\n\nFor more details about the vulnerability [https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/](https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/)\n\nReference to the patch: [https://ghostscript.readthedocs.io/en/gs10.03.1/News.html?utm_source=ghostscript&utm_medium=website&utm_content=inline-link#Version10.03.1](https://ghostscript.readthedocs.io/en/gs10.03.1/News.html?utm_source=ghostscript&utm_medium=website&utm_content=inline-link#Version10.03.1)", "description_format": "markdown", "vulnerability": "CVE-2024-29510", "creation_timestamp": "2024-07-10T07:33:50.157197+00:00", "timestamp": "2024-07-10T07:33:50.157197+00:00", "related_vulnerabilities": [], "author": {"login": "adulau", "name": "Alexandre Dulaunoy", "uuid": "c933734a-9be8-4142-889e-26e95c752803"}}
