ghostscript-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ghostscript-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

<0:9.54.0-9.amzn2.0.13
  • H
Stack-based Buffer Overflow

<0:9.54.0-9.amzn2.0.13
  • H
Stack-based Buffer Overflow

<0:9.54.0-9.amzn2.0.13
  • M
Improper Resource Shutdown or Release

<0:9.54.0-9.amzn2.0.12
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:9.54.0-9.amzn2.0.11
  • H
Buffer Overflow

<0:9.54.0-9.amzn2.0.10
  • H
Buffer Overflow

<0:9.54.0-9.amzn2.0.10
  • H
Directory Traversal

<0:9.54.0-9.amzn2.0.10
  • H
Buffer Overflow

<0:9.54.0-9.amzn2.0.9
  • H
Buffer Overflow

<0:9.54.0-9.amzn2.0.9
  • H
Buffer Overflow

<0:9.54.0-9.amzn2.0.9
  • M
Out-of-bounds Read

<0:9.54.0-9.amzn2.0.8
  • H
Integer Overflow or Wraparound

<0:9.54.0-9.amzn2.0.7
  • H
Access of Uninitialized Pointer

<0:9.54.0-9.amzn2.0.7
  • H
Out-of-bounds Read

<0:9.54.0-9.amzn2.0.7
  • M
Directory Traversal

<0:9.54.0-9.amzn2.0.6
  • M
Directory Traversal

<0:9.54.0-9.amzn2.0.5
  • M
Memory Leak

<0:9.54.0-9.amzn2.0.5
  • M
Directory Traversal

<0:9.54.0-9.amzn2.0.6
  • H
Improper Input Validation

<0:9.54.0-9.amzn2.0.4
  • H
Improper Input Validation

<0:9.54.0-9.amzn2.0.3
  • M
Improper Check for Unusual or Exceptional Conditions

<0:9.54.0-9.amzn2.0.2
  • H
OS Command Injection

<0:9.54.0-9.amzn2.0.1
  • H
Use After Free

<0:9.25-5.amzn2.0.9
  • H
Use After Free

<0:9.25-5.amzn2.0.8
  • M
Divide By Zero

<0:9.25-5.amzn2.0.7
  • M
Improper Input Validation

<0:9.25-5.amzn2.0.7
  • M
Out-of-bounds Read

<0:9.25-5.amzn2.0.6
  • H
Out-of-bounds Write

<0:9.25-5.amzn2.0.5
  • M
Out-of-bounds Read

<0:9.25-5.amzn2.0.4
  • H
Out-of-bounds Write

<0:9.25-5.amzn2.0.3
  • L
Improper Use of Validation Framework

<0:9.25-5.amzn2.0.2
  • H
Out-of-Bounds

<0:9.25-5.amzn2.0.1
  • H
CVE-2019-3838

<0:9.25-5.amzn2
  • H
CVE-2019-6116

<0:9.25-5.amzn2
  • H
CVE-2019-3839

<0:9.25-5.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:9.25-5.amzn2
  • H
Missing Authorization

<0:9.25-5.amzn2
  • H
Information Exposure

<0:9.25-5.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:9.25-5.amzn2
  • H
Incorrect Authorization

<0:9.25-5.amzn2
  • H
Incorrect Authorization

<0:9.25-5.amzn2
  • H
Incorrect Type Conversion or Cast

<0:9.25-5.amzn2
  • H
Incorrect Authorization

<0:9.25-5.amzn2
  • H
Incorrect Type Conversion or Cast

<0:9.25-5.amzn2
  • H
CVE-2018-17183

<0:9.25-5.amzn2
  • H
CVE-2018-19475

<0:9.25-5.amzn2
  • H
Incorrect Type Conversion or Cast

<0:9.25-5.amzn2
  • H
CVE-2018-18284

<0:9.25-5.amzn2
  • H
CVE-2018-19409

<0:9.25-5.amzn2
  • H
Information Exposure

<0:9.25-5.amzn2
  • H
Out-of-Bounds

<0:9.06-8.amzn2.0.5
  • H
CVE-2018-16802

<0:9.06-8.amzn2.0.5
  • H
Incorrect Type Conversion or Cast

<0:9.06-8.amzn2.0.5
  • H
Use of Uninitialized Resource

<0:9.06-8.amzn2.0.5
  • H
Use After Free

<0:9.06-8.amzn2.0.5
  • H
Out-of-bounds Write

<0:9.06-8.amzn2.0.5
  • H
Incorrect Type Conversion or Cast

<0:9.06-8.amzn2.0.5
  • H
CVE-2018-16509

<0:9.06-8.amzn2.0.5
  • H
Incorrect Type Conversion or Cast

<0:9.06-8.amzn2.0.5
  • H
Information Exposure

<0:9.06-8.amzn2.0.5
  • H
Incorrect Type Conversion or Cast

<0:9.06-8.amzn2.0.5
  • H
CVE-2018-15908

<0:9.06-8.amzn2.0.5
  • H
Use After Free

<0:9.06-8.amzn2.0.5
  • H
Information Exposure

<0:9.06-8.amzn2.0.5
  • M
Out-of-Bounds

<0:9.06-2.amzn2.0.2