News
Using PDFBox 1.8.9 and Ghostscript to extract & view Word and Character coords from PDF The trick is using System.Reflection to expose hidden (private) properties of the PDFbox Page object.
It seems that ocrmypdf is not compatible with ghostscript 9.28. I am seeing test suite errors like these when I try to run ocrmypdf's test suite in Debian unstable (with the latest pikepdf): /usr/l ...
Google Project Zero's security researcher has discovered a critical remote code execution (RCE) vulnerability in Ghostscript—an open source interpreter for Adobe Systems' PostScript and PDF page ...
A remote, unauthenticated attacker could execute arbitrary commands on systems with the privileges of the Ghostscript code.
Infosec circles are awash with chatter about a vulnerability in Ghostscript some experts believe could be the cause of several major breaches in the coming months. Ghostscript is a Postscript and ...
Security researchers are raising the alarm on a Ghostscript vulnerability leading to remote code execution that has already been exploited in the wild.
Ghostscript, an open-source interpreter for PostScript language and PDF files widely used in Linux, has been found vulnerable to a critical-severity remote code execution flaw.
Data leak vulnerabilities in Ghostscript could allow an attacker to take over a routine and even execute commands on systems.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results