https://cve.circl.lu/comments/feedMost recent comment.2024-12-12T13:39:46.670249+00:00Vulnerability Lookupinfo@circl.lupython-feedgenContains only the most 10 recent comments.https://cve.circl.lu/comment/5b42805e-e354-4697-945f-8c62633ca40fDetecting script in Postscript - if you run a vulnerable version of Ghostscript2024-12-12T13:39:46.677044+00:00Alexandre Dulaunoyhttp://cve.circl.lu/user/adulauDetecting script in Postscript - if you run a vulnerable version of Ghostscript
https://codeanlabs.com/wp-content/uploads/2024/06/CVE-2024-29510_testkit.ps
~~~
ghostscript -q -dNODISPLAY -dBATCH CVE-2024-29510_testkit.ps
~~~
For more details about the vulnerability [https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/](https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/)
Reference to the patch: [https://ghostscript.readthedocs.io/en/gs10.03.1/News.html?utm_source=ghostscript&utm_medium=website&utm_content=inline-link#Version10.03.1](https://ghostscript.readthedocs.io/en/gs10.03.1/News.html?utm_source=ghostscript&utm_medium=website&utm_content=inline-link#Version10.03.1)2024-07-10T07:33:50.157197+00:00