Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ghostscript Vendor: artifex

About This Product

ghostscript is a software product offered by artifex. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 129 known vulnerabilities affecting artifex ghostscript. This includes 12 critical-severity issues and 56 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2025, indicating a sustained research interest and ongoing security attention. 60 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-7207 2017-03-21 2025-04-20 5.5 4.3 Likely
CVE-2016-10217 2017-04-03 2025-04-20 5.5 4.3 Likely
CVE-2016-10218 2017-04-03 2025-04-20 5.5 4.3 Likely
CVE-2016-10219 2017-04-03 2025-04-20 5.5 4.3 Likely
CVE-2016-10220 2017-04-03 2025-04-20 5.5 4.3 Likely
CVE-2017-5951 2017-04-03 2025-04-20 5.5 4.3 Likely
CVE-2016-10317 2017-04-03 2025-04-20 7.8 6.8 Likely
CVE-2016-8602 2017-04-14 2025-04-20 7.8 6.8 Likely
CVE-2017-7948 2017-04-19 2025-04-20 7.8 6.8 Likely
CVE-2017-8291 2017-04-27 2025-10-22 7.8 6.8 Likely
CVE-2017-8908 2017-05-12 2025-04-20 5.5 4.3 Likely
CVE-2016-7977 2017-05-23 2025-04-20 5.5 4.3 Likely
CVE-2016-7978 2017-05-23 2025-04-20 9.8 7.5 Likely
CVE-2016-7979 2017-05-23 2025-04-20 9.8 7.5 Likely
CVE-2017-9611 2017-07-26 2025-04-20 7.8 6.8 Likely
CVE-2017-9835 2017-07-26 2025-04-20 7.8 6.8 Likely
CVE-2017-11714 2017-07-28 2025-04-20 7.8 6.8 Likely
CVE-2016-7976 2017-08-07 2025-04-20 8.8 6.8 Likely
CVE-2018-10194 2018-04-18 2024-11-21 7.8 6.8 Likely
CVE-2018-11645 2018-06-01 2024-11-21 5.3 5.0 Likely
CVE-2018-15908 2018-08-27 2024-11-21 7.8 6.8 Likely
CVE-2018-15909 2018-08-27 2024-11-21 7.8 6.8 Likely
CVE-2018-15910 2018-08-27 2024-11-21 7.8 6.8 Likely
CVE-2018-15911 2018-08-28 2024-11-21 7.8 6.8 Likely
CVE-2018-16509 2018-09-05 2024-11-21 7.8 9.3 Likely
CVE-2018-16510 2018-09-05 2024-11-21 7.8 6.8 Likely
CVE-2018-16511 2018-09-05 2024-11-21 7.8 6.8 Likely
CVE-2018-16513 2018-09-05 2024-11-21 7.8 6.8 Likely
CVE-2018-16539 2018-09-05 2024-11-21 5.5 4.3 Likely
CVE-2018-16540 2018-09-05 2024-11-21 7.8 6.8 Likely
CVE-2018-16541 2018-09-05 2024-11-21 5.5 4.3 Likely
CVE-2018-16542 2018-09-05 2024-11-21 5.5 4.3 Likely
CVE-2018-16543 2018-09-05 2024-11-21 7.8 6.8 Likely
CVE-2018-16585 2018-09-06 2024-11-21 7.8 6.8 Likely
CVE-2018-16802 2018-09-10 2024-11-21 7.8 6.8 Likely
CVE-2018-17183 2018-09-19 2024-11-21 7.8 6.8 Likely
CVE-2018-17961 2018-10-15 2024-11-21 8.6 6.8 Likely
CVE-2018-18073 2018-10-15 2024-11-21 6.3 4.3 Likely
CVE-2018-18284 2018-10-19 2024-11-21 8.6 6.8 Likely
CVE-2018-19409 2018-11-21 2024-11-21 9.8 7.5 Likely
CVE-2018-19475 2018-11-23 2024-11-21 7.8 6.8 Likely
CVE-2018-19476 2018-11-23 2024-11-21 7.8 6.8 Likely
CVE-2018-19477 2018-11-23 2024-11-21 7.8 6.8 Likely
CVE-2018-16863 2018-12-03 2024-11-21 7.3 9.3 Likely
CVE-2018-19134 2018-12-20 2024-11-21 7.8 6.8 Likely
CVE-2018-19478 2019-01-02 2024-11-21 5.5 4.3 Likely
CVE-2019-6116 2019-03-21 2024-11-21 7.8 6.8 Likely
CVE-2019-3835 2019-03-25 2024-11-21 5.5 4.3 Likely
CVE-2019-3838 2019-03-25 2024-11-21 5.5 4.3 Likely
CVE-2019-3839 2019-05-16 2024-11-21 7.8 6.8 Likely
CVE-2017-15652 2019-05-23 2024-11-21 5.5 4.3 Likely
CVE-2019-14811 2019-09-03 2024-11-21 7.8 6.8 Likely
CVE-2019-14817 2019-09-03 2024-11-21 7.8 6.8 Likely
CVE-2019-14813 2019-09-06 2024-11-21 9.8 7.5 Likely
CVE-2019-14869 2019-11-15 2024-11-21 8.8 6.8 Likely
CVE-2019-10216 2019-11-27 2024-11-21 7.8 6.8 Likely
CVE-2019-14812 2019-11-27 2024-11-21 7.8 6.8 Likely
CVE-2020-15900 2020-07-28 2024-11-21 9.8 7.5 Likely
CVE-2020-16287 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16288 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16289 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16290 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16291 2020-08-13 2025-03-14 5.5 4.3 Likely
CVE-2020-16292 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16293 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16294 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16295 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16296 2020-08-13 2025-03-24 5.5 4.3 Likely
CVE-2020-16297 2020-08-13 2025-03-14 5.5 4.3 Likely
CVE-2020-16298 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16299 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16300 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16301 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16302 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16303 2020-08-13 2024-11-21 7.8 6.8 Likely
CVE-2020-16304 2020-08-13 2025-03-14 5.5 4.3 Likely
CVE-2020-16305 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16306 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16307 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16308 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16309 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-16310 2020-08-13 2024-11-21 5.5 4.3 Likely
CVE-2020-17538 2020-08-13 2025-03-24 5.5 4.3 Likely
CVE-2020-14373 2020-09-03 2024-11-21 5.5 2.1 Unknown
CVE-2021-45944 2022-01-01 2024-11-21 5.5 4.3 Likely
CVE-2021-45949 2022-01-01 2024-11-21 5.5 4.3 Likely
CVE-2021-3781 2022-02-16 2024-11-21 9.9 9.3 Likely
CVE-2019-25059 2022-04-25 2024-11-21 7.8 6.8 Likely
CVE-2022-2085 2022-06-16 2024-11-21 5.5 4.3 Likely
CVE-2020-27792 2022-08-19 2025-04-30 7.1 - -
CVE-2023-28879 2023-03-31 2025-02-14 9.8 - -
CVE-2023-36664 2023-06-25 2024-12-05 7.8 - -
CVE-2023-38559 2023-08-01 2024-11-21 5.5 - -
CVE-2023-38560 2023-08-01 2024-11-21 5.5 - -
CVE-2020-21710 2023-08-22 2024-11-21 5.5 - -
CVE-2020-21890 2023-08-22 2024-11-21 7.8 - -
CVE-2023-4042 2023-08-23 2024-11-21 5.5 - -
CVE-2023-43115 2023-09-18 2024-11-21 8.8 - -
CVE-2023-46751 2023-12-06 2024-11-21 7.5 - -
CVE-2020-36773 2024-02-04 2025-05-22 9.8 - -
CVE-2023-52722 2024-04-28 2025-06-23 5.5 - -
CVE-2024-29506 2024-07-03 2024-11-21 8.8 - -
CVE-2024-29508 2024-07-03 2025-03-17 3.3 - -
CVE-2024-29509 2024-07-03 2025-03-20 8.8 - -
CVE-2024-29507 2024-07-03 2025-04-28 5.4 - -
CVE-2024-29510 2024-07-03 2025-04-28 6.3 - -
CVE-2024-29511 2024-07-03 2025-04-28 7.5 - -
CVE-2024-33869 2024-07-03 2025-04-16 5.3 - -
CVE-2024-33870 2024-07-03 2025-04-16 6.3 - -
CVE-2024-33871 2024-07-03 2025-04-16 8.8 - -
CVE-2024-46951 2024-11-10 2025-11-03 7.8 - -
CVE-2024-46952 2024-11-10 2024-11-14 7.8 - -
CVE-2024-46953 2024-11-10 2025-11-03 7.8 - -
CVE-2024-46954 2024-11-10 2025-08-15 7.8 - -
CVE-2024-46955 2024-11-10 2025-11-03 5.5 - -
CVE-2024-46956 2024-11-10 2025-11-03 7.8 - -
CVE-2025-27830 2025-03-25 2025-11-03 7.8 - -
CVE-2025-27831 2025-03-25 2025-11-03 9.8 - -
CVE-2025-27832 2025-03-25 2025-11-03 9.8 - -
CVE-2025-27833 2025-03-25 2025-04-01 7.8 - -
CVE-2025-27834 2025-03-25 2025-04-01 7.8 - -
CVE-2025-27835 2025-03-25 2025-11-03 7.8 - -
CVE-2025-27836 2025-03-25 2025-11-03 9.8 - -
CVE-2025-27837 2025-03-25 2025-04-01 9.8 - -
CVE-2025-46646 2025-04-26 2025-06-23 4.5 - -
CVE-2025-48708 2025-05-23 2025-06-20 4.0 - -
CVE-2025-59798 2025-09-22 2025-11-03 4.3 - -
CVE-2025-59799 2025-09-22 2025-11-03 4.3 - -
CVE-2025-59800 2025-09-22 2025-09-25 4.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for artifex ghostscript by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.