{"uuid": "d85a183b-de8e-4d81-9afb-20b95e2ea6aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8291", "type": "exploited", "source": "https://t.me/arpsyndicate/1613", "content": "%23ExploitObserverAlert\n\nCVE-2017-8291\n\nDESCRIPTION: Exploit Observer has 21 entries related to CVE-2017-8291. Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a \"/OutputFile (%pipe%\" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.\n\nFIRST-EPSS: 0.254590000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-10T12:09:35.000000Z"}