Artifex Ghostscript before 10.03.0 sometimes has a stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters.
https://www.securityweek.com/attackers-exploiting-remote-code-execution-vulnerability-in-ghostscript/
https://securityaffairs.com/165449/hacking/ghostscript-vulnerability-cve-2024-29510.html?web_view=true
https://www.openwall.com/lists/oss-security/2024/07/03/7
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514
https://bugs.ghostscript.com/show_bug.cgi?id=707510
Source: Mitre, NVD
Published: 2024-07-03
Updated: 2025-04-28
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P
Severity: Medium
Base Score: 5.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
EPSS: 0.00192