{"id":9225,"date":"2019-09-06T09:11:09","date_gmt":"2019-09-06T09:11:09","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9225"},"modified":"2026-04-17T18:07:51","modified_gmt":"2026-04-17T18:07:51","slug":"ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/","title":{"rendered":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<ol>\n<li>\n<h2><strong>Vulnerability Overview<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Ghostscript is a suite of software based on an interpreter for Adobe System&#8217;s PostScript and Portable Document Format (PDF) page description languages. It is widely used as a raster image processor (RIP) for raster computer printers. Currently, it has been ported from Linux to other operating systems, including UNIX, Mac OS X, VMS, Windows, OS\/2, and Mac OS classic.<!--more--><\/p>\n<p>On August 2, 2019, Artifex officially submitted a fix for the merged Bug 701394 (protect use of .forceput with executeonly) on the master branch of Ghostscript, designed to fix the -dSAFER sandbox bypass vulnerability (CVE-2019-10216). -dSAFER is a security sandbox used by Ghostscript for prevention of insecure PostScript operations. The CVE-2019-10216 vulnerability is caused by the .buildfont1 procedure that does not properly secure its privileged calls, allowing attackers to bypass -dSAFER restrictions via a crafted PostScript file, thus escalating privileges and accessing files outside of restricted areas.<\/p>\n<p>Applications like ImageMagick that use Ghostscript to process PostScript contents by default are affected by this vulnerability.<\/p>\n<p>References:<\/p>\n<ul>\n<li>https:\/\/access.redhat.com\/security\/cve\/cve-2019-10216<\/li>\n<li>https:\/\/www.openwall.com\/lists\/oss-security\/2019\/08\/12\/4<\/li>\n<\/ul>\n<ol start=\"2\">\n<li>\n<h2><strong>Scope of Impact<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>This vulnerability affects all applications that use Ghostscript to process PostScript contents.<\/p>\n<p><strong>Affected Ghostscript versions:<\/strong><\/p>\n<ul>\n<li>Ghostscript before commit 5b85ddd19a8420a1bd2d5529325be35d78e94234<\/li>\n<\/ul>\n<p><strong>Unaffected Ghostscript versions:<\/strong><\/p>\n<ul>\n<li>Ghostscript commit 5b85ddd19a8420a1bd2d5529325be35d78e94234 and later<\/li>\n<\/ul>\n<ol start=\"3\">\n<li>\n<h2><strong>Recommended Solution<\/strong><\/h2>\n<\/li>\n<\/ol>\n<h3><strong>Official Fix<\/strong><\/h3>\n<p>Currently, there has been no official release to fix this vulnerability. Users can use git commands to update their installations to commit 5b85ddd19a8420a1bd2d5529325be35d78e94234 or later, or directly pull the master branch code to protect against this vulnerability.<\/p>\n<p>http:\/\/git.ghostscript.com\/?p=ghostpdl.git;a=summary<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0906-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9226\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0906-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"705\" height=\"388\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0906-1.jpg 705w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0906-1-300x165.jpg 300w\" sizes=\"(max-width: 705px) 100vw, 705px\" \/><\/a><\/p>\n<p>Red Hat and Debian distributions have both fixed this vulnerability.<\/p>\n<p>Note: As official technical support is no longer available for Red Hat Enterprise Linux 5 (ghostscript) and Red Hat Enterprise Linux 6 (ghostscript), related users are advised to take temporary measures described in section 3.2 against this vulnerability.<\/p>\n<h3><strong>Workaround<\/strong><\/h3>\n<p>If users cannot upgrade to the fixed version for the time being, they can protect against this vulnerability by using a security policy on ImageMagick. ImageMagick uses Ghostscript by default as the interpreter to process PostScript contents. Therefore, users can configure a security policy.xml on the ImageMagick component to disable PS, EPS, PDF, and XPS coders. Users can modify the policy configuration file of ImageMagick by adding the following code to &lt;policymap&gt; in the<strong> \/etc\/ImageMagick\/policy.xml <\/strong>directory (default location of the policy configuration file).<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"581\">&lt;policymap&gt;<\/p>\n<p>&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;PS&#8221; \/&gt;<\/p>\n<p>&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPS&#8221; \/&gt;<\/p>\n<p>&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;PDF&#8221; \/&gt;<\/p>\n<p>&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;XPS&#8221; \/&gt;<\/p>\n<p>&lt;\/policymap&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Overview Ghostscript is a suite of software based on an interpreter for Adobe System&#8217;s PostScript and Portable Document Format (PDF) page description languages. It is widely used as a raster image processor (RIP) for raster computer printers. Currently, it has been ported from Linux to other operating systems, including UNIX, Mac OS X, VMS, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8917,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[429],"class_list":["post-9225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-ghostscript"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Overview Ghostscript is a suite of software based on an interpreter for Adobe System&#039;s PostScript and Portable Document Format (PDF) page\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-06T09:11:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Overview Ghostscript is a suite of software based on an interpreter for Adobe System&#039;s PostScript and Portable Document Format (PDF) page\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability\",\"datePublished\":\"2019-09-06T09:11:09+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/\"},\"wordCount\":693,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/0628-1.jpg\",\"keywords\":[\"Ghostscript\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/\",\"name\":\"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/0628-1.jpg\",\"datePublished\":\"2019-09-06T09:11:09+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/0628-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/0628-1.jpg\",\"width\":364,\"height\":254,\"caption\":\"Illuminated keyboard in low light.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS","og_description":"Vulnerability Overview Ghostscript is a suite of software based on an interpreter for Adobe System's PostScript and Portable Document Format (PDF) page","og_url":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/","og_site_name":"NSFOCUS","article_published_time":"2019-09-06T09:11:09+00:00","article_modified_time":"2026-04-17T18:07:51+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS","twitter_description":"Vulnerability Overview Ghostscript is a suite of software based on an interpreter for Adobe System's PostScript and Portable Document Format (PDF) page","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability","datePublished":"2019-09-06T09:11:09+00:00","dateModified":"2026-04-17T18:07:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/"},"wordCount":693,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","keywords":["Ghostscript"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/","url":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/","name":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","datePublished":"2019-09-06T09:11:09+00:00","dateModified":"2026-04-17T18:07:51+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0628-1.jpg","width":364,"height":254,"caption":"Illuminated keyboard in low light."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ghostscript-buildfont1-dsafer-sandbox-bypass-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Ghostscript .buildfont1 \u2013dSAFER Sandbox Bypass Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9225"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9225\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8917"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}