Artifex Mujs 2017-01-12

CPE Details

Artifex Mujs 2017-01-12
2017-01-12
2020-04-22
10h35 +00:00
2020-04-22
10h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:artifex:mujs:2017-01-12:*:*:*:*:*:*:*

Informations

Vendor

artifex

Product

mujs

Version

2017-01-12

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-10132 2017-03-24 14h00 +00:00 regexp.c in Artifex Software, Inc. MuJS allows attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to regular expression compilation.
7.5
High
CVE-2016-10133 2017-03-24 14h00 +00:00 Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions.
9.8
Critical
CVE-2017-5627 2017-01-30 03h24 +00:00 An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function in jsrun.c when parsing a specially crafted JS file.
7.8
High
CVE-2017-5628 2017-01-30 03h24 +00:00 An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file.
7.8
High
CVE-2016-7504 2016-10-28 23h00 +00:00 A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition.
9.8
Critical
CVE-2016-7505 2016-10-28 23h00 +00:00 A buffer overflow vulnerability was observed in divby function of Artifex Software, Inc. MuJS before 8c805b4eb19cf2af689c860b77e6111d2ee439d5. A successful exploitation of this issue can lead to code execution or denial of service condition.
9.8
Critical