![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-7505
https://notcve.org/view.php?id=CVE-2016-7505
29 Oct 2016 — A buffer overflow vulnerability was observed in divby function of Artifex Software, Inc. MuJS before 8c805b4eb19cf2af689c860b77e6111d2ee439d5. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de desbordamiento de buffer fue observada en divby function de Artifex Software, Inc. MuJS anterior a 8c805b4eb19cf2af689c860b77e6111d2ee439d5. • http://bugs.ghostscript.com/show_bug.cgi?id=697140 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-7504
https://notcve.org/view.php?id=CVE-2016-7504
29 Oct 2016 — A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition. Vulnerabilidad de uso después de liberación de memoria fue observada en la función Rp_toString de Artifex Software, Inc. MuJS anterior a 5c337af4b3df80cf967e4f9f6a21522de84b392a. • http://bugs.ghostscript.com/show_bug.cgi?id=697142 • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-7506
https://notcve.org/view.php?id=CVE-2016-7506
29 Oct 2016 — An out-of-bounds read vulnerability was observed in Sp_replace_regexp function of Artifex Software, Inc. MuJS before 5000749f5afe3b956fc916e407309de840997f4a. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de lectura out-of-bounds fue observada en la función Sp_replace_regexp de Artifex Software, Inc. MuJS anterior a 5000749f5afe3b956fc916e407309de840997f4a. • http://bugs.ghostscript.com/show_bug.cgi?id=697141 • CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-9017
https://notcve.org/view.php?id=CVE-2016-9017
28 Oct 2016 — Artifex Software, Inc. MuJS before a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 allows context-dependent attackers to obtain sensitive information by using the "opname in crafted JavaScript file" approach, related to an "Out-of-Bounds read" issue affecting the jsC_dumpfunction function in the jsdump.c component. Artifex Software, Inc. MuJS en versiones anteriores a a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 permite a atacantes dependientes del contexto obtener información sensible utilizando el enfoque "opname en... • http://bugs.ghostscript.com/show_bug.cgi?id=697171 • CWE-125: Out-of-bounds Read CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •