Page 4 of 20 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Artifex Software, Inc. MuJS before a0ceaf5050faf419401fe1b83acfa950ec8a8a89 allows context-dependent attackers to obtain sensitive information by using the "crafted JavaScript" approach, related to a "Buffer Over-read" issue. Artifex Software, Inc. MuJS en versiones anteriores a a0ceaf5050faf419401fe1b83acfa950ec8a8a89 permite a atacantes dependientes de contexto obtener información sensible usando la aproximación "JavaScript manipulada", relacionado con un problema "Buffer Over-read". • http://bugs.ghostscript.com/show_bug.cgi?id=697244 http://www.securityfocus.com/bid/94223 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition. Vulnerabilidad de uso después de liberación de memoria fue observada en la función Rp_toString de Artifex Software, Inc. MuJS anterior a 5c337af4b3df80cf967e4f9f6a21522de84b392a. • http://bugs.ghostscript.com/show_bug.cgi?id=697142 http://www.securityfocus.com/bid/94241 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An out-of-bounds read vulnerability was observed in Sp_replace_regexp function of Artifex Software, Inc. MuJS before 5000749f5afe3b956fc916e407309de840997f4a. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de lectura out-of-bounds fue observada en la función Sp_replace_regexp de Artifex Software, Inc. MuJS anterior a 5000749f5afe3b956fc916e407309de840997f4a. • http://bugs.ghostscript.com/show_bug.cgi?id=697141 http://www.securityfocus.com/bid/94241 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

A buffer overflow vulnerability was observed in divby function of Artifex Software, Inc. MuJS before 8c805b4eb19cf2af689c860b77e6111d2ee439d5. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de desbordamiento de buffer fue observada en divby function de Artifex Software, Inc. MuJS anterior a 8c805b4eb19cf2af689c860b77e6111d2ee439d5. • http://bugs.ghostscript.com/show_bug.cgi?id=697140 http://www.securityfocus.com/bid/94231 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Artifex Software, Inc. MuJS before a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 allows context-dependent attackers to obtain sensitive information by using the "opname in crafted JavaScript file" approach, related to an "Out-of-Bounds read" issue affecting the jsC_dumpfunction function in the jsdump.c component. Artifex Software, Inc. MuJS en versiones anteriores a a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 permite a atacantes dependientes del contexto obtener información sensible utilizando el enfoque "opname en crafted JavaScript file", relacionado con un problema de "lectura fuera de límites" que afecta la función jsC_dumpfunction en el componente jsdump.c. • http://bugs.ghostscript.com/show_bug.cgi?id=697171 http://www.securityfocus.com/bid/94241 • CWE-125: Out-of-bounds Read CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •