Page 5 of 30 results (0.050 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The chartorune function in Artifex Software MuJS allows attackers to cause a denial of service (out-of-bounds read) via a * (asterisk) at the end of the input. La función chartorune en Artifex Software MuJS permite a atacantes provocar una denegación de servicio (lectura fuera de límites) a través de un * (asterisco) al final de la entrada. • http://www.openwall.com/lists/oss-security/2016/09/21/5 http://www.openwall.com/lists/oss-security/2016/09/28/11 https://bugs.ghostscript.com/show_bug.cgi?id=697136 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Heap-based buffer overflow in the Fp_toString function in jsfunction.c in Artifex Software MuJS allows attackers to cause a denial of service (crash) via crafted input. Desbordamiento de búfer basado en memoria dinámica en la función Fp_toString en jsfunction.c en Artifex Software MuJS permite a atacantes provocar una denegación de servicio (caída) a través de una entrada manipulada. • http://www.openwall.com/lists/oss-security/2016/09/21/5 http://www.openwall.com/lists/oss-security/2016/09/28/11 https://bugs.ghostscript.com/show_bug.cgi?id=697137 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Artifex Software MuJS allows attackers to cause a denial of service (crash) via vectors related to incomplete escape sequences. NOTE: this vulnerability exists due to an incomplete fix for CVE-2016-7563. Artifex Software MuJS permite a atacantes provocar una denegación de servicio (bloqueo) a través de vectores relacionados con secuencias de escape incompletas. NOTA: esta vulnerabilidad existe debido a un arreglo incompleto para CVE-2016-7563. • http://www.openwall.com/lists/oss-security/2016/10/30/13 http://www.openwall.com/lists/oss-security/2016/10/30/4 http://www.openwall.com/lists/oss-security/2016/11/07/5 http://www.securityfocus.com/bid/94150 https://bugs.ghostscript.com/show_bug.cgi?id=697136#c4 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition. Se observó una vulnerabilidad de desbordamiento de enteros en la función regemit en regexp.c en Artifex Software, Inc. • http://git.ghostscript.com/?p=mujs.git%3Bh=fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045 http://www.securityfocus.com/bid/95876 https://bugs.ghostscript.com/show_bug.cgi?id=697448 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Artifex Software, Inc. MuJS before 5008105780c0b0182ea6eda83ad5598f225be3ee allows context-dependent attackers to conduct "denial of service (application crash)" attacks by using the "malformed labeled break/continue in JavaScript" approach, related to a "NULL pointer dereference" issue affecting the jscompile.c component. Artifex Software, Inc. MuJS en versiones anteriores a 5008105780c0b0182ea6eda83ad5598f225be3ee permite a atacantes dependientes del contexto llevar a cabo ataques de "denegación de servicio (caída de aplicación)" utilizando el enfoque "etiquetado mal formado pausa/continuación en JavaScript", relacionado con un problema "referencia al puntero NULL" que afecta al componente jscompile.c. • http://bugs.ghostscript.com/show_bug.cgi?id=697172 http://git.ghostscript.com/?p=mujs.git%3Ba=commit%3Bh=5008105780c0b0182ea6eda83ad5598f225be3ee http://www.securityfocus.com/bid/94293 • CWE-476: NULL Pointer Dereference •