CVE-2016-7504
https://notcve.org/view.php?id=CVE-2016-7504
A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition. Vulnerabilidad de uso después de liberación de memoria fue observada en la función Rp_toString de Artifex Software, Inc. MuJS anterior a 5c337af4b3df80cf967e4f9f6a21522de84b392a. • http://bugs.ghostscript.com/show_bug.cgi?id=697142 http://www.securityfocus.com/bid/94241 • CWE-416: Use After Free •
CVE-2016-7506
https://notcve.org/view.php?id=CVE-2016-7506
An out-of-bounds read vulnerability was observed in Sp_replace_regexp function of Artifex Software, Inc. MuJS before 5000749f5afe3b956fc916e407309de840997f4a. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de lectura out-of-bounds fue observada en la función Sp_replace_regexp de Artifex Software, Inc. MuJS anterior a 5000749f5afe3b956fc916e407309de840997f4a. • http://bugs.ghostscript.com/show_bug.cgi?id=697141 http://www.securityfocus.com/bid/94241 • CWE-125: Out-of-bounds Read •
CVE-2016-7505
https://notcve.org/view.php?id=CVE-2016-7505
A buffer overflow vulnerability was observed in divby function of Artifex Software, Inc. MuJS before 8c805b4eb19cf2af689c860b77e6111d2ee439d5. A successful exploitation of this issue can lead to code execution or denial of service condition. Una vulnerabilidad de desbordamiento de buffer fue observada en divby function de Artifex Software, Inc. MuJS anterior a 8c805b4eb19cf2af689c860b77e6111d2ee439d5. • http://bugs.ghostscript.com/show_bug.cgi?id=697140 http://www.securityfocus.com/bid/94231 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-9017
https://notcve.org/view.php?id=CVE-2016-9017
Artifex Software, Inc. MuJS before a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 allows context-dependent attackers to obtain sensitive information by using the "opname in crafted JavaScript file" approach, related to an "Out-of-Bounds read" issue affecting the jsC_dumpfunction function in the jsdump.c component. Artifex Software, Inc. MuJS en versiones anteriores a a5c747f1d40e8d6659a37a8d25f13fb5acf8e767 permite a atacantes dependientes del contexto obtener información sensible utilizando el enfoque "opname en crafted JavaScript file", relacionado con un problema de "lectura fuera de límites" que afecta la función jsC_dumpfunction en el componente jsdump.c. • http://bugs.ghostscript.com/show_bug.cgi?id=697171 http://www.securityfocus.com/bid/94241 • CWE-125: Out-of-bounds Read CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •