Artifex

Mujs

30 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.09%
  • Published 22.04.2019 11:29:05
  • Last modified 21.11.2024 04:21:03

An issue was discovered in Artifex MuJS 1.0.5. It has unlimited recursion because the match function in regexp.c lacks a depth check.

  • EPSS 1.76%
  • Published 22.04.2019 11:29:05
  • Last modified 21.11.2024 04:21:03

An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.

  • EPSS 2.48%
  • Published 22.04.2019 11:29:04
  • Last modified 21.11.2024 04:21:03

An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.

Exploit
  • EPSS 3.78%
  • Published 24.01.2018 21:29:00
  • Last modified 21.11.2024 04:09:20

jsparse.c in Artifex MuJS through 1.0.2 does not properly maintain the AST depth for binary expressions, which allows remote attackers to cause a denial of service (excessive recursion) via a crafted file.

Exploit
  • EPSS 3.21%
  • Published 24.01.2018 21:29:00
  • Last modified 21.11.2024 04:10:15

The js_strtod function in jsdtoa.c in Artifex MuJS through 1.0.2 has an integer overflow because of incorrect exponent validation.

  • EPSS 0.6%
  • Published 24.03.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions.

  • EPSS 0.5%
  • Published 24.03.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

regexp.c in Artifex Software, Inc. MuJS allows attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to regular expression compilation.

  • EPSS 0.83%
  • Published 03.02.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows attackers to cause a denial of service (application crash) via a crafted regular expression.

  • EPSS 0.17%
  • Published 30.01.2017 04:59:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file.

  • EPSS 0.29%
  • Published 30.01.2017 04:59:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function...