Vulnerabilities > Artifex
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-11-12 | CVE-2016-9294 | NULL Pointer Dereference vulnerability in Artifex Mujs Artifex Software, Inc. | 7.5 |
2016-11-03 | CVE-2016-9136 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Artifex Mujs Artifex Software, Inc. | 5.0 |
2016-10-29 | CVE-2016-7506 | Out-of-bounds Read vulnerability in Artifex Mujs An out-of-bounds read vulnerability was observed in Sp_replace_regexp function of Artifex Software, Inc. | 5.0 |
2016-10-29 | CVE-2016-7505 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Artifex Mujs A buffer overflow vulnerability was observed in divby function of Artifex Software, Inc. | 7.5 |
2016-10-29 | CVE-2016-7504 | Use After Free vulnerability in Artifex Mujs A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. | 7.5 |
2016-10-28 | CVE-2016-9017 | Information Exposure vulnerability in Artifex Mujs Artifex Software, Inc. | 5.0 |
2016-09-22 | CVE-2016-6525 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array. | 9.8 |
2016-09-22 | CVE-2016-6265 | Use After Free vulnerability in multiple products Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file. | 5.5 |
2011-05-13 | CVE-2011-0341 | Buffer Errors vulnerability in Artifex Mupdf 2008.09.02 Stack-based buffer overflow in the pdfmoz_onmouse function in apps/mozilla/moz_main.c in the MuPDF plug-in 2008.09.02 for Firefox allows remote attackers to execute arbitrary code via a crafted web site. | 9.3 |
2010-10-23 | CVE-2010-4054 | Buffer Errors vulnerability in Artifex products The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043. | 4.3 |