Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
artifex mujs vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2019-12798
An issue exists in Artifex MuJS 1.0.5. regcompx in regexp.c does not restrict regular expression program size, leading to an overflow of the parsed syntax list size.
Artifex Mujs 1.0.5
668
VMScore
CVE-2019-11411
An issue exists in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.
Artifex Mujs 1.0.5
445
VMScore
CVE-2019-11413
An issue exists in Artifex MuJS 1.0.5. It has unlimited recursion because the match function in regexp.c lacks a depth check.
Artifex Mujs 1.0.5
668
VMScore
CVE-2021-45005
Artifex MuJS v1.1.3 exists to contain a heap buffer overflow which is caused by conflicting JumpList of nested try/finally statements.
Artifex Mujs 1.1.3
445
VMScore
CVE-2016-10132
regexp.c in Artifex Software, Inc. MuJS allows malicious users to cause a denial of service (NULL pointer dereference and crash) via vectors related to regular expression compilation.
Artifex Mujs
Fedoraproject Fedora 25
383
VMScore
CVE-2022-30974
compile in regexp.c in Artifex MuJS up to and including 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.
Artifex Mujs
Debian Debian Linux 11.0
Fedoraproject Fedora 37
383
VMScore
CVE-2022-30975
In Artifex MuJS up to and including 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.
Artifex Mujs
Debian Debian Linux 11.0
Fedoraproject Fedora 37
NA
CVE-2022-44789
A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 up to and including 1.3.x prior to 1.3.2 allows an malicious user to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.
Artifex Mujs
Debian Debian Linux 11.0
Fedoraproject Fedora 37
1 Github repository
445
VMScore
CVE-2016-9108
Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows malicious users to cause a denial of service (application crash) via a crafted regular expression.
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Fedoraproject Fedora 23
Artifex Mujs
445
VMScore
CVE-2019-11412
An issue exists in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.
Artifex Mujs 1.0.5
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3