artifex security advisories
4 threat alerts tracking vulnerabilities and security advisories that affect artifex products.
Vulnios monitors artifex CVE feeds, vendor advisories, CISA KEV listings, and exploit-prediction data continuously. Each alert below is enriched with severity, exploitation status, affected products, and a remediation path. Use this page to scan recent artifex security news in one place, or click into an individual alert for full detail.
Critical Vulnerability: CVE-2016-7979 — artifex — ghostscript
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
criticalCVE-2016-7979Critical Vulnerability: CVE-2016-7978 — artifex — ghostscript
Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
criticalCVE-2016-7978Critical Vulnerability: CVE-2016-10133 — artifex — mujs
Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments t
criticalCVE-2016-10133Critical Vulnerability: CVE-2016-10141 — artifex — mujs
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular express
criticalCVE-2016-10141
Track artifex exposure across your environment
Vulnios automatically cross-references your asset inventory against new artifex CVEs and surfaces only what affects you. No more sifting manually — actionable findings only.
Start a free scan