Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-11-12 | CVE-2018-19183 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ethereumjs-Vm Project Ethereumjs-Vm 2.4.0 ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute. | 7.5 |
2018-11-12 | CVE-2018-18920 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ethereum Py-Evm 0.2.0 Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. | 8.8 |
2018-11-10 | CVE-2018-19150 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Pdfforge PDF Architect 6 Memory corruption in PDMODELProvidePDModelHFT in pdmodel.dll in pdfforge PDF Architect 6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of a "Data from Faulting Address controls Code Flow" issue. | 7.8 |
2018-11-09 | CVE-2018-19130 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libav 12.3 In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. | 6.5 |
2018-11-05 | CVE-2018-17905 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Omron Cx-Supervisor When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object. | 7.8 |
2018-11-05 | CVE-2018-18956 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Suricata-Ids Suricata The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018. | 7.5 |
2018-11-05 | CVE-2018-18820 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. | 8.1 |
2018-11-01 | CVE-2018-18695 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in M2Soft Report Designer 5.0 M2SOFT Report Designer Viewer 5.0 allows a Buffer Overflow with Extended Instruction Pointer (EIP) control via a crafted MRD file. | 7.8 |
2018-11-01 | CVE-2018-3900 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Yitechnology YI Home and YI Home Camera Firmware An exploitable code execution vulnerability exists in the QR code scanning functionality of Yi Home Camera 27US 1.8.7.0D. | 8.8 |
2018-10-31 | CVE-2018-16839 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service. | 9.8 |