Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2018-05-25 CVE-2018-1515 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 10.5/11.1
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5 and 11.1, under specific or unusual conditions, could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner.
local
high complexity
ibm CWE-119
7.0
2018-05-25 CVE-2018-1488 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 10.5/11.1
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5 and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root.
local
low complexity
ibm CWE-119
7.8
2018-05-24 CVE-2018-5678 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1.
network
low complexity
foxitsoftware CWE-119
8.8
2018-05-24 CVE-2018-5676 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1.
network
low complexity
foxitsoftware CWE-119
8.8
2018-05-24 CVE-2018-5674 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1.
network
low complexity
foxitsoftware CWE-119
8.8
2018-05-24 CVE-2018-1000199 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption.
local
low complexity
debian linux canonical redhat CWE-119
5.5
2018-05-22 CVE-2018-11361 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Wireshark 2.6.0
In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash.
network
low complexity
wireshark CWE-119
7.5
2018-05-22 CVE-2018-11360 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash.
network
low complexity
wireshark debian CWE-119
7.5
2018-05-22 CVE-2018-11355 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Wireshark 2.6.0
In Wireshark 2.6.0, the RTCP dissector could crash.
network
low complexity
wireshark CWE-119
7.5
2018-05-22 CVE-2018-11378 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Radare Radare2 2.5.0
The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file.
local
low complexity
radare CWE-119
7.8