Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2018-02-07 CVE-2017-5125 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Heap buffer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google debian CWE-119
8.8
2018-02-07 CVE-2017-12471 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite
The cnb_parse_lev function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging failure to check for out-of-bounds conditions, which triggers an invalid read in the hexdump function.
network
low complexity
ccn-lite CWE-119
critical
9.8
2018-02-07 CVE-2017-12469 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite
Buffer overflow in util/ccnl-common.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging incorrect memory allocation.
network
low complexity
ccn-lite CWE-119
critical
9.8
2018-02-07 CVE-2017-12468 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite
Buffer overflow in ccn-lite-ccnb2xml.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the vallen and len variables.
network
low complexity
ccn-lite CWE-119
critical
9.8
2018-02-07 CVE-2017-12466 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite
CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors related to ssl_halen when running ccn-lite-sim, which trigger an out-of-bounds access.
network
low complexity
ccn-lite CWE-119
critical
9.8
2018-02-07 CVE-2016-6169 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader
Heap-based buffer overflow in Foxit Reader and PhantomPDF 7.3.4.311 and earlier on Windows allows remote attackers to cause a denial of service (memory corruption and application crash) or potentially execute arbitrary code via the Bezier data in a crafted PDF file.
local
low complexity
foxitsoftware CWE-119
7.8
2018-02-07 CVE-2016-2541 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Audacityteam Audacity
Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP2 file.
local
low complexity
audacityteam CWE-119
5.5
2018-02-07 CVE-2016-2540 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Audacityteam Audacity
Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure.
local
low complexity
audacityteam CWE-119
5.5
2018-02-07 CVE-2017-17482 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HP Openvms 4.0/8.42L1
An issue was discovered in OpenVMS through V8.4-2L2 on Alpha and through V8.4-2L1 on IA64, and VAX/VMS 4.0 and later.
local
low complexity
hp CWE-119
7.8
2018-02-07 CVE-2018-6799 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The AcquireCacheNexus function in magick/pixel_cache.c in GraphicsMagick before 1.3.28 allows remote attackers to cause a denial of service (heap overwrite) or possibly have unspecified other impact via a crafted image file, because a pixel staging area is not used.
network
low complexity
graphicsmagick debian CWE-119
8.8