Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-02-07 | CVE-2017-5125 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Heap buffer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2018-02-07 | CVE-2017-12471 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite The cnb_parse_lev function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging failure to check for out-of-bounds conditions, which triggers an invalid read in the hexdump function. | 9.8 |
2018-02-07 | CVE-2017-12469 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite Buffer overflow in util/ccnl-common.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging incorrect memory allocation. | 9.8 |
2018-02-07 | CVE-2017-12468 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite Buffer overflow in ccn-lite-ccnb2xml.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the vallen and len variables. | 9.8 |
2018-02-07 | CVE-2017-12466 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ccn-Lite CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors related to ssl_halen when running ccn-lite-sim, which trigger an out-of-bounds access. | 9.8 |
2018-02-07 | CVE-2016-6169 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader Heap-based buffer overflow in Foxit Reader and PhantomPDF 7.3.4.311 and earlier on Windows allows remote attackers to cause a denial of service (memory corruption and application crash) or potentially execute arbitrary code via the Bezier data in a crafted PDF file. | 7.8 |
2018-02-07 | CVE-2016-2541 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Audacityteam Audacity Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP2 file. | 5.5 |
2018-02-07 | CVE-2016-2540 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Audacityteam Audacity Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure. | 5.5 |
2018-02-07 | CVE-2017-17482 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HP Openvms 4.0/8.42L1 An issue was discovered in OpenVMS through V8.4-2L2 on Alpha and through V8.4-2L1 on IA64, and VAX/VMS 4.0 and later. | 7.8 |
2018-02-07 | CVE-2018-6799 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The AcquireCacheNexus function in magick/pixel_cache.c in GraphicsMagick before 1.3.28 allows remote attackers to cause a denial of service (heap overwrite) or possibly have unspecified other impact via a crafted image file, because a pixel staging area is not used. | 8.8 |