Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2017-09-08 CVE-2017-0757 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android
A remote code execution vulnerability in the Android media framework (libavc).
local
low complexity
google CWE-119
7.8
2017-09-07 CVE-2017-12912 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mp3Gain 1.5.2
The "mpglibDBL/layer3.c" file in MP3Gain 1.5.2.r2 has a vulnerability which results in a read access violation when opening a crafted MP3 file.
local
low complexity
mp3gain CWE-119
5.5
2017-09-07 CVE-2017-12911 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mp3Gain 1.5.2
The "apetag.c" file in MP3Gain 1.5.2.r2 has a vulnerability which results in a stack memory corruption when opening a crafted MP3 file.
local
low complexity
mp3gain CWE-119
5.5
2017-09-06 CVE-2015-3450 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Aspl Libaxl 0.6.9
Heap-based buffer overflow in libaxl 0.6.9 allows attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted XML document.
network
low complexity
aspl CWE-119
8.8
2017-09-06 CVE-2017-14165 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Graphicsmagick 1.3.26
The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has an issue where memory allocation is excessive because it depends only on a length field in a header.
network
low complexity
graphicsmagick CWE-119
6.5
2017-09-05 CVE-2017-2822 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark Perceptive Document Filters 11.3.0.2400
An exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400.
network
low complexity
lexmark CWE-119
8.8
2017-09-05 CVE-2017-2807 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ledger-Cli Ledger 3.1.1
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1.
local
low complexity
ledger-cli CWE-119
7.8
2017-09-05 CVE-2017-14151 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
An off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0.
network
low complexity
uclouvain debian CWE-119
8.8
2017-08-31 CVE-2017-14064 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call.
network
low complexity
ruby-lang debian canonical redhat CWE-119
critical
9.8
2017-08-31 CVE-2017-13708 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Vxsearch VX Search 10.0.14
Buffer overflow in the web server service in VX Search Enterprise 10.0.14 allows remote attackers to execute arbitrary code via a crafted GET request.
network
low complexity
vxsearch CWE-119
critical
9.8