Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-04-25 | CVE-2017-7477 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Linux Kernel Heap-based buffer overflow in drivers/net/macsec.c in the MACsec module in the Linux kernel through 4.10.12 allows attackers to cause a denial of service or possibly have unspecified other impact by leveraging the use of a MAX_SKB_FRAGS+1 size in conjunction with the NETIF_F_FRAGLIST feature, leading to an error in the skb_to_sgvec function. | 7.0 |
2017-04-24 | CVE-2016-6915 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Nvidia products Stack-based buffer overflow in nvhost_job.c in the NVIDIA video driver for Android, Shield TV before OTA 3.3, Shield Table before OTA 4.4, and Shield Table TK1 before OTA 1.5. | 7.8 |
2017-04-24 | CVE-2016-6917 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Nvidia products Buffer overflow in nvhost_job.c in the NVIDIA video driver for Android, Shield TV before OTA 3.3, Shield Table before OTA 4.4, and Shield Table TK1 before OTA 1.5. | 7.8 |
2017-04-24 | CVE-2011-3438 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Safari 5.0.6 WebKit, as used in Safari 5.0.6, allows remote attackers to cause a denial of service (process crash) or arbitrary code execution. | 8.8 |
2017-04-24 | CVE-2011-3428 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Quicktime 4.1.2/7.7.6 Buffer overflow in QuickTime before 7.7.1 for Windows allows remote attackers to execute arbitrary code. | 9.8 |
2017-04-24 | CVE-2016-3076 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Python Pillow Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file. | 5.5 |
2017-04-24 | CVE-2017-2325 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Juniper Northstar Controller 2.1.0 A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service. | 6.5 |
2017-04-24 | CVE-2017-2316 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Juniper Northstar Controller 2.1.0 A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service. | 6.5 |
2017-04-24 | CVE-2015-1522 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in BRO analyzer/protocol/dnp3/DNP3.cc in Bro before 2.3.2 does not reject certain non-zero values of a packet length, which allows remote attackers to cause a denial of service (buffer overflow or buffer over-read) via a crafted DNP3 packet. | 7.5 |
2017-04-24 | CVE-2015-1521 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in BRO analyzer/protocol/dnp3/DNP3.cc in Bro before 2.3.2 does not properly handle zero values of a packet length, which allows remote attackers to cause a denial of service (buffer overflow or buffer over-read if NDEBUG; otherwise assertion failure) via a crafted DNP3 packet. | 7.5 |