Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2017-03-23 CVE-2016-10255 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Elfutils Project Elfutils
The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
local
low complexity
elfutils-project CWE-119
5.5
2017-03-23 CVE-2016-10254 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Elfutils Project Elfutils
The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
local
low complexity
elfutils-project CWE-119
5.5
2017-03-22 CVE-2017-3853 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco IOX 1.1.0/1.1(0)
A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device.
network
low complexity
cisco CWE-119
critical
9.8
2017-03-22 CVE-2017-7231 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Pngdefry Project Pngdefry 20170322
pngdefry through 2017-03-22 is prone to a heap-based buffer-overflow vulnerability because it fails to properly process a specially crafted png file.
local
low complexity
pngdefry-project CWE-119
7.8
2017-03-22 CVE-2017-7230 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Disksorter Disk Sorter 9.5.12
A buffer overflow vulnerability in Disk Sorter Enterprise 9.5.12 and earlier allows remote attackers to execute arbitrary code via a GET request.
network
low complexity
disksorter CWE-119
critical
9.8
2017-03-22 CVE-2017-7227 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Binutils 2.28
GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash.
network
low complexity
gnu CWE-119
7.5
2017-03-22 CVE-2017-7223 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Binutils 2.28
GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
network
low complexity
gnu CWE-119
7.5
2017-03-22 CVE-2014-9840 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99
ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.
local
low complexity
imagemagick CWE-119
5.5
2017-03-22 CVE-2014-9839 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99
magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).
network
low complexity
imagemagick CWE-119
7.5
2017-03-22 CVE-2014-9836 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99
ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.
local
low complexity
imagemagick CWE-119
5.5