Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-03-23 | CVE-2016-10255 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Elfutils Project Elfutils The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure. | 5.5 |
2017-03-23 | CVE-2016-10254 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Elfutils Project Elfutils The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure. | 5.5 |
2017-03-22 | CVE-2017-3853 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco IOX 1.1.0/1.1(0) A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device. | 9.8 |
2017-03-22 | CVE-2017-7231 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Pngdefry Project Pngdefry 20170322 pngdefry through 2017-03-22 is prone to a heap-based buffer-overflow vulnerability because it fails to properly process a specially crafted png file. | 7.8 |
2017-03-22 | CVE-2017-7230 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Disksorter Disk Sorter 9.5.12 A buffer overflow vulnerability in Disk Sorter Enterprise 9.5.12 and earlier allows remote attackers to execute arbitrary code via a GET request. | 9.8 |
2017-03-22 | CVE-2017-7227 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Binutils 2.28 GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. | 7.5 |
2017-03-22 | CVE-2017-7223 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Binutils 2.28 GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash. | 7.5 |
2017-03-22 | CVE-2014-9840 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99 ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file. | 5.5 |
2017-03-22 | CVE-2014-9839 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99 magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access). | 7.5 |
2017-03-22 | CVE-2014-9836 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Imagemagick 6.8.99 ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file. | 5.5 |