Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2017-02-28 CVE-2017-5581 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tigervnc
Buffer overflow in the ModifiablePixelBuffer::fillRect function in TigerVNC before 1.7.1 allows remote servers to execute arbitrary code via an RRE message with subrectangle outside framebuffer boundaries.
network
low complexity
tigervnc CWE-119
critical
9.8
2017-02-28 CVE-2016-10207 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
network
low complexity
opensuse tigervnc CWE-119
7.5
2017-02-28 CVE-2016-8715 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Iceni Argus 6.6.05
An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05.
local
low complexity
iceni CWE-119
7.8
2017-02-24 CVE-2017-2791 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro 2016
JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file.
local
low complexity
justsystems CWE-119
7.8
2017-02-24 CVE-2017-2790 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro
When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy.
network
low complexity
justsystems CWE-119
critical
9.8
2017-02-24 CVE-2017-2789 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro
When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document.
network
low complexity
justsystems CWE-119
critical
9.8
2017-02-24 CVE-2016-4492 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Libiberty
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
local
low complexity
gnu CWE-119
4.4
2017-02-24 CVE-2016-4491 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Libiberty
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
local
low complexity
gnu CWE-119
5.5
2017-02-24 CVE-2016-8998 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM Tivoli Storage Manager
IBM Tivoli Storage Manager Server 7.1 could allow an authenticated user with TSM administrator privileges to cause a buffer overflow using a specially crafted SQL query and execute arbitrary code on the server.
network
low complexity
ibm CWE-119
7.2
2017-02-24 CVE-2017-6300 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
An issue was discovered in ytnef before 1.9.1.
local
low complexity
ytnef-project debian CWE-119
7.8