Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2017-03-01 CVE-2016-10095 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libtiff 4.0.7
Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
local
low complexity
libtiff CWE-119
5.5
2017-03-01 CVE-2016-10092 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libtiff 4.0.7
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
local
low complexity
libtiff CWE-119
7.8
2017-02-28 CVE-2017-5581 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tigervnc
Buffer overflow in the ModifiablePixelBuffer::fillRect function in TigerVNC before 1.7.1 allows remote servers to execute arbitrary code via an RRE message with subrectangle outside framebuffer boundaries.
network
low complexity
tigervnc CWE-119
critical
9.8
2017-02-28 CVE-2016-10207 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
network
low complexity
opensuse tigervnc CWE-119
7.5
2017-02-28 CVE-2016-8715 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Iceni Argus 6.6.05
An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05.
local
low complexity
iceni CWE-119
7.8
2017-02-24 CVE-2017-2791 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro 2016
JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file.
local
low complexity
justsystems CWE-119
7.8
2017-02-24 CVE-2017-2790 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro
When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy.
network
low complexity
justsystems CWE-119
critical
9.8
2017-02-24 CVE-2017-2789 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Justsystems Ichitaro
When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document.
network
low complexity
justsystems CWE-119
critical
9.8
2017-02-24 CVE-2016-4492 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Libiberty
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
local
low complexity
gnu CWE-119
4.4
2017-02-24 CVE-2016-4491 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Libiberty
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
local
low complexity
gnu CWE-119
5.5