Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-15 | CVE-2016-8684 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The MagickMalloc function in magick/memory.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file." | 7.8 |
2017-02-15 | CVE-2016-8683 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file." | 7.8 |
2017-02-15 | CVE-2016-6832 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libav Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing. | 5.5 |
2017-02-15 | CVE-2015-8979 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242. | 7.5 |
2017-02-15 | CVE-2013-7459 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. | 9.8 |
2017-02-15 | CVE-2017-2973 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable heap overflow vulnerability. | 9.8 |
2017-02-13 | CVE-2016-9363 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Moxa products An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. | 7.3 |
2017-02-13 | CVE-2016-8377 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Fatek PLC Winproladder Firmware 3.11 An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. | 8.0 |
2017-02-13 | CVE-2016-8364 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ibhsoftec S7-Softplc 4.12 An issue was discovered in IBHsoftec S7-SoftPLC prior to 4.12b. | 9.8 |
2017-02-13 | CVE-2016-8352 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Schneider-Electric Connexium Firmware An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. | 10.0 |