Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2016-12-15 CVE-2016-7886 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Indesign and Indesign Server
Adobe InDesign version 11.4.1 and earlier, Adobe InDesign Server 11.0.0 and earlier have an exploitable memory corruption vulnerability.
network
low complexity
adobe CWE-119
critical
9.8
2016-12-15 CVE-2016-7866 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Animate 15.2.1.95
Adobe Animate versions 15.2.1.95 and earlier have an exploitable memory corruption vulnerability.
network
low complexity
adobe CWE-119
critical
9.8
2016-12-15 CVE-2016-7856 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe DNG Converter 9.7
Adobe DNG Converter versions 9.7 and earlier have an exploitable memory corruption vulnerability.
network
low complexity
adobe CWE-119
critical
9.8
2016-12-14 CVE-2016-9203 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco ASR 5000 Series Software 20.0.2.3.65026
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco ASR 5000 Series Software could allow an unauthenticated, remote attacker to cause a reload of the ipsecmgr process.
network
low complexity
cisco CWE-119
7.5
2016-12-13 CVE-2016-2334 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile method in 7zip before 16.00 and p7zip allows remote attackers to execute arbitrary code via a crafted HFS+ image.
local
low complexity
7-zip fedoraproject oracle CWE-119
7.8
2016-12-13 CVE-2016-7953 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
network
low complexity
fedoraproject x-org CWE-119
critical
9.8
2016-12-13 CVE-2016-6699 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android
A remote code execution vulnerability in libstagefright in Mediaserver in Android 7.0 before 2016-11-01 could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing.
local
low complexity
google CWE-119
7.8
2016-12-13 CVE-2015-3217 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
network
low complexity
pcre ibm CWE-119
7.5
2016-12-13 CVE-2016-5688 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
network
high complexity
oracle imagemagick CWE-119
8.1
2016-12-12 CVE-2016-9937 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Digium Asterisk
An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1.
network
low complexity
digium CWE-119
7.5