Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-07-02 | CVE-2017-8416 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Dlink Dcs-1100 Firmware and Dcs-1130 Firmware An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. | 8.8 |
2019-07-02 | CVE-2017-8412 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Dlink Dcs-1100 Firmware and Dcs-1130 Firmware An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. | 8.8 |
2019-07-02 | CVE-2017-8414 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Dlink Dcs-1100 Firmware and Dcs-1130 Firmware An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. | 7.8 |
2019-07-02 | CVE-2017-8410 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Dlink Dcs-1100 Firmware and Dcs-1130 Firmware An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. | 9.8 |
2019-07-01 | CVE-2019-4322 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. | 7.8 |
2019-07-01 | CVE-2019-4154 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. | 7.8 |
2019-06-28 | CVE-2019-10993 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Advantech Webaccess In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. | 9.8 |
2019-06-28 | CVE-2018-15519 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark devices have a Buffer Overflow (issue 1 of 2). | 9.8 |
2019-06-28 | CVE-2018-15520 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark products Various Lexmark devices have a Buffer Overflow (issue 2 of 2). | 9.8 |
2019-06-26 | CVE-2019-12982 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libming 0.4.8 Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. | 6.5 |