Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2019-01-11 CVE-2018-4147 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
In iCloud for Windows before 7.3, Safari before 11.0.3, iTunes before 12.7.3 for Windows, and iOS before 11.2.5, multiple memory corruption issues exist and were addressed with improved memory handling.
network
low complexity
apple CWE-119
critical
9.8
2019-01-11 CVE-2016-7576 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
In iOS before 9.3.3, a memory corruption issue existed in the kernel.
local
low complexity
apple CWE-119
7.8
2019-01-09 CVE-2018-0678 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Panasonic Bn-Sdwbp3 Firmware 1.0.9
Buffer overflow in BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to execute arbitrary code via unspecified vectors.
low complexity
panasonic CWE-119
6.8
2019-01-09 CVE-2018-0668 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in MNC Inplc-Rt 3.08
Buffer overflow in INplc-RT 3.08 and earlier allows remote attackers to cause denial-of-service (DoS) condition that may result in executing arbtrary code via unspecified vectors.
network
low complexity
mnc CWE-119
critical
9.8
2019-01-09 CVE-2018-0651 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Yokogawa products
Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.16.3 and earlier, STARDOM VDS R7.50 and earlier, STARDOM FCN/FCJ Simulator R4.20 and earlier, ASTPLANNER R15.01 and earlier, TriFellows V5.04 and earlier) allows remote attackers to stop the license management function or execute an arbitrary program via unspecified vectors.
network
low complexity
yokogawa CWE-119
critical
9.8
2019-01-09 CVE-2018-0641 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in NEC Aterm Hc100Rc Firmware 1.0.1
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via tools_system.cgi date parameter, time parameter, and offset parameter.
network
low complexity
nec CWE-119
7.2
2019-01-09 CVE-2018-0640 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in NEC Aterm Hc100Rc Firmware 1.0.1
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.
network
low complexity
nec CWE-119
7.2
2019-01-09 CVE-2018-0633 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in NEC Aterm W300P Firmware 1.0.12/1.0.13/1.0.3
Buffer overflow in Aterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary code via submit-url parameter.
network
low complexity
nec CWE-119
7.2
2019-01-09 CVE-2018-0632 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in NEC Aterm W300P Firmware 1.0.12/1.0.13/1.0.3
Buffer overflow in Aterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary code via HTTP request and response.
network
low complexity
nec CWE-119
7.2
2019-01-09 CVE-2018-17470 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
network
low complexity
google debian redhat CWE-119
7.4