Page 109 of 5992 results (0.157 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

19 Apr 2023 — In PVRSRVBridgeSyncPrimOpTake of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. • https://source.android.com/security/bulletin/2023-04-01 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

19 Apr 2023 — Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. • https://georgyg.com/home/picotcp-denial-of-service-cve-2023-30463 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

18 Apr 2023 — An attacker could possibly use this issue to trigger an integer overflow, which might cause Redis to allocate impossible amounts of memory, resulting in a denial of service via an application crash. • https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVSS: 5.3EPSS: 0%CPEs: 14EXPL: 2

18 Apr 2023 — Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities. • https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2023-26049 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 2

18 Apr 2023 — Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities. • https://github.com/Trinadh465/jetty_9.4.31_CVE-2023-26048 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

17 Apr 2023 — An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d. • https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

14 Apr 2023 — A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

14 Apr 2023 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. • https://www.zerodayinitiative.com/advisories/ZDI-23-446 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

13 Apr 2023 — protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member. ... This security flaw leads to an unsigned integer overflow in parse_required_member. • https://github.com/protobuf-c/protobuf-c/commit/ec3d900001a13ccdaa8aef996b34c61159c76217 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

12 Apr 2023 — Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an Integer Underflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. • https://helpx.adobe.com/security/products/acrobat/apsb23-24.html • CWE-191: Integer Underflow (Wrap or Wraparound) •