
CVE-2021-0885
https://notcve.org/view.php?id=CVE-2021-0885
19 Apr 2023 — In PVRSRVBridgeSyncPrimOpTake of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. • https://source.android.com/security/bulletin/2023-04-01 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-30463
https://notcve.org/view.php?id=CVE-2023-30463
19 Apr 2023 — Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. • https://georgyg.com/home/picotcp-denial-of-service-cve-2023-30463 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-28856 – `HINCRBYFLOAT` can be used to crash a redis-server process
https://notcve.org/view.php?id=CVE-2023-28856
18 Apr 2023 — An attacker could possibly use this issue to trigger an integer overflow, which might cause Redis to allocate impossible amounts of memory, resulting in a denial of service via an application crash. • https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVE-2023-26049 – Cookie parsing of quoted values can exfiltrate values from other cookies in Eclipse Jetty
https://notcve.org/view.php?id=CVE-2023-26049
18 Apr 2023 — Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities. • https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2023-26049 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVE-2023-26048 – OutOfMemoryError for large multipart without filename in Eclipse Jetty
https://notcve.org/view.php?id=CVE-2023-26048
18 Apr 2023 — Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities. • https://github.com/Trinadh465/jetty_9.4.31_CVE-2023-26048 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2021-33797
https://notcve.org/view.php?id=CVE-2021-33797
17 Apr 2023 — An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d. • https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •

CVE-2023-27913
https://notcve.org/view.php?id=CVE-2023-27913
14 Apr 2023 — A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-27354 – Sonos One Speaker libsmb2 Integer Overflow Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2023-27354
14 Apr 2023 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. • https://www.zerodayinitiative.com/advisories/ZDI-23-446 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-48468 – protobuf-c: unsigned integer overflow in parse_required_member
https://notcve.org/view.php?id=CVE-2022-48468
13 Apr 2023 — protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member. ... This security flaw leads to an unsigned integer overflow in parse_required_member. • https://github.com/protobuf-c/protobuf-c/commit/ec3d900001a13ccdaa8aef996b34c61159c76217 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-26421 – ZDI-CAN-19832: Adobe Acrobat Reader DC Doc Object Integer Underflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-26421
12 Apr 2023 — Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an Integer Underflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. • https://helpx.adobe.com/security/products/acrobat/apsb23-24.html • CWE-191: Integer Underflow (Wrap or Wraparound) •