CVE-2023-21704 – Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-21704
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability Vulnerabilidad de ejecución de código remota de Microsoft ODBC Driver para SQL Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-21684 – Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-21684
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21684 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2023-25563 – GSS-NTLMSSP vulnerable to multiple out-of-bounds reads when decoding NTLM fields
https://notcve.org/view.php?id=CVE-2023-25563
A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. ... This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. ... A 32-bit integer overflow condition can lead to incorrect checks of the consistency of the length of internal buffers. ... This vulnerability can be triggered via the main `gss_accept_sec_context` entry point if the application allows tokens greater than 4GB in length, leading to a large, up to 65KB, out-of-bounds read, which could cause a denial of service if it reads from unmapped memory. • https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd https://github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0 https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf https://access.redhat.com/security/cve/CVE-2023-25563 https://bugzilla.redhat.com/show_bug.cgi?id=2172019 • CWE-125: Out-of-bounds Read •
CVE-2022-33248 – Integer overflow to buffer overflow in User Identity Module
https://notcve.org/view.php?id=CVE-2022-33248
Memory corruption in User Identity Module due to integer overflow to buffer overflow when a segement is received via qmi http. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
CVE-2023-0705
https://notcve.org/view.php?id=CVE-2023-0705
Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. • https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html https://crbug.com/1238642 https://security.gentoo.org/glsa/202309-17 • CWE-190: Integer Overflow or Wraparound •