Page 117 of 4111 results (0.145 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability Vulnerabilidad de ejecución de código remota de Microsoft ODBC Driver para SQL Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704 • CWE-190: Integer Overflow or Wraparound

CVSS: 8.8EPSS: 1%CPEs: 28EXPL: 0

Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21684 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. ... This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. ... A 32-bit integer overflow condition can lead to incorrect checks of the consistency of the length of internal buffers. ... This vulnerability can be triggered via the main `gss_accept_sec_context` entry point if the application allows tokens greater than 4GB in length, leading to a large, up to 65KB, out-of-bounds read, which could cause a denial of service if it reads from unmapped memory. • https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd https://github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0 https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf https://access.redhat.com/security/cve/CVE-2023-25563 https://bugzilla.redhat.com/show_bug.cgi?id=2172019 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 326EXPL: 0

Memory corruption in User Identity Module due to integer overflow to buffer overflow when a segement is received via qmi http. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. • https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html https://crbug.com/1238642 https://security.gentoo.org/glsa/202309-17 • CWE-190: Integer Overflow or Wraparound