
CVE-2023-1220 – Debian Security Advisory 5371-1
https://notcve.org/view.php?id=CVE-2023-1220
07 Mar 2023 — It was discovered that Chromium contained an integer overflow in the PDF component. • https://packetstorm.news/files/id/171796 • CWE-787: Out-of-bounds Write •

CVE-2023-1215 – Debian Security Advisory 5371-1
https://notcve.org/view.php?id=CVE-2023-1215
07 Mar 2023 — It was discovered that Chromium contained an integer overflow in the PDF component. • https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2023-27522 – Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
https://notcve.org/view.php?id=CVE-2023-27522
07 Mar 2023 — Issues addressed include HTTP response splitting, bypass, integer overflow, out of bounds write, and use-after-free vulnerabilities. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
07 Mar 2023 — Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-25705 – Integer Overflow to Buffer Overflow in Modem
https://notcve.org/view.php?id=CVE-2022-25705
07 Mar 2023 — Memory corruption in modem due to integer overflow to buffer overflow while handling APDU response • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-47454
https://notcve.org/view.php?id=CVE-2022-47454
07 Mar 2023 — In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. • https://www.unisoc.com/en_us/secy/announcementDetail/1632612109718192129 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-20635
https://notcve.org/view.php?id=CVE-2023-20635
07 Mar 2023 — In keyinstall, there is a possible information disclosure due to an integer overflow. • https://corp.mediatek.com/product-security-bulletin/March-2023 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2022-4645 – libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c
https://notcve.org/view.php?id=CVE-2022-4645
03 Mar 2023 — Issues addressed include buffer overflow, integer overflow, out of bounds read, and out of bounds write vulnerabilities. • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json • CWE-125: Out-of-bounds Read •

CVE-2023-25155 – Integer Overflow in several Redis commands can lead to denial of service.
https://notcve.org/view.php?id=CVE-2023-25155
02 Mar 2023 — Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. ... This flaw allows authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands to trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. ... An attacker could possibly use this issu... • https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-36021 – Redis string pattern matching can be abused to achieve Denial of Service
https://notcve.org/view.php?id=CVE-2022-36021
01 Mar 2023 — An attacker could possibly use this issue to trigger an integer overflow, which might cause Redis to allocate impossible amounts of memory, resulting in a denial of service via an application crash. • https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 • CWE-407: Inefficient Algorithmic Complexity •