Page 12 of 4109 results (0.124 seconds)

CVSS: 9.2EPSS: 0%CPEs: 2EXPL: 0

This could allow an unauthenticated remote attacker to cause an integer overflow and crash of the application. • https://cert-portal.siemens.com/productcert/html/ssa-103653.html • CWE-190: Integer Overflow or Wraparound

CVSS: 4.4EPSS: 0%CPEs: -EXPL: 0

In the function slsi_rx_scan_ind(), there is no input validation check on a length coming from userspace, which can lead to integer overflow and a potential heap over-read. • https://semiconductor.samsung.com/support/quality-support/product-security-updates https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27367 •

CVSS: 9.1EPSS: 0%CPEs: -EXPL: 0

A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data. • https://security.freebsd.org/advisories/FreeBSD-SA-24:09.libnv.asc • CWE-131: Incorrect Calculation of Buffer Size CWE-190: Integer Overflow or Wraparound

CVSS: 8.4EPSS: 0%CPEs: 3EXPL: 0

Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow. en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local provoque un bloqueo a través de un desbordamiento de enteros. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-190: Integer Overflow or Wraparound