Page 127 of 7148 results (0.105 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

06 Jun 2024 — dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query. dnsmasq 2.9 es vulnerable al desbordamiento de enteros a través de forward_query. • https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017332.html • CWE-190: Integer Overflow or Wraparound

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

05 Jun 2024 — Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.... • https://issues.chromium.org/issues/332382766 • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 1

04 Jun 2024 — Unfortunately, two separate errors combine which would allow an attacker to cause the sequence number to overflow and thus the nonce to repeat. netty-incubator-codec-ohttp es la implementación OHTTP para netty. • https://github.com/netty/netty-incubator-codec-ohttp/blob/1ddadb6473cd3be5491d114431ed4c1a9f316001/codec-ohttp-hpke-classes-boringssl/src/main/java/io/netty/incubator/codec/hpke/boringssl/BoringSSLAEADContext.java#L112-L114 • CWE-190: Integer Overflow or Wraparound CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-323: Reusing a Nonce, Key Pair in Encryption •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

04 Jun 2024 — It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation. • https://github.com/envoyproxy/envoy/security/advisories/GHSA-g9mq-6v96-cpqc • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

03 Jun 2024 — Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of t... • https://g-issues.chromium.org/issues/332382766 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

03 Jun 2024 — Memory corruption when more scan frequency list or channels are sent from the user space. Corrupción de la memoria cuando se envían más listas de frecuencias de escaneo o canales desde el espacio del usuario. • https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound

CVSS: 8.3EPSS: 0%CPEs: 8EXPL: 0

03 Jun 2024 — Fixed int overflow for stack access size. ... Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules. • https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

31 May 2024 — Sonos Era 100 SMB2 Message Handling Integer Underflow Information Disclosure Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before reading from memory. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before reading from memory. • https://www.zerodayinitiative.com/advisories/ZDI-24-542 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 6.0EPSS: 0%CPEs: 28EXPL: 0

30 May 2024 — Out-of-bounds read in edk2 when processing IA_NA/IA_TA options in DHCPv6 Advertise messages. Buffer overflow in the DHCPv6 client in edk2 via a long Server ID option. Out-of-bounds read in edk2 when handling a ND Redirect message with truncated options. ... Buffer overflow in edk2 when processing DNS Servers options in a DHCPv6 Advertise message. Buffer overflow in edk2 when handling the Server ID option in a DHCPv6 proxy Advertise message. • https://github.com/tianocore/edk2/security/advisories/GHSA-chfw-xj8f-6m53 • CWE-369: Divide By Zero •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

30 May 2024 — In the Linux kernel, the following vulnerability has been resolved: block: fix overflow in blk_ioctl_discard() There is no check for overflow of 'start + len' in blk_ioctl_discard(). In the Linux kernel, the following vulnerability has been resolved: block: fix overflow in blk_ioctl_discard() There is no check for overflow of 'start + len' in blk_ioctl_discard(). Hung task occurs if submit an discard ioctl with the following param: start = 0x80000000000ff000, len = 0x8000000000ff... • https://git.kernel.org/stable/c/d30a2605be9d5132d95944916e8f578fcfe4f976 • CWE-190: Integer Overflow or Wraparound