
CVE-2022-4202 – GPAC lsr_dec.c lsr_translate_coords integer overflow
https://notcve.org/view.php?id=CVE-2022-4202
29 Nov 2022 — The manipulation leads to integer overflow. • https://drive.google.com/file/d/1HVWa6IpAbvsMS5rx091RfjUB4GfXrMLE/view • CWE-189: Numeric Errors •

CVE-2022-45934 – kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c
https://notcve.org/view.php?id=CVE-2022-45934
27 Nov 2022 — An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. ... An integer overflow flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user generates malicious L2CAP_CONF_REQ packets. • https://github.com/Trinadh465/linux-4.19.72_CVE-2022-45934 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-37301
https://notcve.org/view.php?id=CVE-2022-37301
22 Nov 2022 — Affected products: Modicon M340 CPU (part numbers BMXP34*)(V3.40 and prior), Modicon M580 CPU (part numbers BMEP* and BMEH*)(V3.22 and prior), Legacy Modicon Quantum/Premium(All Versions), Modicon Momentum MDI (171CBU*)(All Versions), Modicon MC80 (BMKC80)(V1.7 and prior) Existe una vulnerabilidad CWE-191: Integer Underflow (Wrap o Wraparound) que podría causar una Denegación de Servicio (DoS) del controlador debido a violaciones de acceso a la memoria cuando se utiliza el protoc... • https://www.se.com/us/en/download/document/SEVD-2022-221-02 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2022-42898 – krb5: integer overflow vulnerabilities in PAC parsing
https://notcve.org/view.php?id=CVE-2022-42898
21 Nov 2022 — PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. • https://bugzilla.samba.org/show_bug.cgi?id=15203 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-42533
https://notcve.org/view.php?id=CVE-2022-42533
17 Nov 2022 — In shared_metadata_init of SharedMetadata.cpp, there is a possible out of bounds write due to an integer overflow. • https://source.android.com/security/bulletin/pixel/2022-11-01 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-3970 – LibTIFF tif_getimage.c TIFFReadRGBATileExt integer overflow
https://notcve.org/view.php?id=CVE-2022-3970
13 Nov 2022 — The manipulation leads to integer overflow. ... An integer overflow flaw was found in LibTIFF. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137 • CWE-189: Numeric Errors CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-31630 – OOB read due to insufficient input validation in imageloadfont()
https://notcve.org/view.php?id=CVE-2022-31630
09 Nov 2022 — In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. En versiones de PHP anteriores a 7.4.33, 8.0.25 y 8.2.12, cuando se usa la función imageloadfont() en la extensión gd, es posible proporcionar un archivo de fuente especialm... • https://bugs.php.net/bug.php?id=81739 • CWE-125: Out-of-bounds Read CWE-131: Incorrect Calculation of Buffer Size CWE-190: Integer Overflow or Wraparound •

CVE-2022-41092 – Windows Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41092
09 Nov 2022 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092 •

CVE-2022-39377 – sysstat Incorrect Buffer Size calculation on 32-bit systems results in RCE via buffer overflow
https://notcve.org/view.php?id=CVE-2022-39377
08 Nov 2022 — An arithmetic overflow issue was discovered in Sysstat on 32-bit systems. • https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-131: Incorrect Calculation of Buffer Size •

CVE-2022-39343 – Azure RTOS FileX vulnerable to Buffer Offerflow
https://notcve.org/view.php?id=CVE-2022-39343
08 Nov 2022 — In versions before 6.2.0, the Fault Tolerant feature of Azure RTOS FileX includes integer under and overflows which may be exploited to achieve buffer overflow and modify memory contents. • https://github.com/azure-rtos/filex/blob/master/common/src/fx_fault_tolerant_apply_logs.c#L218 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-190: Integer Overflow or Wraparound CWE-191: Integer Underflow (Wrap or Wraparound) •