Page 196 of 6002 results (0.027 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

12 Aug 2021 — In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ... Hence, the implicit conversion transforms the negative value to a large integer. • https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5 • CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

12 Aug 2021 — In affected versions the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ... But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer. • https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1 • CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 7.3EPSS: 0%CPEs: 10EXPL: 0

11 Aug 2021 — NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system. • https://nvidia.custhelp.com/app/answers/detail/a_id/5216 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 0

11 Aug 2021 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34536 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

09 Aug 2021 — Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5. Exiv2 es una utilidad de línea de comandos y una biblioteca C++ para leer, escribir, borrar y modi... • https://github.com/Exiv2/exiv2/pull/1766 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

09 Aug 2021 — Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, and out of bounds read vulnerabilities. • https://github.com/Exiv2/exiv2/pull/1752 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

09 Aug 2021 — Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, and out of bounds read vulnerabilities. • https://github.com/Exiv2/exiv2/pull/1759 • CWE-125: Out-of-bounds Read •