Page 3 of 4054 results (0.003 seconds)

CVSS: 8.4EPSS: 0%CPEs: 3EXPL: 0

Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow. en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local provoque un bloqueo a través de un desbordamiento de enteros. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-190: Integer Overflow or Wraparound

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX. • https://github.com/libexpat/libexpat/issues/888 https://github.com/libexpat/libexpat/pull/891 https://access.redhat.com/security/cve/CVE-2024-45491 https://bugzilla.redhat.com/show_bug.cgi?id=2308616 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.3EPSS: 0%CPEs: -EXPL: 0

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). ... It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX. • https://github.com/libexpat/libexpat/issues/889 https://github.com/libexpat/libexpat/pull/892 https://access.redhat.com/security/cve/CVE-2024-45492 https://bugzilla.redhat.com/show_bug.cgi?id=2308617 • CWE-190: Integer Overflow or Wraparound

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function. • https://github.com/libexpat/libexpat/issues/887 https://github.com/libexpat/libexpat/pull/890 https://access.redhat.com/security/cve/CVE-2024-45490 https://bugzilla.redhat.com/show_bug.cgi?id=2308615 • CWE-190: Integer Overflow or Wraparound