Page 4 of 6327 results (0.040 seconds)

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

02 Jun 2025 — A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970. • https://cert.vde.com/en/advisories/VDE-2025-020 • CWE-190: Integer Overflow or Wraparound

CVSS: 3.1EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. • https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

30 May 2025 — A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. ... A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. • https://github.com/advisories/GHSA-5v8v-66v8-mwm7 • CWE-1395: Dependency on Vulnerable Third-Party Component •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request. • https://fortiguard.fortinet.com/psirt/FG-IR-24-388 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-5g85-6p6v-r479 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

21 May 2025 — In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. • https://github.com/jqlang/jq/security/advisories/GHSA-2q6r-344g-cx46 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

21 May 2025 — This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read). ... Fixed off-by-one out-of-bounds read may lead to infoleak. Fixed integer underflow in soup_multipart_new_from_message leading to denial of service. • https://access.redhat.com/security/cve/CVE-2025-4969 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

20 May 2025 — The manipulation of the argument -l leads to integer overflow. ... Mit der Manipulation des Arguments -l mit unbekannten Daten kann eine integer overflow-Schwachstelle ausgenutzt werden. • https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

20 May 2025 — A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service. Existe una falla en el filtro "blocksize" de nbdkit que puede activarse con un tipo específico de solicitud de cliente. Cuando un cliente solicita información sobre el estado del bloque para un rango de datos muy grande, super... • https://access.redhat.com/security/cve/CVE-2025-47712 • CWE-190: Integer Overflow or Wraparound