CVE-2023-31034
https://notcve.org/view.php?id=CVE-2023-31034
NVIDIA DGX A100 SBIOS contains a vulnerability where a local attacker can cause input validation checks to be bypassed by causing an integer overflow. • https://nvidia.custhelp.com/app/answers/detail/a_id/5510 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-49262 – Buffer overflow vulnerability in Cookie authentication field
https://notcve.org/view.php?id=CVE-2023-49262
The authentication mechanism can be bypassed by overflowing the value of the Cookie "authentication" field, provided there is an active user session. El mecanismo de autenticación se puede omitir desbordando el valor del campo "authentication" de cookies, siempre que haya una sesión de usuario activa. • https://cert.pl/en/posts/2024/01/CVE-2023-49253 https://cert.pl/posts/2024/01/CVE-2023-49253 • CWE-190: Integer Overflow or Wraparound CWE-287: Improper Authentication •
CVE-2023-52339
https://notcve.org/view.php?id=CVE-2023-52339
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. • https://github.com/Matroska-Org/libebml/blob/v1.x/NEWS.md https://github.com/Matroska-Org/libebml/compare/release-1.4.4...release-1.4.5 https://github.com/Matroska-Org/libebml/issues/147 https://github.com/Matroska-Org/libebml/pull/148 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJUXVOIRWPP7OFYUKQZDNJTSLWCPIZBH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNANFT4P6KL4WDQ3TV6QQ44NSC7WKLAB • CWE-190: Integer Overflow or Wraparound •
CVE-2023-28185
https://notcve.org/view.php?id=CVE-2023-28185
An integer overflow was addressed through improved input validation. • https://support.apple.com/en-us/HT213673 https://support.apple.com/en-us/HT213674 https://support.apple.com/en-us/HT213675 https://support.apple.com/en-us/HT213676 https://support.apple.com/en-us/HT213677 https://support.apple.com/en-us/HT213678 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-41056 – Redis vulnerable to integer overflow in certain payloads
https://notcve.org/view.php?id=CVE-2023-41056
Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. • https://github.com/redis/redis/releases/tag/7.0.15 https://github.com/redis/redis/releases/tag/7.2.4 https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN https://security.netapp.com/advisory/ntap-20240223-0003 • CWE-190: Integer Overflow or Wraparound CWE-762: Mismatched Memory Management Routines •