Page 49 of 4107 results (0.055 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21310 • CWE-197: Numeric Truncation Error •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador en modo kernel de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21309 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 1

Windows Kernel Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del kernel de Windows • https://github.com/RomanRybachek/CVE-2024-20698 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20698 • CWE-190: Integer Overflow or Wraparound

CVSS: 8.0EPSS: 1%CPEs: 26EXPL: 0

Microsoft ODBC Driver Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del controlador ODBC de Microsoft • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. ... An attacker, leveraging a local network, can initiate an integer overflow leading to a buffer overflow. • https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ https://access.redhat.com/security/cve/CVE-2022-36765 https://bugzilla.redhat.com/show_bug.cgi?id=2257584 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-680: Integer Overflow to Buffer Overflow