
CVE-2025-1235 – WAGO: Switches affected by year 2k38 problem
https://notcve.org/view.php?id=CVE-2025-1235
02 Jun 2025 — A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970. • https://cert.vde.com/en/advisories/VDE-2025-020 • CWE-190: Integer Overflow or Wraparound •

CVE-2025-49112 – SUSE Security Advisory - SUSE-SU-2025:02231-1
https://notcve.org/view.php?id=CVE-2025-49112
02 Jun 2025 — setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. ... Absence of filename size check may cause a stack overflow. SetDeferredReply integer underflow. • https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2020-36846 – IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library
https://notcve.org/view.php?id=CVE-2020-36846
30 May 2025 — A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. ... A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. • https://github.com/advisories/GHSA-5v8v-66v8-mwm7 • CWE-1395: Dependency on Vulnerable Third-Party Component •

CVE-2025-27151 – redis-check-aof may lead to stack overflow and potential RCE
https://notcve.org/view.php?id=CVE-2025-27151
29 May 2025 — In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. ... Absence of filename size check may cause a stack overflow. SetDeferredReply integer underflow. • https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm • CWE-20: Improper Input Validation CWE-121: Stack-based Buffer Overflow •

CVE-2025-47294
https://notcve.org/view.php?id=CVE-2025-47294
28 May 2025 — A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request. • https://fortiguard.fortinet.com/psirt/FG-IR-24-388 • CWE-190: Integer Overflow or Wraparound •

CVE-2025-46714 – Sandboxie has Pool Buffer Overflow in SbieDrv.sys API (API_GET_SECURE_PARAM)
https://notcve.org/view.php?id=CVE-2025-46714
22 May 2025 — Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2025-46713 – Sandboxie has Pool Buffer Overflow in SbieDrv.sys API (API_SET_SECURE_PARAM)
https://notcve.org/view.php?id=CVE-2025-46713
22 May 2025 — Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-5g85-6p6v-r479 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-23337 – jq has signed integer overflow in jv.c:jvp_array_write
https://notcve.org/view.php?id=CVE-2024-23337
21 May 2025 — In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. ... An integer overflow can occur when attempting to assign a value using an array index of 2147483647 or when creating an array with 2147483647 elements, the maximum value for a 32-bit signed integer. ... Issues addressed include buffer overflow and integer overflow vulnerabilities. • https://github.com/jqlang/jq/security/advisories/GHSA-2q6r-344g-cx46 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •

CVE-2025-4969 – Libsoup: off-by-one out-of-bounds read in find_boundary() in soup-multipart.c
https://notcve.org/view.php?id=CVE-2025-4969
21 May 2025 — This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read). ... Fixed integer underflow in soup_multipart_new_from_message leading to denial of service. Fixed off-by-one out-of-bounds read may lead to infoleak. • https://access.redhat.com/security/cve/CVE-2025-4969 • CWE-125: Out-of-bounds Read •

CVE-2025-5001 – GNU PSPP pspp-convert.c calloc integer overflow
https://notcve.org/view.php?id=CVE-2025-5001
20 May 2025 — The manipulation of the argument -l leads to integer overflow. ... Mit der Manipulation des Arguments -l mit unbekannten Daten kann eine integer overflow-Schwachstelle ausgenutzt werden. • https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •