Page 7 of 6891 results (0.019 seconds)

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

02 Jun 2025 — A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970. • https://cert.vde.com/en/advisories/VDE-2025-020 • CWE-190: Integer Overflow or Wraparound

CVSS: 3.1EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. ... Absence of filename size check may cause a stack overflow. SetDeferredReply integer underflow. • https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

30 May 2025 — A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. ... A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. • https://github.com/advisories/GHSA-5v8v-66v8-mwm7 • CWE-1395: Dependency on Vulnerable Third-Party Component •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

29 May 2025 — In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. ... Absence of filename size check may cause a stack overflow. SetDeferredReply integer underflow. • https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm • CWE-20: Improper Input Validation CWE-121: Stack-based Buffer Overflow

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request. • https://fortiguard.fortinet.com/psirt/FG-IR-24-388 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-5g85-6p6v-r479 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

21 May 2025 — In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. ... An integer overflow can occur when attempting to assign a value using an array index of 2147483647 or when creating an array with 2147483647 elements, the maximum value for a 32-bit signed integer. ... Issues addressed include buffer overflow and integer overflow vulnerabilities. • https://github.com/jqlang/jq/security/advisories/GHSA-2q6r-344g-cx46 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

21 May 2025 — This can allow a remote attacker to send a specially crafted multipart HTTP body, causing the libsoup-consuming server to read beyond its allocated memory boundaries (out-of-bounds read). ... Fixed integer underflow in soup_multipart_new_from_message leading to denial of service. Fixed off-by-one out-of-bounds read may lead to infoleak. • https://access.redhat.com/security/cve/CVE-2025-4969 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

20 May 2025 — The manipulation of the argument -l leads to integer overflow. ... Mit der Manipulation des Arguments -l mit unbekannten Daten kann eine integer overflow-Schwachstelle ausgenutzt werden. • https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound