Page 73 of 4111 results (0.276 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request. ... An integer overflow exists in xerces-c++. • https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791 https://access.redhat.com/security • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •