Page 73 of 4107 results (0.032 seconds)

CVSS: 6.7EPSS: 0%CPEs: 20EXPL: 0

In apusys, there is a possible out of bounds write due to an integer overflow. • https://corp.mediatek.com/product-security-bulletin/October-2023 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.7EPSS: 0%CPEs: 17EXPL: 0

In vpu, there is a possible out of bounds write due to an integer overflow. • https://corp.mediatek.com/product-security-bulletin/October-2023 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.7EPSS: 0%CPEs: 32EXPL: 0

In rpmb , there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07912966; Issue ID: ALPS07912966. En rpmb, existe una posible corrupción de la memoria debido a una verificación de límites faltantes. • https://corp.mediatek.com/product-security-bulletin/October-2023 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118. • https://bugzilla.mozilla.org/show_bug.cgi?id=1823172 https://security.gentoo.org/glsa/202401-10 https://www.mozilla.org/security/advisories/mfsa2023-41 • CWE-190: Integer Overflow or Wraparound

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. ... GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://gstreamer.freedesktop.org/security/sa-2023-0007.html https://www.zerodayinitiative.com/advisories/ZDI-23-1457 https://access.redhat.com/security/cve/CVE-2023-40475 https://bugzilla.redhat.com/show_bug.cgi?id=2254588 • CWE-190: Integer Overflow or Wraparound