
CVE-2021-22636 – Texas Instruments TI-RTOS Integer Overflow or Wraparound
https://notcve.org/view.php?id=CVE-2021-22636
20 Nov 2023 — Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution. • https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-27429 – Texas Instruments TI-RTOS Integer Overflow or Wraparound
https://notcve.org/view.php?id=CVE-2021-27429
20 Nov 2023 — This can trigger an integer overflow vulnerability in 'HeapTrack_alloc' and result in code execution. • https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-48233 – overflow with count for :s command in vim
https://notcve.org/view.php?id=CVE-2023-48233
16 Nov 2023 — Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-48234 – overflow in nv_z_get_count in vim
https://notcve.org/view.php?id=CVE-2023-48234
16 Nov 2023 — Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-48235 – overflow in ex address parsing in vim
https://notcve.org/view.php?id=CVE-2023-48235
16 Nov 2023 — Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-48236 – overflow in get_number in vim
https://notcve.org/view.php?id=CVE-2023-48236
16 Nov 2023 — Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-48237 – overflow in shift_line in vim
https://notcve.org/view.php?id=CVE-2023-48237
16 Nov 2023 — In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-22305
https://notcve.org/view.php?id=CVE-2023-22305
14 Nov 2023 — Integer overflow in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2023-36395 – Windows Deployment Services Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-36395
14 Nov 2023 — Windows Deployment Services Denial of Service Vulnerability Vulnerabilidad de denegación de servicio de Windows Deployment Services. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-36401 – Microsoft Remote Registry Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-36401
14 Nov 2023 — Microsoft Remote Registry Service Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del servicio de registro remoto de Microsoft. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401 • CWE-190: Integer Overflow or Wraparound •