Page 88 of 5992 results (0.166 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

16 Nov 2023 — Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

16 Nov 2023 — Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

16 Nov 2023 — Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

16 Nov 2023 — In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. • http://www.openwall.com/lists/oss-security/2023/11/16/1 • CWE-190: Integer Overflow or Wraparound

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

14 Nov 2023 — Integer overflow in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

14 Nov 2023 — Windows Deployment Services Denial of Service Vulnerability Vulnerabilidad de denegación de servicio de Windows Deployment Services. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395 • CWE-190: Integer Overflow or Wraparound

CVSS: 8.3EPSS: 1%CPEs: 26EXPL: 0

14 Nov 2023 — Microsoft Remote Registry Service Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del servicio de registro remoto de Microsoft. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401 • CWE-190: Integer Overflow or Wraparound

CVSS: 9.0EPSS: 4%CPEs: 49EXPL: 0

14 Nov 2023 — This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. • https://access.redhat.com/errata/RHSA-2023:7545 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2023 — GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability. GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability. GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. The issue results from the lack of proper validation of user-supplied data, which ... • https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released • CWE-190: Integer Overflow or Wraparound

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

10 Nov 2023 — An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation. Un atacante con acceso local a un sistema (ya sea a través de un disco o una unidad externa) puede presentar una partición XFS modificada a grub-legacy de tal manera que aproveche una corrupción de memoria en la implementación del sistema de archivos XFS de grub. • https://xenbits.xenproject.org/xsa/advisory-443.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •