Page 89 of 5962 results (0.185 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

19 Oct 2023 — zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c. zchunk anterior a 1.3.2 tiene múltiples desbordamientos de enteros a través de archivos zchunk con formato incorrecto a lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c o lib/header.c. • https://bugzilla.suse.com/show_bug.cgi?id=1216268 • CWE-190: Integer Overflow or Wraparound

CVSS: 3.6EPSS: 0%CPEs: 8EXPL: 0

18 Oct 2023 — An attacker could possibly use this issue to trigger an integer overflow, which might cause Redis to allocate impossible amounts of memory, resulting in a denial of service via an application crash. • https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 • CWE-269: Improper Privilege Management CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

14 Oct 2023 — MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. • http://www.openwall.com/lists/oss-security/2023/10/20/9 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

13 Oct 2023 — An integer overflow flaw was found in the Linux kernel. • http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

12 Oct 2023 — An integer underflow vulnerability exists in the vpnserver OvsProcessData functionality of SoftEther VPN 5.01.9674 and 5.02. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2023 — An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c. Un problema en GPAC GPAC v.2.2.1 y anteriores permite que un atacante local provoque una Denegación de Servicio (DoS) a través de la función Q_DecCoordOnUnitSphere del archivo src/bifs/unquantize.c. • https://github.com/gpac/gpac/issues/2567 • CWE-190: Integer Overflow or Wraparound

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •