
CVE-2023-46228
https://notcve.org/view.php?id=CVE-2023-46228
19 Oct 2023 — zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c. zchunk anterior a 1.3.2 tiene múltiples desbordamientos de enteros a través de archivos zchunk con formato incorrecto a lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c o lib/header.c. • https://bugzilla.suse.com/show_bug.cgi?id=1216268 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-45145 – Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.
https://notcve.org/view.php?id=CVE-2023-45145
18 Oct 2023 — An attacker could possibly use this issue to trigger an integer overflow, which might cause Redis to allocate impossible amounts of memory, resulting in a denial of service via an application crash. • https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 • CWE-269: Improper Privilege Management CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2023-45853 – zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
https://notcve.org/view.php?id=CVE-2023-45853
14 Oct 2023 — MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. • http://www.openwall.com/lists/oss-security/2023/10/20/9 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •

CVE-2023-42752 – Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access
https://notcve.org/view.php?id=CVE-2023-42752
13 Oct 2023 — An integer overflow flaw was found in the Linux kernel. • http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-22308
https://notcve.org/view.php?id=CVE-2023-22308
12 Oct 2023 — An integer underflow vulnerability exists in the vpnserver OvsProcessData functionality of SoftEther VPN 5.01.9674 and 5.02. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2023-42298
https://notcve.org/view.php?id=CVE-2023-42298
12 Oct 2023 — An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c. Un problema en GPAC GPAC v.2.2.1 y anteriores permite que un atacante local provoque una Denegación de Servicio (DoS) a través de la función Q_DecCoordOnUnitSphere del archivo src/bifs/unquantize.c. • https://github.com/gpac/gpac/issues/2567 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-35966
https://notcve.org/view.php?id=CVE-2023-35966
11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2023-35965
https://notcve.org/view.php?id=CVE-2023-35965
11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2023-35968
https://notcve.org/view.php?id=CVE-2023-35968
11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2023-35967
https://notcve.org/view.php?id=CVE-2023-35967
11 Oct 2023 — An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •