Page 99 of 5992 results (0.057 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

01 Aug 2023 — An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. • https://access.redhat.com/security/cve/CVE-2023-38560 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

31 Jul 2023 — Issues addressed include code execution, denial of service, integer overflow, and out of bounds write vulnerabilities. • https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714 • CWE-203: Observable Discrepancy •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

28 Jul 2023 — An integer overflow was addressed with improved input validation. • https://support.apple.com/en-us/HT213841 • CWE-190: Integer Overflow or Wraparound

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

27 Jul 2023 — GStreamer RealMedia File Parsing Integer Overflow Remote Code Execution Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch • CWE-190: Integer Overflow or Wraparound

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

27 Jul 2023 — GStreamer RealMedia File Parsing Integer Overflow Remote Code Execution Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch • CWE-190: Integer Overflow or Wraparound

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

25 Jul 2023 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. • http://www.openwall.com/lists/oss-security/2023/08/02/1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 3.7EPSS: 0%CPEs: 24EXPL: 0

18 Jul 2023 — Issues addressed include denial of service and integer overflow vulnerabilities. • https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 3.7EPSS: 0%CPEs: 24EXPL: 0

18 Jul 2023 — Issues addressed include denial of service and integer overflow vulnerabilities. • https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html • CWE-125: Out-of-bounds Read •

CVSS: 3.7EPSS: 0%CPEs: 12EXPL: 0

18 Jul 2023 — Issues addressed include denial of service and integer overflow vulnerabilities. • https://security.netapp.com/advisory/ntap-20230725-0006 • CWE-125: Out-of-bounds Read •

CVSS: 5.1EPSS: 0%CPEs: 22EXPL: 0

18 Jul 2023 — Issues addressed include denial of service and integer overflow vulnerabilities. • https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html • CWE-334: Small Space of Random Values •