6292 results (0.040 seconds)

CVSS: 7.8EPSS: %CPEs: -EXPL: 0

03 Jun 2025 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. Existe una vulnerabilidad de corrupción de memoria en la implementación del analizador de registros de tabla de cadenas compartidas de la utilidad xls2csv versión 0.95. Un archivo malformado especialmente manipulado puede provocar un desbo... • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128 • CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131 • CWE-190: Integer Overflow or Wraparound

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

02 Jun 2025 — A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970. • https://cert.vde.com/en/advisories/VDE-2025-020 • CWE-190: Integer Overflow or Wraparound

CVSS: 3.1EPSS: 0%CPEs: 1EXPL: 0

02 Jun 2025 — setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. • https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

30 May 2025 — A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the ... • https://github.com/advisories/GHSA-5v8v-66v8-mwm7 • CWE-1395: Dependency on Vulnerable Third-Party Component •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request. • https://fortiguard.fortinet.com/psirt/FG-IR-24-388 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-c5h5-54gp-xh4q • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

22 May 2025 — Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-5g85-6p6v-r479 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •