Vulnerabilities (CVE)

Filtered by CWE-190
Total 2676 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38080 1 Microsoft 5 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 2 more 2025-01-27 N/A 7.8 HIGH
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-43545 1 Qualcomm 56 Ar8035, Ar8035 Firmware, Fastconnect 7800 and 53 more 2025-01-27 N/A 6.7 MEDIUM
Memory corruption when more scan frequency list or channels are sent from the user space.
CVE-2022-20685 2025-01-27 N/A 7.5 HIGH
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CVE-2025-21244 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-01-24 N/A 8.8 HIGH
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-21243 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-01-24 N/A 8.8 HIGH
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2023-32058 1 Vyperlang 1 Vyper 2025-01-24 N/A 7.5 HIGH
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8.
CVE-2024-1633 1 Renesas 10 Arm-trusted-firmware, R-car D3e, R-car E3e and 7 more 2025-01-24 N/A 2.0 LOW
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 
CVE-2024-3077 1 Zephyrproject 1 Zephyr 2025-01-23 N/A 6.8 MEDIUM
An malicious BLE device can crash BLE victim device by sending malformed gatt packet
CVE-2024-57938 1 Linux 1 Linux Kernel 2025-01-22 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: net/sctp: Prevent autoclose integer overflow in sctp_association_init() While by default max_autoclose equals to INT_MAX / HZ, one may set net.sctp.max_autoclose to UINT_MAX. There is code in sctp_association_init() that can consequently trigger overflow.
CVE-2024-23307 1 Linux 1 Linux Kernel 2025-01-22 N/A 4.4 MEDIUM
Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.
CVE-2023-33204 3 Debian, Fedoraproject, Sysstat Project 3 Debian Linux, Fedora, Sysstat 2025-01-22 N/A 7.8 HIGH
sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.
CVE-2024-51540 1 Dell 1 Elastic Cloud Storage 2025-01-21 N/A 8.1 HIGH
Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. An authenticated user with bucket or object-level access and the necessary privileges could potentially exploit this vulnerability to bypass retention policies and delete objects.
CVE-2025-21338 1 Microsoft 16 Office, Windows 10 1507, Windows 10 1607 and 13 more 2025-01-21 N/A 7.8 HIGH
GDI+ Remote Code Execution Vulnerability
CVE-2024-21812 2 Fedoraproject, Libbiosig Project 2 Fedora, Libbiosig 2025-01-21 N/A 9.8 CRITICAL
An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2024-57890 1 Linux 1 Linux Kernel 2025-01-21 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32 values that come from the user so the multiplication can lead to integer wrapping. Then we pass the result to uverbs_request_next_ptr() which also could potentially wrap. The "cmd.sge_count * sizeof(struct ib_uverbs_sge)" multiplication can also overflow on 32bit systems although it's fine on 64bit systems. This patch does two things. First, I've re-arranged the condition in uverbs_request_next_ptr() so that the use controlled variable "len" is on one side of the comparison by itself without any math. Then I've modified all the callers to use size_mul() for the multiplications.
CVE-2023-52389 1 Pocoproject 1 Poco 2025-01-20 N/A 9.8 CRITICAL
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
CVE-2023-52339 1 Matroska 1 Libebml 2025-01-20 N/A 6.5 MEDIUM
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
CVE-2025-21382 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-01-17 N/A 7.8 HIGH
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2025-23022 1 Freetype 1 Freetype 2025-01-16 N/A 4.0 MEDIUM
FreeType 2.8.1 has a signed integer overflow in cf2_doFlex in cff/cf2intrp.c.
CVE-2024-53187 1 Linux 1 Linux Kernel 2025-01-16 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0 Call Trace: <TASK> __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183 io_rings_map io_uring/io_uring.c:2611 [inline] io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470 io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692 io_uring_setup io_uring/io_uring.c:3781 [inline] ... </TASK> io_pin_pages()'s uaddr parameter came directly from the user and can be garbage. Don't just add size to it as it can overflow.