Vulnerabilities > Integer Overflow or Wraparound
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-19 | CVE-2022-22078 | Integer Overflow or Wraparound vulnerability in Qualcomm products Denial of service in BOOT when partition size for a particular partition is requested due to integer overflow when blocks are calculated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | 4.6 |
2022-10-19 | CVE-2022-25748 | Integer Overflow or Wraparound vulnerability in Qualcomm products Memory corruption in WLAN due to integer overflow to buffer overflow while parsing GTK frames. | 9.8 |
2022-10-11 | CVE-2022-41550 | Integer Overflow or Wraparound vulnerability in GNU Osip 5.3.0 GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header. | 6.5 |
2022-10-11 | CVE-2021-0951 | Integer Overflow or Wraparound vulnerability in Google Android In DevmemIntHeapAcquire of TBD, there is a possible arbitrary code execution due to an integer overflow. | 7.8 |
2022-10-11 | CVE-2022-20410 | Integer Overflow or Wraparound vulnerability in Google Android In avrc_ctrl_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to an integer overflow. | 7.5 |
2022-10-11 | CVE-2022-20423 | Integer Overflow or Wraparound vulnerability in Google Android In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. | 4.6 |
2022-10-11 | CVE-2022-35289 | Integer Overflow or Wraparound vulnerability in Facebook Hermes A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. | 9.8 |
2022-09-29 | CVE-2014-0147 | Integer Overflow or Wraparound vulnerability in multiple products Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine. | 6.2 |
2022-09-29 | CVE-2022-1718 | Integer Overflow or Wraparound vulnerability in Trudesk Project Trudesk The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. | 7.5 |
2022-09-23 | CVE-2021-3782 | Integer Overflow or Wraparound vulnerability in Wayland An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. | 6.6 |