Vulnerabilities > Integer Overflow or Wraparound

DATE CVE VULNERABILITY TITLE RISK
2024-09-02 CVE-2024-28044 Integer Overflow or Wraparound vulnerability in Openatom Openharmony 4.0
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow.
local
low complexity
openatom CWE-190
5.5
2024-08-30 CVE-2024-45491 Integer Overflow or Wraparound vulnerability in Libexpat Project Libexpat
An issue was discovered in libexpat before 2.6.3.
network
low complexity
libexpat-project CWE-190
critical
9.8
2024-08-30 CVE-2024-45492 Integer Overflow or Wraparound vulnerability in Libexpat Project Libexpat
An issue was discovered in libexpat before 2.6.3.
network
low complexity
libexpat-project CWE-190
critical
9.8
2024-08-26 CVE-2024-43890 Integer Overflow or Wraparound vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix overflow in get_free_elt() "tracing_map->next_elt" in get_free_elt() is at risk of overflowing. Once it overflows, new elements can still be inserted into the tracing_map even though the maximum number of elements (`max_elts`) has been reached. Continuing to insert elements after the overflow could result in the tracing_map containing "tracing_map->max_size" elements, leaving no empty entries. If any attempt is made to insert an element into a full tracing_map using `__tracing_map_insert()`, it will cause an infinite loop with preemption disabled, leading to a CPU hang problem. Fix this by preventing any further increments to "tracing_map->next_elt" once it reaches "tracing_map->max_elt".
local
low complexity
linux CWE-190
5.5
2024-08-22 CVE-2022-48938 Integer Overflow or Wraparound vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment.
local
low complexity
linux CWE-190
5.5
2024-08-20 CVE-2024-30949 Integer Overflow or Wraparound vulnerability in Newlib Project Newlib 4.3.0
An issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function.
network
low complexity
newlib-project CWE-190
critical
9.8
2024-08-17 CVE-2024-43838 Integer Overflow or Wraparound vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: bpf: fix overflow check in adjust_jmp_off() adjust_jmp_off() incorrectly used the insn->imm field for all overflow check, which is incorrect as that should only be done or the BPF_JMP32 | BPF_JA case, not the general jump instruction case.
local
low complexity
linux CWE-190
5.5
2024-08-15 CVE-2024-31333 Integer Overflow or Wraparound vulnerability in Google Android
In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow.
local
low complexity
google CWE-190
7.8
2024-08-15 CVE-2024-34740 Integer Overflow or Wraparound vulnerability in Google Android
In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow.
local
low complexity
google CWE-190
7.8
2024-08-15 CVE-2024-7867 Integer Overflow or Wraparound vulnerability in Xpdfreader Xpdf
In Xpdf 4.05 (and earlier), very large coordinates in a page box can cause an integer overflow and divide-by-zero.
local
low complexity
xpdfreader CWE-190
6.2