CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c. |
EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service. |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Avoid overflow from uint32_t to uint8_t
[WHAT & HOW]
dmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned
0xFFFF. Fix it by changing it to uint8_t with value of 0xFF.
This fixes 2 INTEGER_OVERFLOW issues reported by Coverity. |
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Ensure index calculation will not overflow
[WHY & HOW]
Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will
never overflow and exceess array size.
This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity. |
Integer overflow or wraparound in Windows SMB allows an authorized attacker to elevate privileges locally. |
In HeifDataSource::readAt of HeifDecoderImpl.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. |
Windows Kernel Elevation of Privilege Vulnerability |
Windows iSCSI Target Service Information Disclosure Vulnerability |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally. |
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service. |
Windows Registry Elevation of Privilege Vulnerability |
Windows Telephony Service Remote Code Execution Vulnerability |
Windows Telephony Service Remote Code Execution Vulnerability |
Windows NT OS Kernel Elevation of Privilege Vulnerability |
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Sony XAV-AX8500 Bluetooth Packet Handling Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sony XAV-AX8500 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of Bluetooth packets. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the elysian-bt-service process. Was ZDI-CAN-26283. |