Vulnerabilities (CVE)

Filtered by CWE-190
Total 2652 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-36618 1 Ffmpeg 1 Ffmpeg 2025-06-03 N/A 6.2 MEDIUM
FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.
CVE-2024-36616 1 Ffmpeg 1 Ffmpeg 2025-06-03 N/A 6.5 MEDIUM
An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file.
CVE-2024-35366 1 Ffmpeg 1 Ffmpeg 2025-06-03 N/A 9.1 CRITICAL
FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking.
CVE-2024-36613 1 Ffmpeg 1 Ffmpeg 2025-06-03 N/A 6.2 MEDIUM
FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library allowing for an integer overflow, potentially resulting in a denial-of-service (DoS) condition or other undefined behavior.
CVE-2023-47994 1 Freeimage Project 1 Freeimage 2025-06-03 N/A 8.8 HIGH
An integer overflow vulnerability in LoadPixelDataRLE4 function in PluginBMP.cpp in Freeimage 3.18.0 allows attackers to obtain sensitive information, cause a denial of service and/or run arbitrary code.
CVE-2023-28185 1 Apple 5 Ipados, Iphone Os, Macos and 2 more 2025-06-03 N/A 5.5 MEDIUM
An integer overflow was addressed through improved input validation. This issue is fixed in tvOS 16.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4, watchOS 9.4, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4. An app may be able to cause a denial-of-service.
CVE-2023-49262 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-03 N/A 9.8 CRITICAL
The authentication mechanism can be bypassed by overflowing the value of the Cookie "authentication" field, provided there is an active user session.
CVE-2024-52035 2025-06-02 N/A 8.4 HIGH
An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2025-1235 2025-06-02 N/A 4.3 MEDIUM
A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.
CVE-2020-12762 5 Canonical, Debian, Fedoraproject and 2 more 5 Ubuntu Linux, Debian Linux, Fedora and 2 more 2025-05-30 6.8 MEDIUM 7.8 HIGH
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
CVE-2022-26775 1 Apple 2 Mac Os X, Macos 2025-05-30 7.5 HIGH 9.8 CRITICAL
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4. An attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2025-24985 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-05-29 N/A 7.8 HIGH
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CVE-2024-22861 1 Ffmpeg 1 Ffmpeg 2025-05-29 N/A 7.5 HIGH
Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module.
CVE-2023-52389 1 Pocoproject 1 Poco 2025-05-29 N/A 9.8 CRITICAL
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
CVE-2024-23775 1 Arm 1 Mbed Tls 2025-05-29 N/A 7.5 HIGH
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
CVE-2025-31221 1 Apple 6 Ipados, Iphone Os, Macos and 3 more 2025-05-27 N/A 7.5 HIGH
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. A remote attacker may be able to leak memory.
CVE-2022-36934 1 Whatsapp 1 Whatsapp 2025-05-27 N/A 9.8 CRITICAL
An integer overflow in WhatsApp could result in remote code execution in an established video call.
CVE-2015-7848 2 Netapp, Ntp 6 Clustered Data Ontap, Data Ontap Operating In 7-mode, Oncommand Balance and 3 more 2025-05-23 5.0 MEDIUM 7.5 HIGH
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
CVE-2021-3782 1 Wayland 1 Wayland 2025-05-22 N/A 6.6 MEDIUM
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
CVE-2025-30325 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2025-05-22 N/A 7.8 HIGH
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.