Total
3348 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-1921 | 3 Debian, Gstreamer Project, Redhat | 3 Debian Linux, Gstreamer, Enterprise Linux | 2024-11-21 | 7.8 High |
| Integer overflow in avidemux element in gst_avi_demux_invert function which allows a heap overwrite while parsing avi files. Potential for arbitrary code execution through heap overwrite. | ||||
| CVE-2022-1920 | 3 Debian, Gstreamer Project, Redhat | 3 Debian Linux, Gstreamer, Enterprise Linux | 2024-11-21 | 7.8 High |
| Integer overflow in matroskademux element in gst_matroska_demux_add_wvpk_header function which allows a heap overwrite while parsing matroska files. Potential for arbitrary code execution through heap overwrite. | ||||
| CVE-2022-1754 | 1 Trudesk Project | 1 Trudesk | 2024-11-21 | 6.5 Medium |
| Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.2. | ||||
| CVE-2022-1728 | 1 Trudesk Project | 1 Trudesk | 2024-11-21 | 6.5 Medium |
| Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications. | ||||
| CVE-2022-1718 | 1 Trudesk Project | 1 Trudesk | 2024-11-21 | 7.5 High |
| The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. This can lead to Denial of service. | ||||
| CVE-2022-1699 | 1 Organizr | 1 Organizr | 2024-11-21 | 7.5 High |
| Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications. | ||||
| CVE-2022-1475 | 1 Ffmpeg | 1 Ffmpeg | 2024-11-21 | 5.5 Medium |
| An integer overflow vulnerability was found in FFmpeg versions before 4.4.2 and before 5.0.1 in g729_parse() in llibavcodec/g729_parser.c when processing a specially crafted file. | ||||
| CVE-2022-1036 | 1 Microweber | 1 Microweber | 2024-11-21 | 7.5 High |
| Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12. | ||||
| CVE-2022-0998 | 2 Linux, Netapp | 17 Linux Kernel, H300e, H300e Firmware and 14 more | 2024-11-21 | 7.8 High |
| An integer overflow flaw was found in the Linux kernel’s virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system. | ||||
| CVE-2022-0968 | 1 Microweber | 1 Microweber | 2024-11-21 | 5.5 Medium |
| The microweber application allows large characters to insert in the input field "fist & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12. | ||||
| CVE-2022-0961 | 1 Microweber | 1 Microweber | 2024-11-21 | 5.5 Medium |
| The microweber application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12. | ||||
| CVE-2022-0913 | 1 Microweber | 1 Microweber | 2024-11-21 | 7.5 High |
| Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3. | ||||
| CVE-2022-0608 | 1 Google | 1 Chrome | 2024-11-21 | 8.8 High |
| Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | ||||
| CVE-2022-0546 | 3 Blender, Debian, Fedoraproject | 4 Blender, Debian Linux, Extra Packages For Enterprise Linux and 1 more | 2024-11-21 | 7.8 High |
| A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution. | ||||
| CVE-2022-0545 | 2 Blender, Debian | 2 Blender, Debian Linux | 2024-11-21 | 7.8 High |
| An integer overflow in the processing of loaded 2D images leads to a write-what-where vulnerability and an out-of-bounds read vulnerability, allowing an attacker to leak sensitive information or achieve code execution in the context of the Blender process when a specially crafted image file is loaded. This flaw affects Blender versions prior to 2.83.19, 2.93.8 and 3.1. | ||||
| CVE-2021-4327 | 1 Serenityos | 1 Serenityos | 2024-11-21 | 5.5 Medium |
| A vulnerability was found in SerenityOS. It has been rated as critical. Affected by this issue is the function initialize_typed_array_from_array_buffer in the library Userland/Libraries/LibJS/Runtime/TypedArray.cpp. The manipulation leads to integer overflow. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as f6c6047e49f1517778f5565681fb64750b14bf60. It is recommended to apply a patch to fix this issue. VDB-222074 is the identifier assigned to this vulnerability. | ||||
| CVE-2021-46829 | 4 Debian, Fedoraproject, Gnome and 1 more | 4 Debian Linux, Fedora, Gdk-pixbuf and 1 more | 2024-11-21 | 7.8 High |
| GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems. | ||||
| CVE-2021-46667 | 3 Fedoraproject, Mariadb, Redhat | 5 Fedora, Mariadb, Enterprise Linux and 2 more | 2024-11-21 | 5.5 Medium |
| MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash. | ||||
| CVE-2021-46389 | 1 High Resolution Streaming Image Server Project | 1 High Resolution Streaming Image Server | 2024-11-21 | 7.5 High |
| IIPImage High Resolution Streaming Image Server prior to commit 882925b295a80ec992063deffc2a3b0d803c3195 is affected by an integer overflow in iipsrv.fcgi through malformed HTTP query parameters. | ||||
| CVE-2021-46102 | 1 Solanalabs | 1 Rbpf | 2024-11-21 | 7.5 High |
| From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via "addr = (sym.st_value + refd_pa) as u64"; | ||||