Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Comprehensive Categorization: Incorrect Calculation
Category ID:1408
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
3987Vulnerabilities found

CVE-2026-22801
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 3.10%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 22:57
Updated-21 Jan, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.

Action-Not Available
Vendor-libpngpnggroup
Product-libpnglibpng
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21689
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 29.57%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 21:46
Updated-12 Jan, 2026 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Type Confusion in CIccProfileXml::ParseBasic() at IccXML/IccLibXML/IccProfileXml.cpp

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccProfileXml::ParseBasic()` at `IccXML/IccLibXML/IccProfileXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-232
Improper Handling of Undefined Values
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-690
Unchecked Return Value to NULL Pointer Dereference
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-21688
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.11% / 30.08%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 21:43
Updated-12 Jan, 2026 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Type Confusion in SIccCalcOp::ArgsPushed() at IccProfLib/IccMpeCalc.cpp

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `SIccCalcOp::ArgsPushed()` at `IccProfLib/IccMpeCalc.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2026-22185
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-4.6||MEDIUM
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 20:26
Updated-14 Jan, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenLDAP <= 2.6.10 LMDB mdb_load Heap Buffer Underflow in readline()

OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.

Action-Not Available
Vendor-OpenLDAP Foundation
Product-OpenLDAP
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2026-21504
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 17:10
Updated-09 Jan, 2026 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap Buffer Overflow in iccDEV ToneMap Parser

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to heap buffer overflow in the ToneMap parser. This issue has been patched in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-193
Off-by-one Error
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-21495
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.70%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 17:08
Updated-09 Jan, 2026 | 21:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Division by Zero in iccDEV TIFF Image Reader

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to division by zero in the TIFF Image Reader. This issue has been patched in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-369
Divide By Zero
CVE-2026-21491
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.76%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 19:07
Updated-12 Jan, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has unicode buffer overflow in CIccTagTextDescription

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. A vulnerability present in versions prior to 2.3.1.2 affects users of the iccDEV library who process ICC color profiles. It results in unicode buffer overflow in `CIccTagTextDescription`. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-193
Off-by-one Error
CVE-2026-21490
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.76%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 19:04
Updated-12 Jan, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has heap buffer overflow in CIccTagLut16::Validate()

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. A vulnerability present in versions prior to 2.3.1.2 affects users of the iccDEV library who process ICC color profiles. It results in heap buffer overflow in `CIccTagLut16::Validate()`. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-193
Off-by-one Error
CVE-2026-21494
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.99%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 19:00
Updated-12 Jan, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has heap buffer overflow in CIccTagLut8::Validate()

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. A vulnerability present in versions prior to 2.3.1.2 affects users of the iccDEV library who process ICC color profiles. It results in heap buffer overflow in `CIccTagLut8::Validate()`. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-193
Off-by-one Error
CVE-2026-21489
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.56%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 13:57
Updated-14 Jan, 2026 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Out-of-bounds Read and Integer Underflow (Wrap or Wraparound)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1.1 and below have Out-of-bounds Read and Integer Underflow (Wrap or Wraparound) vulnerabilities in its CIccCalculatorFunc::SequenceNeedTempReset function. This issue is fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2026-21486
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.52%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 03:36
Updated-12 Jan, 2026 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free and Heap-based Buffer Overflow and Integer Overflow or Wraparound and Out-of-bounds Write in iccDEV

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1.1 and below contain Use After Free, Heap-based Buffer Overflow and Integer Overflow or Wraparound and Out-of-bounds Write vulnerabilities in its CIccSparseMatrix::CIccSparseMatrix function. This issue is fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-21485
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.11% / 30.08%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 03:17
Updated-14 Jan, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV Undefined Behavior (UB) and Out of Memory in CIccProfile::LoadTag()

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1.1 and below are prone to have Undefined Behavior (UB) and Out of Memory errors. This issue is fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20807
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.39%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:47
Updated-08 Jan, 2026 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dpe, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10114841; Issue ID: MSV-4451.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6899androidmt8793mt6991MT6899, MT6991, MT8793
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-20803
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.39%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:47
Updated-08 Jan, 2026 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dpe, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10199779; Issue ID: MSV-4504.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6899androidmt8793mt6991MT6899, MT6991, MT8793
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21673
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.67%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:32
Updated-12 Jan, 2026 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Integer Overflow/Underflow in CIccXmlArrayType::ParseTextCountNum()

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and below have overflows and underflows in CIccXmlArrayType::ParseTextCountNum(). This vulnerability affects users of the iccDEV library who process ICC color profiles. This issue is fixed in version 2.3.1.1.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2025-10933
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.27%
||
7 Day CHG~0.00%
Published-05 Jan, 2026 | 17:07
Updated-08 Jan, 2026 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Z-Wave Protocol Controller Integer underflow vulnerability leads to out of bounds read

An integer underflow vulnerability in the Silicon Labs Z-Wave Protocol Controller can lead to out of bounds memory reads.

Action-Not Available
Vendor-silabs.com
Product-Z-Wave Protocol Controller
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2025-67269
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.08%
||
7 Day CHG+0.04%
Published-02 Jan, 2026 | 00:00
Updated-09 Jan, 2026 | 22:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

Action-Not Available
Vendor-gpsd_projectn/a
Product-gpsdn/a
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2025-15278
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.97%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 06:59
Updated-07 Jan, 2026 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability

FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of pixels within XBM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27865.

Action-Not Available
Vendor-fontforgeFontForge
Product-fontforgeFontForge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-69261
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.76%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 19:43
Updated-02 Jan, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WasmEdge integer wrap in MemoryInstance::getSpan()'s memory size check

WasmEdge is a WebAssembly runtime. Prior to version 0.16.0-alpha.3, a multiplication in `WasmEdge/include/runtime/instance/memory.h` can wrap, causing `checkAccessBound()` to incorrectly allow the access. This leads to a segmentation fault. Version 0.16.0-alpha.3 contains a patch for the issue.

Action-Not Available
Vendor-WasmEdge
Product-WasmEdge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-69204
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 30.80%
||
7 Day CHG+0.03%
Published-30 Dec, 2025 | 16:56
Updated-06 Jan, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick converting a malicious MVG file to SVG caused an integer overflow.

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, in the WriteSVGImage function, using an int variable to store number_attributes caused an integer overflow. This, in turn, triggered a buffer overflow and caused a DoS attack. Version 7.1.2-12 fixes the issue.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-65409
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.58%
||
7 Day CHG+0.02%
Published-30 Dec, 2025 | 00:00
Updated-09 Jan, 2026 | 19:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password.

Action-Not Available
Vendor-n/aGNU
Product-recutilsn/a
CWE ID-CWE-369
Divide By Zero
CVE-2025-68431
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.14%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 19:09
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libheif has Potential Heap Buffer Over-Read

libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.

Action-Not Available
Vendor-strukturag
Product-libheif
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14178
Assigner-PHP Group
ShareView Details
Assigner-PHP Group
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.11%
||
7 Day CHG~0.00%
Published-27 Dec, 2025 | 19:27
Updated-24 Jan, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in array_merge()

In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.

Action-Not Available
Vendor-The PHP Group
Product-phpPHP
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-14422
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.81%
||
7 Day CHG-0.02%
Published-23 Dec, 2025 | 21:31
Updated-20 Jan, 2026 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.

Action-Not Available
Vendor-GIMP
Product-gimpGIMP
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14933
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.97%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 21:09
Updated-13 Jan, 2026 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability

NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of NC variables. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27266.

Action-Not Available
Vendor-unidataNSF Unidata
Product-netcdfNetCDF-C
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-67111
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.62%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 00:00
Updated-06 Jan, 2026 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in the RTPS protocol implementation of OpenDDS DDS before v3.33.0 allows attackers to cause a Denial of Service (DoS) via a crafted message.

Action-Not Available
Vendor-objectcomputingn/a
Product-openddsn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-65865
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 22.63%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 00:00
Updated-06 Jan, 2026 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in eProsima Fast-DDS v3.3 allows attackers to cause a Denial of Service (DoS) via a crafted input.

Action-Not Available
Vendor-eprosiman/a
Product-fast_ddsn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14299
Assigner-TP-Link Systems Inc.
ShareView Details
Assigner-TP-Link Systems Inc.
CVSS Score-7.1||HIGH
EPSS-0.06% / 18.66%
||
7 Day CHG~0.00%
Published-20 Dec, 2025 | 00:42
Updated-08 Jan, 2026 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Content-Length Validation in HTTPS Requests on Tapo C200

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-tapo_c200_firmwaretapo_c200Tapo C200 V3
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-66499
Assigner-14984358-7092-470d-8f34-ade47a7658a2
ShareView Details
Assigner-14984358-7092-470d-8f34-ade47a7658a2
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.54%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 07:11
Updated-23 Dec, 2025 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Foxit PDF Reader PDF Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability

A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.

Action-Not Available
Vendor-Foxit Software Inc.Foxit Software IncorporatedApple Inc.Microsoft Corporation
Product-windowspdf_editorpdf_readermacosFoxit PDF ReaderFoxit PDF Editor
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47323
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.53%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-28 Jan, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Audio

Memory corruption while routing GPR packets between user and root when handling large data packet.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6696_firmwaresm6650pqca8081_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn3910snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcd9390snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresnapdragon_888_5g_mobile_platformwcn7860_firmwarefastconnect_6900_firmwareqca6174a_firmwareqmp1000ssg2115pwcn3950snapdragon_480_5g_mobile_platform_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqcn6224_firmwarewcn3980_firmwaresnapdragon_7c\+_gen_3_computeqfw7124wcd9378qca6678aqqcm5430snapdragon_8_gen_1_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm7325psnapdragon_680_4g_mobile_platform_firmwaresa4155p_firmwaresa7775psrv1msa6150psnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8845h_firmwaresnapdragon_7_gen_1_mobile_platform_firmwareqamsrv1mqca6564qca6584au_firmwareqca6595au_firmwareqca6688aq_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"qcm6490wcd9335_firmwarecsra6620_firmwarewcd9380_firmwarerobotics_rb2_platform_firmwaressg2115p_firmwaresg8275_firmwaresnapdragon_778g_5g_mobile_platformwcn6740snapdragon_680_4g_mobile_platformwcn6740_firmwaresa8650pqcm6490_firmwareqca6696snapdragon_480_5g_mobile_platformwsa8832_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarerobotics_rb2_platformqcs4490_firmwareqca6564ausnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sm8750p_firmwaresnapdragon_x35_5g_modem-rf_systemfastconnect_6200_firmwaresnapdragon_8_gen_2_mobile_platformsxr1230psm7435qca8337snapdragon_x72_5g_modem-rf_systemsm7675qcn6024_firmwaresa8540p_firmwarear8035_firmwaresm8475p_firmwarewcd9340_firmwareqcn9011_firmwarewcn7861sg8275p_firmwaresa8770psm7675psm8750pqmp1000_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)fastconnect_7800_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqcm2290_firmwareqcs2290qcn9012qca6174asnapdragon_x75_5g_modem-rf_system_firmwarevideo_collaboration_vc3_platformsnapdragon_6_gen_1_mobile_platformsm7635ssg2125p_firmwarewcd9395_firmwaresnapdragon_8\+_gen_1_mobile_platformsm8550pqamsrv1hqam8620psnapdragon_8_gen_1snapdragon_460_mobile_platformsg8275pwcd9370sdx61_firmwareqamsrv1m_firmwarewcn3988wsa8815_firmwaresm7550pqam8295p_firmwaresa4150p_firmwareqfw7124_firmwareqcs2290_firmwareqam8650pwcd9371_firmwaresm8475psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wsa8845hqam8620p_firmwarewcn6650_firmwaresa6145p_firmwaressg2125psm7550snapdragon_7\+_gen_2_mobile_platformqca6595sm7635p_firmwareqcm4490wcd9385_firmwareqcn6224qep8111wcn6755_firmwarewcn6755sa9000psnapdragon_x35_5g_modem-rf_system_firmwareqcm8550wsa8815fastconnect_6700qca8081qca6797aqqcm2290fastconnect_6700_firmwaresa8195p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresrv1h_firmwareqca6564_firmwarewcn7861_firmwaresm7550_firmwareqcn6274sdx61sw5100snapdragon_8_gen_1_mobile_platformqcc710snapdragon_8\+_gen_2_mobile_platform_firmwaresa8195psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresa6150p_firmwareqcs8550sa8775p_firmwaresxr2250pvideo_collaboration_vc3_platform_firmwaresa4150psa6155_firmwarear8035sm8635snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresm7635pwcn3950_firmwareqca6574wsa8840snapdragon_4_gen_1_mobile_platformsnapdragon_7\+_gen_2_mobile_platform_firmwaresm8750_firmwaresa8620p_firmwaresm7435_firmwareqca8337_firmwarewcn3988_firmwaresm4635_firmwaresm8650qsnapdragon_ar2_gen_1_platformsa8145pqam8650p_firmwareqca6797aq_firmwaresa8775pwsa8832wcd9340srv1lsa6155psa8150p_firmwaresc8380xpsm4635qcc710_firmwarewcd9385qcn9011sxr1230p_firmwarewsa8835_firmwarewsa8845sm8550p_firmwarewcn7750_firmwarewcd9378_firmwaresa8620psa9000p_firmwaresc8380xp_firmwaresnapdragon_x65_5g_modem-rf_systemcsra6620sa8295p_firmwaresg4150p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_x70_modem-rf_system_firmwareqfw7114sm8735_firmwaresw5100p_firmwaresm6650snapdragon_662_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platformqca6574_firmwareqcm4490_firmwaresnapdragon_7_gen_1_mobile_platformsm8635p_firmwaresa8650p_firmwaresa6155sa4155psnapdragon_695_5g_mobile_platform_firmwareqcn9024snapdragon_x70_modem-rf_systemsnapdragon_ar1_gen_1_platform_firmwaresm7675p_firmwareqcm5430_firmwaresm7675_firmwaresdx71msnapdragon_ar2_gen_1_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_7c\+_gen_3_compute_firmwarewcd9395csra6640sa7775p_firmwaresnapdragon_x75_5g_modem-rf_systemqcs6490snapdragon_8\+_gen_2_mobile_platformwcd9375_firmwareqam8295psm6475srv1m_firmwarewcd9390_firmwarefastconnect_7800sa8770p_firmwarewsa8810_firmwareqam8255p_firmwaresxr2250p_firmwarewcd9370_firmwarecsra6640_firmwareqca6574a_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresm6650_firmwaresxr2230pqam8775pwcd9335wcn7860qam8775p_firmwaresa8150pqfw7114_firmwareqcn6024wcd9380qca6698aqqca6391_firmwaresnapdragon_460_mobile_platform_firmwareqca6564au_firmwaresnapdragon_8_gen_3_mobile_platformfastconnect_6200sa8295psa6155p_firmwaresm7550p_firmwarewcn7880sa8255p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcs6490_firmwareqcn9012_firmwareqca6698aq_firmwarewsa8830_firmwaresa8145p_firmwarewsa8830sm7635_firmwarewcn7750snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)qcs8550_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)snapdragon_ar1_gen_1_platformsa8155p_firmwareqamsrv1h_firmwaresa8255pwcn7881qca6574au_firmwareqep8111_firmwaresw5100_firmwaresa8540pwcn6650wcn7881_firmwareqca6595_firmwareqca6574auqcs4490qca6595ausrv1hsm8635_firmwaresg8275snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresdx71m_firmwaresm8635psnapdragon_6_gen_1_mobile_platform_firmwareqcm8550_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)sm6650p_firmwareqca6574asxr2230p_firmwaresnapdragon_x32_5g_modem-rf_systemsg4150pqcn6274_firmwarewsa8835qcn9024_firmwarewcn3980qca6678aq_firmwarewcd9375sa7255p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3910_firmwaresm6475_firmwaresa7255pwsa8840_firmwareqam8255psnapdragon_662_mobile_platformsa6145psa8155wsa8845_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs5430fastconnect_6900sa8155psm8750srv1l_firmwarewcn7880_firmwareqcs5430_firmwaresm7325p_firmwareqca6688aqqca6584ausm8735qca6391wsa8810wcd9371sa8155_firmwaresm8650q_firmwaresw5100pSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-63757
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 00:00
Updated-30 Dec, 2025 | 20:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.

Action-Not Available
Vendor-n/aFFmpeg
Product-ffmpegn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-12035
Assigner-Zephyr Project
ShareView Details
Assigner-Zephyr Project
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 10.79%
||
7 Day CHG~0.00%
Published-15 Dec, 2025 | 19:42
Updated-16 Dec, 2025 | 14:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Integer Overflow in Bluetooth Classic (BR/EDR) L2CAP

An integer overflow condition exists in Bluetooth Host stack, within the bt_br_acl_recv routine a critical path for processing inbound BR/EDR L2CAP traffic.

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-46285
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.30%
||
7 Day CHG~0.00%
Published-12 Dec, 2025 | 20:56
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow was addressed by adopting 64-bit timestamps. This issue is fixed in watchOS 26.2, macOS Sonoma 14.8.3, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, macOS Sequoia 15.7.3, visionOS 26.2, tvOS 26.2. An app may be able to gain root privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosvisionOSwatchOSiOS and iPadOSmacOStvOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-29144
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 3.07%
||
7 Day CHG~0.00%
Published-12 Dec, 2025 | 00:00
Updated-19 Dec, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.

Action-Not Available
Vendor-malwarebytesn/a
Product-malwarebytesn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64721
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.10% / 28.09%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 21:15
Updated-22 Dec, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandboxie's Integer Overflow in SbieIniServer::RC4Crypt allows sandbox escape and SYSTEM compromise

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.

Action-Not Available
Vendor-sandboxie-plussandboxie-plus
Product-sandboxieSandboxie
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-36936
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.37%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-05 Jan, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14512
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.15%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 07:11
Updated-06 Feb, 2026 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

Action-Not Available
Vendor-Red Hat, Inc.The GNOME Project
Product-glibopenshiftenterprise_linuxRed Hat Enterprise Linux 9Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6glibRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat OpenShift Container Platform 4
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14087
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.30% / 53.26%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 09:01
Updated-06 Feb, 2026 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: glib: buffer underflow in gvariant parser leads to heap corruption

A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.

Action-Not Available
Vendor-Red Hat, Inc.The GNOME Project
Product-glibenterprise_linuxRed Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 9glibRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-65803
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.82%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 00:00
Updated-17 Dec, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in the psdParser::ReadImageData function of FreeImage v3.18.0 and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted PSD file.

Action-Not Available
Vendor-freeimage_projectn/a
Product-freeimagen/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-62567
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 26.48%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:56
Updated-13 Feb, 2026 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Hyper-V Denial of Service Vulnerability

Integer underflow (wrap or wraparound) in Windows Hyper-V allows an authorized attacker to deny service over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows Server 2012 R2Windows 10 Version 21H2Windows 11 Version 25H2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2025-62467
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.54%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:55
Updated-13 Feb, 2026 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Integer overflow or wraparound in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2025Windows Server 2022Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 25H2Windows Server 2019
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64894
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 6.04%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this issue to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64783
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.43%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14308
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-10||CRITICAL
EPSS-0.09% / 25.60%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 07:44
Updated-05 Jan, 2026 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Robocode's Buffer Write Method

An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.

Action-Not Available
Vendor-robocodeRobocode Project
Product-robocodeRobocode
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-48637
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.03%
||
7 Day CHG~0.00%
Published-08 Dec, 2025 | 16:57
Updated-17 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-55753
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.87%
||
7 Day CHG~0.00%
Published-05 Dec, 2025 | 10:12
Updated-10 Dec, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache HTTP Server: mod_md (ACME), unintended retry intervals

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-http_serverApache HTTP Server
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-34297
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.6||HIGH
EPSS-0.02% / 4.52%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:18
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

Action-Not Available
Vendor-mborgerding/kissfft
Product-mborgerding/kissfft
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-3500
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-9||CRITICAL
EPSS-0.03% / 9.46%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 16:09
Updated-06 Feb, 2026 | 15:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Avast Antiviurs 25.1.981.6 on Windows may result in privilege escalation

Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.

Action-Not Available
Vendor-avastAvastMicrosoft Corporation
Product-antiviruswindowsAntivirus
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-66217
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.55% / 67.36%
||
7 Day CHG~0.00%
Published-29 Nov, 2025 | 01:57
Updated-23 Dec, 2025 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AIS-catcher Integer Underflow in MQTT Packet Parsing leading to Heap Buffer Overflow

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.

Action-Not Available
Vendor-aiscatcherjvde-github
Product-ais-catcherAIS-catcher
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2025-66030
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 12.38%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 22:23
Updated-06 Dec, 2025 | 00:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
node-forge ASN.1 OID Integer Truncation

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Action-Not Available
Vendor-digitalbazaardigitalbazaar
Product-forgeforge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-13601
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.7||HIGH
EPSS-0.03% / 8.18%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 14:44
Updated-13 Feb, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: integer overflow in in g_escape_uri_string()

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

Action-Not Available
Vendor-Red Hat, Inc.The GNOME Project
Product-discoveryenterprise_linux_for_power_little_endian_eusenterprise_linux_for_ibm_z_systems_eusenterprise_linux_server_for_power_little_endianenterprise_linux_server_ausenterprise_linux_for_x86_64codeready_linux_builder_for_x86_64_eusenterprise_linux_server_tusenterprise_linux_for_arm_64codeready_linux_builder_for_arm64_eusenterprise_linux_for_power_little_endianenterprise_linux_for_ibm_z_systemscodeready_linux_builder_for_ibm_z_systemsceph_storagecodeready_linux_builder_for_power_little_endian_euscodeready_linux_builder_for_x86_64enterprise_linux_for_arm_64_eusenterprise_linux_for_x86_64_euscodeready_linux_builderglibcodeready_linux_builder_for_power_little_endiancodeready_linux_builder_for_ibm_z_systems_euscodeready_linux_builder_for_arm64enterprise_linux_server_for_power_little_endian_eusRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Update Infrastructure 5Red Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4.18Red Hat Discovery 2Red Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRed Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat OpenShift Container Platform 4.12Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRed Hat Enterprise Linux 10.0 Extended Update SupportRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.6 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Insights proxy 1.5Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 6Red Hat Ceph Storage 8Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 9.4 Extended Update Support
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 79
  • 80
  • Next