Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-190:Integer Overflow or Wraparound
Weakness ID:190
Version:v4.17
Weakness Name:Integer Overflow or Wraparound
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Stable
Likelihood of Exploit:Medium
DetailsContent HistoryObserved CVE ExamplesReports
3099Vulnerabilities found

CVE-2026-26134
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.77%
||
7 Day CHG+0.01%
Published-10 Mar, 2026 | 17:05
Updated-14 Apr, 2026 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Office Elevation of Privilege Vulnerability

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-officeMicrosoft Office for Android
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-416
Use After Free
CVE-2026-26111
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8||HIGH
EPSS-0.09% / 25.31%
||
7 Day CHG+0.01%
Published-10 Mar, 2026 | 17:05
Updated-23 Apr, 2026 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_server_2022windows_server_2025windows_server_2019Windows Server 2019Windows 11 version 26H1Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H3Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 22H2Windows 10 Version 21H2Windows Server 2016Windows 11 Version 24H2Windows Server 2012 R2Windows Server 2019 (Server Core installation)Windows Server 2025Windows Server 2022Windows Server 2012 (Server Core installation)Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows 10 Version 1607
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25173
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8||HIGH
EPSS-0.05% / 14.59%
||
7 Day CHG+0.01%
Published-10 Mar, 2026 | 17:04
Updated-14 Apr, 2026 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_23h2windows_server_2022_23h2windows_10_22h2windows_10_1607windows_server_2016windows_server_2025windows_11_26h1windows_server_2012windows_server_2022windows_server_2019windows_10_21h2windows_10_1809windows_11_24h2windows_11_25h2Windows 11 version 26H1Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 24H2Windows 10 Version 21H2Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows Server 2012 R2Windows Server 2022Windows 10 Version 22H2Windows Server 2012Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019Windows 10 Version 1809
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25172
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8||HIGH
EPSS-0.05% / 14.59%
||
7 Day CHG+0.01%
Published-10 Mar, 2026 | 17:04
Updated-14 Apr, 2026 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_server_2016windows_server_2012windows_server_2022windows_server_2025windows_server_2019Windows 11 version 26H1Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 24H2Windows 10 Version 21H2Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows Server 2012 R2Windows Server 2022Windows 10 Version 22H2Windows Server 2012Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019Windows 10 Version 1809
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-30937
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.37%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 21:50
Updated-18 Mar, 2026 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has a heap buffer overflow in WriteXWDImage due to CARD32 arithmetic overflow in bytes_per_line calculation

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-30935
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 4.38%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 21:48
Updated-11 Mar, 2026 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has a heap Buffer Over-Read in BilateralBlurImage

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-28693
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.07% / 20.73%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 21:42
Updated-11 Mar, 2026 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has an integer overflow in DIB coder can result in out of bounds read or write

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-28493
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.58%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 21:29
Updated-12 Mar, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has a Integer Overflow leading to out of bounds write in SIXEL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-3707
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 5.33%
||
7 Day CHG~0.00%
Published-08 Mar, 2026 | 05:02
Updated-22 Apr, 2026 | 21:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MrNanko webp4j gif_decoder.c DecodeGifFromMemory integer overflow

A vulnerability was identified in MrNanko webp4j up to 1.3.x. The affected element is the function DecodeGifFromMemory of the file src/main/c/gif_decoder.c. Such manipulation of the argument canvas_height leads to integer overflow. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 89771b201c66d15d29e4cc016d8aae82b6a5fbe1. It is advisable to implement a patch to correct this issue.

Action-Not Available
Vendor-MrNanko
Product-webp4j
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-30910
Assigner-CPAN Security Group
ShareView Details
Assigner-CPAN Security Group
CVSS Score-7.5||HIGH
EPSS-0.01% / 2.07%
||
7 Day CHG~0.00%
Published-08 Mar, 2026 | 00:54
Updated-10 Mar, 2026 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U

Action-Not Available
Vendor-iambIAMB
Product-crypt\Crypt::Sodium::XS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-30909
Assigner-CPAN Security Group
ShareView Details
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 8.51%
||
7 Day CHG~0.00%
Published-08 Mar, 2026 | 00:46
Updated-18 Mar, 2026 | 13:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crypt::NaCl::Sodium versions through 2.002 for Perl has potential integer overflows

Crypt::NaCl::Sodium versions through 2.002 for Perl has potential integer overflows. bin2hex, encrypt, aes256gcm_encrypt_afternm and seal functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex() the bin_len would have to be > SIZE_MAX / 2 For encrypt() the msg_len would need to be > SIZE_MAX - 16U For aes256gcm_encrypt_afternm() the msg_len would need to be > SIZE_MAX - 16U For seal() the enc_len would need to be > SIZE_MAX - 64U

Action-Not Available
Vendor-timleggeTIMLEGGE
Product-crypt\Crypt::NaCl::Sodium
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-28497
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.24% / 47.76%
||
7 Day CHG+0.01%
Published-06 Mar, 2026 | 02:51
Updated-16 Mar, 2026 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TinyWeb: Integer Overflow in `_Val` (HTTP Request Smuggling)

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03.

Action-Not Available
Vendor-ritlabsmaximmasiutin
Product-tinywebTinyWeb
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2026-3536
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-0.10% / 27.42%
||
7 Day CHG+0.01%
Published-04 Mar, 2026 | 19:24
Updated-11 Mar, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft CorporationApple Inc.Google LLC
Product-macoswindowschromelinux_kernelChrome
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-472
External Control of Assumed-Immutable Web Parameter
CVE-2026-20025
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 14.97%
||
7 Day CHG+0.01%
Published-04 Mar, 2026 | 18:36
Updated-05 Mar, 2026 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To exploit this vulnerability, the attacker must have the OSPF secret key. This vulnerability is due to insufficient input validation when processing OSPF link-state update (LSU) packets. An attacker could exploit this vulnerability by sending crafted OSPF LSU packets. A successful exploit could allow the attacker to corrupt the heap, causing the device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Secure Firewall Adaptive Security Appliance (ASA) SoftwareCisco Secure Firewall Threat Defense (FTD) Software
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-66168
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-5.4||MEDIUM
EPSS-0.08% / 22.60%
||
7 Day CHG+0.02%
Published-04 Mar, 2026 | 08:45
Updated-10 Apr, 2026 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated

WARNING: Users of 6.x should upgrade to 6.2.4 or later as the fix was missed in previous 6.x releases. See the  following for more details: https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt https://www.cve.org/CVERecord?id=CVE-2026-40046 Original Report: Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makes the broker susceptible to unexpected behavior when interacting with non-compliant clients. This behavior violates the MQTT v3.1.1 specification, which restricts Remaining Length to a maximum of 4 bytes. The scenario occurs on established connections after the authentication process. Brokers that are not enabling mqtt transport connectors are not impacted. This issue affects Apache ActiveMQ: before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0 Users are recommended to upgrade to version 5.19.2, 6.1.9, or 6.2.1, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-activemqApache ActiveMQApache ActiveMQ All ModuleApache ActiveMQ MQTT Module
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0031
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.65%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 18:42
Updated-06 Mar, 2026 | 04:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0028
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.65%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 18:42
Updated-06 Mar, 2026 | 04:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21385
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.23% / 45.39%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 16:53
Updated-04 Mar, 2026 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-03-24||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Integer Overflow or Wraparound in Graphics

Memory corruption while using alignments for memory allocation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs4490snapdragon_ar1_gen_1_platform_firmwarewcn7861_firmwarepandeirowcn6650snapdragon_x5_lte_modem_firmwareqpa1083bdar8031fastconnect_6200_firmwaresnapdragon_660_mobile_platform_firmwarerobotics_rb5_platform_firmwarecsra6640_firmwaresa8195pqamsrv1hsm7550p_firmwaresnapdragon_ar1\+_gen_1_platform_firmwareqcm4490_firmwaresnapdragon_x5_lte_modempandeiro_firmwareqxm1086snapdragon_x55_5g_modem-rf_systemg2_gen_15g_fixed_wireless_access_platform_firmwareqcm6125_firmwaresar1250pqcs4290snapdragon_782g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarerobotics_rb2_platformsxr2330psm8635psar2130p_firmwaresa8155qca8337c-v2x_9150_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_460_mobile_platform_firmwareqcm2290palawan25_firmwareiq-8275_firmwaresa8770p_firmwarefastconnect_6800snapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platformqca8337_firmwaresxr2350p_firmwaresnapdragon_6_gen_3_mobile_platform_firmwaresnapdragon_820amsa6155p_firmwaresa8145psm6225p_firmwareqrb5165nsm7675sa6150p_firmwaresa7255pflight_rb5_5g_platformwcn3620_firmwarewcn3910smart_display_200_platform_firmwaresa7255p_firmwaresar1165pwcn3680bsd865_5g_firmwarewcd9335sc8380xpqualcomm_215_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platformwcd9330sdm429wwcn3680b_firmwaresnapdragon_888\+_5g_mobile_platformsw5100snapdragon_870_5g_mobile_platformflight_rb5_5g_platform_firmwaresxr2350pwcn3620sa6155psnapdragon_685_4g_mobile_platformsnapdragon_4_gen_1_mobile_platformsnapdragon_888_5g_mobile_platformwcd9378sdx61_firmwaresa8295pqca6584ausa8295p_firmwareqcm6125qca6391snapdragon_480\+_5g_mobile_platform_firmwareqam8295pwcn3988iq-8300snapdragon_x65_5g_modem-rf_systemsda660wcd9378_firmwarewcd9371qln1086bdfastconnect_6900_firmwareqca6174aqca6595qxm1093_firmwarewcn6450_firmwaresnapdragon_xr2\+_gen_1_platformsnapdragon_685_4g_mobile_platform_firmwarevideo_collaboration_vc3_platformqca6678aqwcd9370_firmwareqcs8550_firmwaresnapdragon_820am_firmwaresnapdragon_662_mobile_platform_firmwareqrb5165mwcn6755apq8098_firmwaresa8145p_firmwarewcd9326qcm5430sxr2250p_firmwareqcn9024_firmwaremonaco_iotsm8750p_firmwaresnapdragon_865_5g_mobile_platformwcn7860_firmwaresnapdragon_429_mobile_platform_firmwareqca6574asnapdragon_480_5g_mobile_platform_firmwaresa8155_firmwarecsra6620_firmwaresa8155pqpa1086bdiq-615qcn9011sdx61netrani_firmwarefastconnect_6200lemans_au_lgit_firmwarewsa8835_firmwaresnapdragon_6_gen_3_mobile_platformcsra6620sa4155pqca9377_firmwarewcn3990_firmwarewcd9360sar2130pwcd9326_firmwareqca6797aq_firmwarevision_intelligence_100_platform_firmwareqxm1086_firmwarewcn3990iq-8300_firmwareqln1086bd_firmwarenetranisnapdragon_6_gen_4_mobile_platform_firmwarewcd9341qcn9012snapdragon_625_mobile_platform_firmwaresa6155sw5100_firmwaresa4155p_firmwaresa8770par8035sm8635qrb5165n_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcn6650_firmwaresc8380xp_firmwaresnapdragon_x53_5g_modem-rf_system_firmwaresrv1mwcn7860qcs4290_firmwareqxm1096_firmwareqca2066qca2066_firmwarewcd9380_firmwaremilos_firmwaresm7635p_firmwarewcd9371_firmwarewsa8815snapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_460_mobile_platformwcd9330_firmwarewsa8845sd626wsa8845_firmwareiq-9100qam8255p_firmwaresnapdragon_695_5g_mobile_platformwsa8835sa8255psnapdragon_x55_5g_modem-rf_system_firmwareqca9367_firmwaresmart_display_200_platformwsa8840_firmwaresnapdragon_8_gen_1wcn6755_firmwarewsa8830snapdragon_8_gen_3_mobile_platform_firmwareqpa1083bd_firmwarear8035_firmwaresnapdragon_7s_gen_3_mobile_platform_firmwarewcn3950_firmwaresm8635p_firmwaresd626_firmwarewcd9360_firmwareqxm1094qca8695auwcd9335_firmwaresa6150psnapdragon_820_automotive_platformsd662g1_gen_1wsa8840qxm1083snapdragon_auto_5g_modem-rfsa8195p_firmwaresa6155_firmwaresm7550_firmwarewcd9385snapdragon_x12_lte_modemsnapdragon_w5\+_gen_1_wearable_platform_firmwaresnapdragon_8_elite_firmwaresnapdragon_8\+_gen_2_mobile_platformsm8475pwcn7881sm7435_firmwaremdm9628vision_intelligence_200_platformsar1165p_firmwaresw6100video_collaboration_vc5_platformsnapdragon_8_gen_2_mobile_platform_firmwareqcm4325_firmwarewcd9390sdm429w_firmwarewcd9395_firmwarerobotics_rb2_platform_firmwareqamsrv1h_firmwaresa4150pwsa8810wcn3660b_firmwareqca8081_firmwarewcn7880fastconnect_6700_firmwaresmart_audio_400_platformpalawan25qamsrv1m_firmwaresnapdragon_8_elitemdm9250_firmwareqca6564au_firmwarewcn3980_firmwaresnapdragon_626_mobile_platform_firmwaresxr2230pqcs4490_firmwaresnapdragon_7_gen_1_mobile_platform_firmwaresnapdragon_429_mobile_platformsm7635pqcm4325sm8550p_firmwaresa9000p_firmwaresm8650qqca6678aq_firmwareqxm1096video_collaboration_vc3_platform_firmwarefastconnect_6900mdm9628_firmwaresnapdragon_7\+_gen_2_mobile_platformsw5100pwcd9390_firmwaremdm9250snapdragon_6_gen_4_mobile_platformsmart_audio_400_platform_firmwarelemansau_firmwaresnapdragon_6_gen_1_mobile_platformvision_intelligence_400_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwareiq-9100_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_6_gen_1_mobile_platform_firmwareqcn6024_firmwaresa8620psd662_firmwaresm7675pqpa1086bd_firmwaresd865_5gqmp1000snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_865\+_5g_mobile_platformqcm5430_firmwaresnapdragon_782g_mobile_platformsm6650pqmp1000_firmwaresnapdragon_xr2_5g_platform_firmwaresar2230p_firmwaresa8150pwcn7861snapdragon_888_5g_mobile_platform_firmwarevideo_collaboration_vc1_platformqam8255pqcn9024wcn3615_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_xr2\+_gen_1_platform_firmwaresm6225psm7550snapdragon_690_5g_mobile_platform_firmwareg2_gen_1_firmwareqcm4490sw6100_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresrv1m_firmwareiq-9075qca6688aq_firmwaresa8255p_firmwaresxr2250pwsa8810_firmwaresm8750porne_firmwaresm7325pqcs2290_firmwaresnapdragon_7_gen_1_mobile_platformthemistosrv1h_firmwaresnapdragon_8\+_gen_1_mobile_platformwcn7881_firmwareapq8098snapdragon_4_gen_2_mobile_platformqcs2290snapdragon_x53_5g_modem-rf_systemsnapdragon_ar1_gen_1_platformc-v2x_9150sa4150p_firmwaresnapdragon_xr2_5g_platformqca8695au_firmwaremilossa6145p_firmwarevision_intelligence_400_platformiq-9075_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresa9000pwcn3950qca9377qxm1094_firmwarewsa8830_firmwareqxm1083_firmwareqca6574auqca6584au_firmwaresrv1hqcm6490qca6574qamsrv1mqcn9012_firmwarecsra6640sw6100p_firmwaresa8150p_firmwareqcm2290_firmwaresnapdragon_865\+_5g_mobile_platform_firmwarewcn3910_firmwareqca6564a_firmwareqca6698au_firmware5g_fixed_wireless_access_platformsnapdragon_8_elite_gen_5g1_gen_1_firmwarethemisto_firmwareqrb5165m_firmwarefastconnect_6800_firmwareqca6595auqca8081qln1083bd_firmwarewsa8845h_firmwareqca6698auqca6595_firmwaresnapdragon_870_5g_mobile_platform_firmwareqca6696_firmwareqca6174a_firmwaresa8620p_firmwaresnapdragon_690_5g_mobile_platformsm7550pqca6595au_firmwaresa7775pqca6574a_firmwaresnapdragon_7c\+_gen_3_computewcn7880_firmwaresm8550psnapdragon_ar1\+_gen_1_platformsnapdragon_auto_5g_modem-rf_firmwareqam8295p_firmwareqca9367sa8155p_firmwareqca6574au_firmwareiq-615_firmwarequalcomm_215_mobile_platformsnapdragon_625_mobile_platformwcd9341_firmwareqca6696sxr2330p_firmwaresnapdragon_x12_lte_modem_firmwarefsm100_platform_firmwareqca6574_firmwarevision_intelligence_200_platform_firmwarewcd9395qca6564awcd9370qcs8550sm8650q_firmwarefastconnect_6700snapdragon_820_automotive_platform_firmwaresw6100pqca6688aqqxm1095_firmwarewcd9380iq-8275qca6698aq_firmwarefastconnect_7800_firmwaresnapdragon_7s_gen_3_mobile_platformsm7325p_firmwarewcd9375sm7675p_firmwareorneqcn9011_firmwaresxr2230p_firmwareqca6698aqsnapdragon_w5\+_gen_1_wearable_platformqca6564ausw5100p_firmwaremonaco_iot_firmwarefastconnect_7800qxm1093snapdragon_8_elite_gen_5_firmwareqln1083bdsm8475p_firmwaresnapdragon_680_4g_mobile_platform_firmwarefsm100_platformsnapdragon_660_mobile_platformrobotics_rb5_platformsar2230psnapdragon_8_gen_1_mobile_platform_firmwareqcm6490_firmwarewcd9375_firmwarewcd9385_firmwaresnapdragon_8_gen_1_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_778g\+_5g_mobile_platformsnapdragon_662_mobile_platformwsa8845hvideo_collaboration_vc5_platform_firmwaresar1250p_firmwarewsa8832_firmwaresm7675_firmwaresm6650p_firmwarewcn3988_firmwarevideo_collaboration_vc1_platform_firmwarewcn3615snapdragon_778g_5g_mobile_platform_firmwarewsa8815_firmwarewsa8832wcn3980vision_intelligence_100_platformwcn3660bsnapdragon_626_mobile_platformsnapdragon_8_gen_3_mobile_platformsnapdragon_7\+_gen_2_mobile_platform_firmwaresa6145psnapdragon_695_5g_mobile_platform_firmwaresa7775p_firmwarear8031_firmwaresda660_firmwaresm7435lemansaulemans_au_lgitqca6391_firmwaresm8635_firmwareqxm1095qca6797aqwcn6450qcn6024SnapdragonMultiple Chipsets
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-28231
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 8.29%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 20:13
Updated-04 Mar, 2026 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
pillow_heif Has Integer Overflow in Encode Path Buffer Validation that Leads to Heap Out-of-Bounds Read

pillow_heif is a Python library for working with HEIF images and plugin for Pillow. Prior to version 1.3.0, an integer overflow in the encode path buffer validation of `_pillow_heif.c` allows an attacker to bypass bounds checks by providing large image dimensions, resulting in a heap out-of-bounds read. This can lead to information disclosure (server heap memory leaking into encoded images) or denial of service (process crash). No special configuration is required — this triggers under default settings. Version 1.3.0 fixes the issue.

Action-Not Available
Vendor-bigcat88bigcat88
Product-pillow-heifpillow_heif
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-3284
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 2.40%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 03:02
Updated-02 Mar, 2026 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libvips extract.c vips_extract_area_build integer overflow

A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.

Action-Not Available
Vendor-libvipsn/a
Product-libvipslibvips
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-27809
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 22.75%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 23:57
Updated-02 Mar, 2026 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
psd-tools: Compression module has unguarded zlib decompression, missing dimension validation, and hardening gaps

psd-tools is a Python package for working with Adobe Photoshop PSD files. Prior to version 1.12.2, when a PSD file contains malformed RLE-compressed image data (e.g. a literal run that extends past the expected row size), decode_rle() raises ValueError which propagated all the way to the user, crashing psd.composite() and psd-tools export. decompress() already had a fallback that replaces failed channels with black pixels when result is None, but it never triggered because the ValueError from decode_rle() was not caught. The fix in version 1.12.2 wraps the decode_rle() call in a try/except so the existing fallback handles the error gracefully.

Action-Not Available
Vendor-psd-tools_projectpsd-tools
Product-psd-toolspsd-tools
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
CWE ID-CWE-617
Reachable Assertion
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CVE-2026-27951
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.68%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 21:07
Updated-27 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeRDP has possible Integer overflow in Stream_EnsureCapacity

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the function `Stream_EnsureCapacity` can create an endless blocking loop. This may affect all client and server implementations using `FreeRDP`. For practical exploitation this will only work on 32bit systems where the available physical memory is `>= SIZE_MAX`. Version 3.23.0 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-FreeRDP
Product-freerdpFreeRDP
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-27691
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 3.81%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 14:36
Updated-26 Feb, 2026 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has SIO in parse3DTable() at iccFromCube.cpp Line 218

iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, signed integer overflow in iccFromCube.cpp during multiplication triggers undefined behavior, potentially causing crashes or incorrect ICC profile generation when processing crafted/large cube inputs. Commit 43ae18dd69fc70190d3632a18a3af2f3da1e052a fixes the issue. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2026-2781
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.92%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 13:33
Updated-21 Apr, 2026 | 13:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in the Libraries component in NSS

Integer overflow in the Libraries component in NSS. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, Thunderbird 140.8, and Firefox ESR 115.35.

Action-Not Available
Vendor-Mozilla Corporation
Product-thunderbirdfirefoxFirefoxThunderbird
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-2774
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-0.02% / 7.06%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 13:33
Updated-13 Apr, 2026 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in the Audio/Video component

Integer overflow in the Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdThunderbirdFirefox
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-2762
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.91%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 13:33
Updated-15 Apr, 2026 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in the JavaScript: Standard Library component

Integer overflow in the JavaScript: Standard Library component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdThunderbirdFirefox
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25989
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.02% / 5.79%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:50
Updated-28 Feb, 2026 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CWE ID-CWE-193
Off-by-one Error
CVE-2026-25970
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.57%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:35
Updated-26 Feb, 2026 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick SIXEL Decoder Has Signed Integer Overflow, Leading to Memory Corruption

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25897
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 6.59%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:16
Updated-26 Feb, 2026 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has heap overflow in sun decoder on 32-bit systems that can result in out of bounds write

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, an Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25794
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.2||HIGH
EPSS-0.02% / 5.42%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 00:53
Updated-26 Feb, 2026 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has heap-buffer-overflow via signed integer overflow in `WriteUHDRImage` when writing UHDR images with large dimensions

ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write. Version 7.1.2-15 contains a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-2588
Assigner-CPAN Security Group
ShareView Details
Assigner-CPAN Security Group
CVSS Score-9.1||CRITICAL
EPSS-0.06% / 17.64%
||
7 Day CHG~0.00%
Published-22 Feb, 2026 | 23:31
Updated-04 Mar, 2026 | 02:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.

Action-Not Available
Vendor-timleggeTIMLEGGE
Product-crypt\Crypt::NaCl::Sodium
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0619
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6||MEDIUM
EPSS-0.06% / 19.35%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 20:09
Updated-13 Feb, 2026 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Wraparound DoS in Silicon Labs Matter Implementation

A reachable infinite loop via an integer wraparound is present in Silicon Labs' Matter SDK which allows an attacker to trigger a denial of service. A hard reset is required to recover the device.

Action-Not Available
Vendor-silabs.com
Product-Silicon Labs Matter
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2024-36320
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 0.59%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 14:33
Updated-11 Feb, 2026 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer Overflow within atihdwt6.sys can allow a local attacker to cause out of bound read/write potentially leading to loss of confidentiality, integrity and availability

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ GraphicsAMD Radeon™ RX 7000 Series Graphics ProductsAMD Radeon™ RX Vega Series Graphics CardsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD Ryzen™ AI MAX+AMD Ryzen™ 7000 Series Desktop ProcessorsAMD Ryzen™ 4000 Series Desktop ProcessorsAMD Radeon™ PRO VIIAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Radeon™ RX 9000 Series Graphics ProductsAMD Radeon™ RX 6000 Series Graphics ProductsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD Radeon™ PRO W5000 Series Graphics ProductsAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Desktop Processors with Radeon™ GraphicsAMD Radeon™ PRO WX 8000/9000 Series Graphics CardsAMD Ryzen™ Embedded R2000 Series ProcessorsAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge")AMD Radeon™ VIIAMD Ryzen™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Embedded 7000 Series ProcessorsAMD Ryzen™ Embedded V2000 Series ProcessorsAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Embedded 9000 Series ProcessorsAMD Ryzen™ Embedded 8000 Series ProcessorsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD Radeon™ RX 5000 Series Graphics ProductsAMD Ryzen™ Embedded R1000 Series ProcessorsAMD Ryzen™ 8040 Series Mobile Processors with Radeon™ GraphicsAMD Radeon™ PRO W6000 Series Graphics ProductsAMD Ryzen™ AI 300 Series ProcessorsAMD Ryzen™ 9000 Series Desktop ProcessorsAMD Ryzen™ 8000 Series Desktop ProcessorsAMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range")AMD Radeon™ PRO W7000 Series Graphics Products
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-36316
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.45%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 14:27
Updated-11 Feb, 2026 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ Al Max+AMD Radeon™ RX 7000 Series Graphics ProductsAMD Ryzen™ Embedded 7000 Series ProcessorsAMD Ryzen™ 7000 Series Desktop Processors; AMD Ryzen™ 8000 Series Desktop Processors; AMD Ryzen™ 9000 Series Desktop ProcessorsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Radeon™ PRO V710AMD Ryzen™ Embedded 8000 Series ProcessorsAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Radeon™ RX 6000 Series Graphics ProductsAMD Radeon™ PRO W6000 Series Graphics ProductsAMD Radeon™ PRO V620AMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")AMD Radeon™ PRO V520AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; AMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range")AMD Radeon™ PRO W7000 Series Graphics Products
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-48515
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.03% / 7.66%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 19:49
Updated-10 Feb, 2026 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient parameter sanitization in AMD Secure Processor (ASP) Boot Loader could allow an attacker with access to SPIROM upgrade to overwrite the memory, potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Embedded V2000 Series ProcessorsAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 4000 Series Desktop ProcessorsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21354
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 6.98%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:32
Updated-10 Mar, 2026 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-dng_software_development_kitDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21353
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.01%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:32
Updated-10 Mar, 2026 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-dng_software_development_kitDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21347
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.01%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:24
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bridge | Integer Overflow or Wraparound (CWE-190)

Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Apple Inc.Adobe Inc.Microsoft Corporation
Product-bridgemacoswindowsBridge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21321
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.40%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:52
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
After Effects | Integer Overflow or Wraparound (CWE-190)

After Effects versions 25.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Apple Inc.Adobe Inc.Microsoft Corporation
Product-macosafter_effectswindowsAfter Effects
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64098
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-1.7||LOW
EPSS-0.03% / 7.63%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 19:29
Updated-18 Feb, 2026 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FastDDS has Out-of-memory in readOctetVector via Manipulated DATA Submessage when DDS Security is enabled

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t he fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specifically by ta mpering with the the `vecsize` value read by `readOctetVector` — a 32-bit integer overflow can occur, causing `std::vector ::resize` to request an attacker-controlled size and quickly trigger OOM and remote process termination. Versions 3.4.1, 3 .3.1, and 2.6.11 patch the issue.

Action-Not Available
Vendor-eprosimaeProsimaDebian GNU/Linux
Product-fast_ddsdebian_linuxFast-DDS
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-62600
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.03% / 7.15%
||
7 Day CHG+0.01%
Published-03 Feb, 2026 | 19:11
Updated-14 Apr, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
eprosima Fast DDS affected by Out-of-Memory in readBinaryPropertySeq via Manipulated DATA Submessage when DDS Security is enabled

eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If the fields of PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN in the DATA Submessage — specifically by tampering with the length field in readBinaryPropertySeq— are modified, an integer overflow occurs, leading to an OOM during the resize operation. This vulnerability is fixed in 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1.

Action-Not Available
Vendor-eprosimaeProsimaDebian GNU/Linux
Product-debian_linuxfast_ddsFast-DDS
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CVE-2025-62599
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.03% / 7.15%
||
7 Day CHG+0.01%
Published-03 Feb, 2026 | 17:54
Updated-09 Apr, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
eprosima Fast DDS affected by Out-of-Memory in readPropertySeq via Manipulated DATA Submessage when DDS Security is enabled

eprosima Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1, when the security mode is enabled, modifying the DATA Submessage within an SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If the fields of PID_IDENTITY_TOKEN or PID_PERMISSION_TOKEN in the DATA Submessage — specifically by tampering with the length field in readPropertySeq — are modified, an integer overflow occurs, leading to an OOM during the resize operation. This vulnerability is fixed in 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1.

Action-Not Available
Vendor-eprosimaeProsimaDebian GNU/Linux
Product-debian_linuxfast_ddsFast-DDS
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CVE-2025-47364
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.43%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 15:20
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Automotive

Memory corruption while calculating offset from partition start point.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6155pqca6797aq_firmwaresa8770p_firmwaresa7775p_firmwaresa8650pqamsrv1msa8620pqca6696_firmwaresa8255pqam8775pqca8695au_firmwaresa9000psa8540pqca6797aqsa6145pqam8775p_firmwaresa8145psa8255p_firmwaresa7775psa8295psa8150p_firmwaresa6145p_firmwareqca6698aqqca6595sa8195p_firmwaresrv1m_firmwareqamsrv1hsa8145p_firmwaresrv1lqca6595auqam8295p_firmwareqam8620psa8650p_firmwareqca6595_firmwareqam8650psa8775p_firmwaresrv1hqca6574auqam8650p_firmwareqam8295psa6155p_firmwaresa6150pqca6698aq_firmwaresa7255psa9000p_firmwareqam8620p_firmwaresa7255p_firmwareqam8255psa8150psrv1h_firmwaresa8775psa6150p_firmwareqca6574au_firmwaresa8155psa8620p_firmwareqca6595au_firmwareqca6688aq_firmwareqamsrv1m_firmwaresa8295p_firmwareqam8255p_firmwaresa8770pqca8695ausa8195pqamsrv1h_firmwareqca6696srv1l_firmwareqca6688aqsa8155p_firmwaresa8540p_firmwaresrv1mSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47363
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.43%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 15:20
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Automotive

Memory corruption when calculating oversized partition sizes without proper checks.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6155pqca6797aq_firmwaresa8770p_firmwaresa7775p_firmwaresa8650pqamsrv1msa8620pqca6696_firmwaresa8255pqam8775pqca8695au_firmwaresa9000psa8540pqca6797aqsa6145pqam8775p_firmwaresa8145psa8255p_firmwaresa7775psa8295psa8150p_firmwaresa6145p_firmwareqca6698aqqca6595sa8195p_firmwaresrv1m_firmwareqamsrv1hsa8145p_firmwaresrv1lqca6595auqam8295p_firmwareqam8620psa8650p_firmwareqca6595_firmwareqam8650psa8775p_firmwaresrv1hqca6574auqam8650p_firmwareqam8295psa6155p_firmwaresa6150pqca6698aq_firmwaresa7255psa9000p_firmwareqam8620p_firmwaresa7255p_firmwareqam8255psa8150psrv1h_firmwaresa8775psa6150p_firmwareqca6574au_firmwaresa8155psa8620p_firmwareqca6595au_firmwareqca6688aq_firmwareqamsrv1m_firmwaresa8295p_firmwareqam8255p_firmwaresa8770pqca8695ausa8195pqamsrv1h_firmwareqca6696srv1l_firmwareqca6688aqsa8155p_firmwaresa8540p_firmwaresrv1mSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-25210
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.01% / 0.50%
||
7 Day CHG~0.00%
Published-30 Jan, 2026 | 06:40
Updated-30 Apr, 2026 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.

Action-Not Available
Vendor-libexpat_projectlibexpat project
Product-libexpatlibexpat
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24889
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 5.69%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 22:01
Updated-02 Mar, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
soroban-sdk has overflow in Bytes::slice, Vec::slice, GenRange::gen_range for u64

soroban-sdk is a Rust SDK for Soroban contracts. Arithmetic overflow can be triggered in the `Bytes::slice`, `Vec::slice`, and `Prng::gen_range` (for `u64`) methods in the `soroban-sdk` in versions up to and including `25.0.1`, `23.5.1`, and `25.0.2`. Contracts that pass user-controlled or computed range bounds to `Bytes::slice`, `Vec::slice`, or `Prng::gen_range` may silently operate on incorrect data ranges or generate random numbers from an unintended range, potentially resulting in corrupted contract state. Note that the best practice when using the `soroban-sdk` and building Soroban contracts is to always enable `overflow-checks = true`. The `stellar contract init` tool that prepares the boiler plate for a Soroban contract, as well as all examples and docs, encourage the use of configuring `overflow-checks = true` on `release` profiles so that these arithmetic operations fail rather than silently wrap. Contracts are only impacted if they use `overflow-checks = false` either explicitly or implicitly. It is anticipated the majority of contracts could not be impacted because the best practice encouraged by tooling is to enable `overflow-checks`. The fix available in `25.0.1`, `23.5.1`, and `25.0.2` replaces bare arithmetic with `checked_add` / `checked_sub`, ensuring overflow traps regardless of the `overflow-checks` profile setting. As a workaround, contract workspaces can be configured with a profile available in the GitHub Securtity Advisory to enable overflow checks on the arithmetic operations. This is the best practice when developing Soroban contracts, and the default if using the contract boilerplate generated using `stellar contract init`. Alternatively, contracts can validate range bounds before passing them to `slice` or `gen_range` to ensure the conversions cannot overflow.

Action-Not Available
Vendor-stellarstellar
Product-rs-soroban-sdkrs-soroban-sdk
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-33219
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.40%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 17:48
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-RTX PRO, RTX, QuadroTeslaGuest driverGeForceVirtual GPU Manager
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-33218
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.40%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 17:47
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-RTX PRO, RTX, QuadroGeForceTeslaGuest driver
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24875
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.72%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 15:55
Updated-29 Jan, 2026 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in modizer

Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1.

Action-Not Available
Vendor-yoyofr
Product-modizer
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-41726
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-8.8||HIGH
EPSS-0.27% / 50.61%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 11:35
Updated-27 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beckhoff: Arbitrary code execution within privileged processes

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes.

Action-Not Available
Vendor-Beckhoff Automation GmbH & Co. KG
Product-MDP software package for TwinCAT/BSDMDP for Beckhoff RT Linux(R)Beckhoff.Device.Manager.XAR
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24830
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.86%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 09:28
Updated-27 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in IronOS

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

Action-Not Available
Vendor-Ralim
Product-IronOS
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 61
  • 62
  • Next