Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-190:Integer Overflow or Wraparound
Weakness ID:190
Version:v4.17
Weakness Name:Integer Overflow or Wraparound
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Stable
Likelihood of Exploit:Medium
DetailsContent HistoryObserved CVE ExamplesReports
3099Vulnerabilities found

CVE-2026-24830
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.86%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 09:28
Updated-27 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in IronOS

Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2.

Action-Not Available
Vendor-Ralim
Product-IronOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24814
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-10||CRITICAL
EPSS-0.06% / 19.59%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 08:50
Updated-27 Jan, 2026 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A integer overflow in swoole/swoole-src

Integer Overflow or Wraparound vulnerability in swoole swoole-src (thirdparty/hiredis modules). This vulnerability is associated with program files sds.C. This issue affects swoole-src: before 6.0.2.

Action-Not Available
Vendor-swoole
Product-swoole-src
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24808
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-8.3||HIGH
EPSS-0.02% / 6.13%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 08:44
Updated-27 Jan, 2026 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A possible integer overflow vulnerability in RawTherapee/RawTherapee

Integer Overflow or Wraparound vulnerability in RawTherapee (rtengine modules). This vulnerability is associated with program files dcraw.Cc. This issue affects RawTherapee: through 5.11.

Action-Not Available
Vendor-RawTherapee
Product-RawTherapee
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-1464
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-4.6||MEDIUM
EPSS-0.02% / 6.13%
||
7 Day CHG~0.00%
Published-27 Jan, 2026 | 08:18
Updated-27 Jan, 2026 | 21:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A possible integer overflow vulnerability in RawTherapee/RawTherapee

Integer Overflow or Wraparound vulnerability in MuntashirAkon AppManager (app/src/main/java/org/apache/commons/compress/archivers/tar modules). This vulnerability is associated with program files TarUtils.Java. This issue affects AppManager: before 4.0.4.

Action-Not Available
Vendor-MuntashirAkon
Product-AppManager
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-24403
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.19% / 40.25%
||
7 Day CHG~0.00%
Published-24 Jan, 2026 | 00:46
Updated-30 Jan, 2026 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV Undefined Behavior in CIccProfile::CheckHeader() Leads to Integer Overflow

iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color management profiles. In versions 2.3.1.1 and below, an integer overflow vulnerability exists in icValidateStatus CIccProfile::CheckHeader() when user-controllable input is incorporated into profile data unsafely. Tampering with tag tables, offsets, or size fields can trigger parsing errors, memory corruption, or DoS, potentially enabling arbitrary Code Execution or bypassing application logic. This issue has been fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CVE-2025-67125
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.68%
||
7 Day CHG~0.00%
Published-23 Jan, 2026 | 00:00
Updated-11 Feb, 2026 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A signed integer overflow in docopt.cpp v0.6.2 (LeafPattern::match in docopt_private.h) when merging occurrence counters (e.g., default LONG_MAX + first user "-v/--verbose") can cause counter wrap (negative/unbounded semantics) and lead to logic/policy bypass in applications that rely on occurrence-based limits, rate-gating, or safety toggles. In hardened builds (e.g., UBSan or -ftrapv), the overflow may also result in process abort (DoS).

Action-Not Available
Vendor-docoptn/a
Product-docopt.cppn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0988
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.07% / 21.95%
||
7 Day CHG~0.00%
Published-21 Jan, 2026 | 11:38
Updated-24 Apr, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Hardened ImagesRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-23876
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.09% / 25.00%
||
7 Day CHG~0.00%
Published-20 Jan, 2026 | 01:01
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow with attacker-controlled data in XBM parser

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-13 and 6.9.13-38, a heap buffer overflow vulnerability in the XBM image decoder (ReadXBMImage) allows an attacker to write controlled data past the allocated heap buffer when processing a maliciously crafted image file. Any operation that reads or identifies an image can trigger the overflow, making it exploitable via common image upload and processing pipelines. Versions 7.1.2-13 and 6.9.13-38 fix the issue.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-23833
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-1.7||LOW
EPSS-0.08% / 23.26%
||
7 Day CHG~0.00%
Published-19 Jan, 2026 | 17:58
Updated-04 Mar, 2026 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ESPHome vulnerable to denial-of-service via out-of-bounds check bypass in the API component

ESPHome is a system to control microcontrollers remotely through Home Automation systems. In versions 2025.9.0 through 2025.12.6, an integer overflow in the API component's protobuf decoder allows denial-of-service attacks when API encryption is not used. The bounds check `ptr + field_length > end` in `components/api/proto.cpp` can overflow when a malicious client sends a large `field_length` value. This affects all ESPHome device platforms (ESP32, ESP8266, RP2040, LibreTiny). The overflow bypasses the out-of-bounds check, causing the device to read invalid memory and crash. When using the plaintext API protocol, this attack can be performed without authentication. When noise encryption is enabled, knowledge of the encryption key is required. Users should upgrade to ESPHome 2025.12.7 or later to receive a patch, enable API encryption with a unique key per device, and follow the Security Best Practices.

Action-Not Available
Vendor-esphomeesphome
Product-esphomeesphome
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-15534
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.90%
||
7 Day CHG~0.00%
Published-18 Jan, 2026 | 06:32
Updated-23 Feb, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
raysan5 raylib rtext.c LoadFontData integer overflow

A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.

Action-Not Available
Vendor-raylibraysan5
Product-raylibraylib
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-24528
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.21% / 42.77%
||
7 Day CHG~0.00%
Published-16 Jan, 2026 | 00:00
Updated-26 Jan, 2026 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.

Action-Not Available
Vendor-MIT (Massachusetts Institute of Technology)
Product-Kerberos 5
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0861
Assigner-GNU C Library
ShareView Details
Assigner-GNU C Library
CVSS Score-8.4||HIGH
EPSS-0.01% / 1.74%
||
7 Day CHG~0.00%
Published-14 Jan, 2026 | 21:01
Updated-29 Apr, 2026 | 13:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in memalign leads to heap corruption

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.

Action-Not Available
Vendor-The GNU C LibraryGNU
Product-glibcglibc
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14242
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.27%
||
7 Day CHG+0.06%
Published-14 Jan, 2026 | 15:23
Updated-16 Mar, 2026 | 14:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vsftpd: vsftpd: denial of service via integer overflow in ls command parameter parsing

A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 9.6 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 10.0 Extended Update SupportRed Hat Enterprise Linux 8.8 Telecommunications Update ServiceRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-0880
Assigner-Mozilla Corporation
ShareView Details
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-0.03% / 7.66%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 13:30
Updated-13 Apr, 2026 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandbox escape due to integer overflow in the Graphics component

Sandbox escape due to integer overflow in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdThunderbirdFirefox
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-22801
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 6.73%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 22:57
Updated-21 Jan, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.

Action-Not Available
Vendor-libpngpnggroup
Product-libpnglibpng
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21689
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.76%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 21:46
Updated-12 Jan, 2026 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Type Confusion in CIccProfileXml::ParseBasic() at IccXML/IccLibXML/IccProfileXml.cpp

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccProfileXml::ParseBasic()` at `IccXML/IccLibXML/IccProfileXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-232
Improper Handling of Undefined Values
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-690
Unchecked Return Value to NULL Pointer Dereference
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-21688
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.47%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 21:43
Updated-12 Jan, 2026 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Type Confusion in SIccCalcOp::ArgsPushed() at IccProfLib/IccMpeCalc.cpp

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `SIccCalcOp::ArgsPushed()` at `IccProfLib/IccMpeCalc.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2026-21486
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.25%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 03:36
Updated-12 Jan, 2026 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free and Heap-based Buffer Overflow and Integer Overflow or Wraparound and Out-of-bounds Write in iccDEV

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1.1 and below contain Use After Free, Heap-based Buffer Overflow and Integer Overflow or Wraparound and Out-of-bounds Write vulnerabilities in its CIccSparseMatrix::CIccSparseMatrix function. This issue is fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-21485
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.47%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 03:17
Updated-14 Jan, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV Undefined Behavior (UB) and Out of Memory in CIccProfile::LoadTag()

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1.1 and below are prone to have Undefined Behavior (UB) and Out of Memory errors. This issue is fixed in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20807
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:47
Updated-30 Mar, 2026 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dpe, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10114841; Issue ID: MSV-4451.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6899androidmt8793mt6991MediaTek chipset
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-20803
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:47
Updated-30 Mar, 2026 | 13:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dpe, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10199779; Issue ID: MSV-4504.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6899androidmt8793mt6991MediaTek chipset
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-21673
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.83%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:32
Updated-12 Jan, 2026 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Integer Overflow/Underflow in CIccXmlArrayType::ParseTextCountNum()

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and below have overflows and underflows in CIccXmlArrayType::ParseTextCountNum(). This vulnerability affects users of the iccDEV library who process ICC color profiles. This issue is fixed in version 2.3.1.1.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2025-15278
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.27%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 06:59
Updated-07 Jan, 2026 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability

FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of pixels within XBM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27865.

Action-Not Available
Vendor-fontforgeFontForge
Product-fontforgeFontForge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-69261
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 19:43
Updated-09 Mar, 2026 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WasmEdge integer wrap in MemoryInstance::getSpan()'s memory size check

WasmEdge is a WebAssembly runtime. Prior to version 0.16.0-alpha.3, a multiplication in `WasmEdge/include/runtime/instance/memory.h` can wrap, causing `checkAccessBound()` to incorrectly allow the access. This leads to a segmentation fault. Version 0.16.0-alpha.3 contains a patch for the issue.

Action-Not Available
Vendor-WasmEdgeThe Linux Foundation
Product-wasmedgeWasmEdge
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-69204
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 32.37%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 16:56
Updated-06 Jan, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick converting a malicious MVG file to SVG caused an integer overflow.

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, in the WriteSVGImage function, using an int variable to store number_attributes caused an integer overflow. This, in turn, triggered a buffer overflow and caused a DoS attack. Version 7.1.2-12 fixes the issue.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-68431
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.30%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 19:09
Updated-25 Feb, 2026 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libheif has Potential Heap Buffer Over-Read

libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.

Action-Not Available
Vendor-strukturstrukturag
Product-libheiflibheif
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14178
Assigner-PHP Group
ShareView Details
Assigner-PHP Group
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 5.70%
||
7 Day CHG-0.01%
Published-27 Dec, 2025 | 19:27
Updated-24 Jan, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in array_merge()

In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.

Action-Not Available
Vendor-The PHP Group
Product-phpPHP
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-14422
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.87%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 21:31
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.

Action-Not Available
Vendor-GIMP
Product-gimpGIMP
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14933
Assigner-Trend Micro, Inc.
ShareView Details
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.53%
||
7 Day CHG-0.02%
Published-23 Dec, 2025 | 21:09
Updated-13 Jan, 2026 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability

NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of NC variables. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27266.

Action-Not Available
Vendor-unidataNSF Unidata
Product-netcdfNetCDF-C
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-67111
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 32.96%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 00:00
Updated-06 Jan, 2026 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in the RTPS protocol implementation of OpenDDS DDS before v3.33.0 allows attackers to cause a Denial of Service (DoS) via a crafted message.

Action-Not Available
Vendor-objectcomputingn/a
Product-openddsn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-65865
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.35%
||
7 Day CHG~0.00%
Published-23 Dec, 2025 | 00:00
Updated-06 Jan, 2026 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in eProsima Fast-DDS v3.3 allows attackers to cause a Denial of Service (DoS) via a crafted input.

Action-Not Available
Vendor-eprosiman/a
Product-fast_ddsn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14299
Assigner-TP-Link Systems Inc.
ShareView Details
Assigner-TP-Link Systems Inc.
CVSS Score-7.1||HIGH
EPSS-0.08% / 23.35%
||
7 Day CHG~0.00%
Published-20 Dec, 2025 | 00:42
Updated-08 Jan, 2026 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Content-Length Validation in HTTPS Requests on Tapo C200

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-tapo_c200_firmwaretapo_c200Tapo C200 V3
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-66499
Assigner-14984358-7092-470d-8f34-ade47a7658a2
ShareView Details
Assigner-14984358-7092-470d-8f34-ade47a7658a2
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.50%
||
7 Day CHG-0.04%
Published-19 Dec, 2025 | 07:11
Updated-23 Dec, 2025 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Foxit PDF Reader PDF Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability

A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.

Action-Not Available
Vendor-Foxit Software Inc.Foxit Software IncorporatedApple Inc.Microsoft Corporation
Product-windowspdf_editorpdf_readermacosFoxit PDF ReaderFoxit PDF Editor
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47323
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.61%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-28 Jan, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Audio

Memory corruption while routing GPR packets between user and root when handling large data packet.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6696_firmwaresm6650pqca8081_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn3910snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcd9390snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresnapdragon_888_5g_mobile_platformwcn7860_firmwarefastconnect_6900_firmwareqca6174a_firmwareqmp1000ssg2115pwcn3950snapdragon_480_5g_mobile_platform_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqcn6224_firmwarewcn3980_firmwaresnapdragon_7c\+_gen_3_computeqfw7124wcd9378qca6678aqqcm5430snapdragon_8_gen_1_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm7325psnapdragon_680_4g_mobile_platform_firmwaresa4155p_firmwaresa7775psrv1msa6150psnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8845h_firmwaresnapdragon_7_gen_1_mobile_platform_firmwareqamsrv1mqca6564qca6584au_firmwareqca6595au_firmwareqca6688aq_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"qcm6490wcd9335_firmwarecsra6620_firmwarewcd9380_firmwarerobotics_rb2_platform_firmwaressg2115p_firmwaresg8275_firmwaresnapdragon_778g_5g_mobile_platformwcn6740snapdragon_680_4g_mobile_platformwcn6740_firmwaresa8650pqcm6490_firmwareqca6696snapdragon_480_5g_mobile_platformwsa8832_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarerobotics_rb2_platformqcs4490_firmwareqca6564ausnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sm8750p_firmwaresnapdragon_x35_5g_modem-rf_systemfastconnect_6200_firmwaresnapdragon_8_gen_2_mobile_platformsxr1230psm7435qca8337snapdragon_x72_5g_modem-rf_systemsm7675qcn6024_firmwaresa8540p_firmwarear8035_firmwaresm8475p_firmwarewcd9340_firmwareqcn9011_firmwarewcn7861sg8275p_firmwaresa8770psm7675psm8750pqmp1000_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)fastconnect_7800_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqcm2290_firmwareqcs2290qcn9012qca6174asnapdragon_x75_5g_modem-rf_system_firmwarevideo_collaboration_vc3_platformsnapdragon_6_gen_1_mobile_platformsm7635ssg2125p_firmwarewcd9395_firmwaresnapdragon_8\+_gen_1_mobile_platformsm8550pqamsrv1hqam8620psnapdragon_8_gen_1snapdragon_460_mobile_platformsg8275pwcd9370sdx61_firmwareqamsrv1m_firmwarewcn3988wsa8815_firmwaresm7550pqam8295p_firmwaresa4150p_firmwareqfw7124_firmwareqcs2290_firmwareqam8650pwcd9371_firmwaresm8475psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wsa8845hqam8620p_firmwarewcn6650_firmwaresa6145p_firmwaressg2125psm7550snapdragon_7\+_gen_2_mobile_platformqca6595sm7635p_firmwareqcm4490wcd9385_firmwareqcn6224qep8111wcn6755_firmwarewcn6755sa9000psnapdragon_x35_5g_modem-rf_system_firmwareqcm8550wsa8815fastconnect_6700qca8081qca6797aqqcm2290fastconnect_6700_firmwaresa8195p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresrv1h_firmwareqca6564_firmwarewcn7861_firmwaresm7550_firmwareqcn6274sdx61sw5100snapdragon_8_gen_1_mobile_platformqcc710snapdragon_8\+_gen_2_mobile_platform_firmwaresa8195psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresa6150p_firmwareqcs8550sa8775p_firmwaresxr2250pvideo_collaboration_vc3_platform_firmwaresa4150psa6155_firmwarear8035sm8635snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresm7635pwcn3950_firmwareqca6574wsa8840snapdragon_4_gen_1_mobile_platformsnapdragon_7\+_gen_2_mobile_platform_firmwaresm8750_firmwaresa8620p_firmwaresm7435_firmwareqca8337_firmwarewcn3988_firmwaresm4635_firmwaresm8650qsnapdragon_ar2_gen_1_platformsa8145pqam8650p_firmwareqca6797aq_firmwaresa8775pwsa8832wcd9340srv1lsa6155psa8150p_firmwaresc8380xpsm4635qcc710_firmwarewcd9385qcn9011sxr1230p_firmwarewsa8835_firmwarewsa8845sm8550p_firmwarewcn7750_firmwarewcd9378_firmwaresa8620psa9000p_firmwaresc8380xp_firmwaresnapdragon_x65_5g_modem-rf_systemcsra6620sa8295p_firmwaresg4150p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_x70_modem-rf_system_firmwareqfw7114sm8735_firmwaresw5100p_firmwaresm6650snapdragon_662_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platformqca6574_firmwareqcm4490_firmwaresnapdragon_7_gen_1_mobile_platformsm8635p_firmwaresa8650p_firmwaresa6155sa4155psnapdragon_695_5g_mobile_platform_firmwareqcn9024snapdragon_x70_modem-rf_systemsnapdragon_ar1_gen_1_platform_firmwaresm7675p_firmwareqcm5430_firmwaresm7675_firmwaresdx71msnapdragon_ar2_gen_1_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_7c\+_gen_3_compute_firmwarewcd9395csra6640sa7775p_firmwaresnapdragon_x75_5g_modem-rf_systemqcs6490snapdragon_8\+_gen_2_mobile_platformwcd9375_firmwareqam8295psm6475srv1m_firmwarewcd9390_firmwarefastconnect_7800sa8770p_firmwarewsa8810_firmwareqam8255p_firmwaresxr2250p_firmwarewcd9370_firmwarecsra6640_firmwareqca6574a_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresm6650_firmwaresxr2230pqam8775pwcd9335wcn7860qam8775p_firmwaresa8150pqfw7114_firmwareqcn6024wcd9380qca6698aqqca6391_firmwaresnapdragon_460_mobile_platform_firmwareqca6564au_firmwaresnapdragon_8_gen_3_mobile_platformfastconnect_6200sa8295psa6155p_firmwaresm7550p_firmwarewcn7880sa8255p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcs6490_firmwareqcn9012_firmwareqca6698aq_firmwarewsa8830_firmwaresa8145p_firmwarewsa8830sm7635_firmwarewcn7750snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)qcs8550_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)snapdragon_ar1_gen_1_platformsa8155p_firmwareqamsrv1h_firmwaresa8255pwcn7881qca6574au_firmwareqep8111_firmwaresw5100_firmwaresa8540pwcn6650wcn7881_firmwareqca6595_firmwareqca6574auqcs4490qca6595ausrv1hsm8635_firmwaresg8275snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresdx71m_firmwaresm8635psnapdragon_6_gen_1_mobile_platform_firmwareqcm8550_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)sm6650p_firmwareqca6574asxr2230p_firmwaresnapdragon_x32_5g_modem-rf_systemsg4150pqcn6274_firmwarewsa8835qcn9024_firmwarewcn3980qca6678aq_firmwarewcd9375sa7255p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3910_firmwaresm6475_firmwaresa7255pwsa8840_firmwareqam8255psnapdragon_662_mobile_platformsa6145psa8155wsa8845_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs5430fastconnect_6900sa8155psm8750srv1l_firmwarewcn7880_firmwareqcs5430_firmwaresm7325p_firmwareqca6688aqqca6584ausm8735qca6391wsa8810wcd9371sa8155_firmwaresm8650q_firmwaresw5100pSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-63757
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.70%
||
7 Day CHG-0.03%
Published-18 Dec, 2025 | 00:00
Updated-30 Dec, 2025 | 20:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.

Action-Not Available
Vendor-n/aFFmpeg
Product-ffmpegn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-12035
Assigner-Zephyr Project
ShareView Details
Assigner-Zephyr Project
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 5.69%
||
7 Day CHG-0.02%
Published-15 Dec, 2025 | 19:42
Updated-16 Dec, 2025 | 14:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Integer Overflow in Bluetooth Classic (BR/EDR) L2CAP

An integer overflow condition exists in Bluetooth Host stack, within the bt_br_acl_recv routine a critical path for processing inbound BR/EDR L2CAP traffic.

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-46285
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.76%
||
7 Day CHG-0.00%
Published-12 Dec, 2025 | 20:56
Updated-02 Apr, 2026 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow was addressed by adopting 64-bit timestamps. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. An app may be able to gain root privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosvisionOSmacOStvOSiOS and iPadOSwatchOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-29144
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.01% / 2.78%
||
7 Day CHG-0.00%
Published-12 Dec, 2025 | 00:00
Updated-19 Dec, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.

Action-Not Available
Vendor-malwarebytesn/a
Product-malwarebytesn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64721
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.09% / 25.76%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 21:15
Updated-22 Dec, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandboxie's Integer Overflow in SbieIniServer::RC4Crypt allows sandbox escape and SYSTEM compromise

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.

Action-Not Available
Vendor-sandboxie-plussandboxie-plus
Product-sandboxieSandboxie
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-36936
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.38%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14512
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.16%
||
7 Day CHG+0.02%
Published-11 Dec, 2025 | 07:11
Updated-11 May, 2026 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

Action-Not Available
Vendor-The GNOME ProjectRed Hat, Inc.
Product-openshiftglibenterprise_linuxRed Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 6glibRed Hat Enterprise Linux 8Red Hat Hardened ImagesRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14087
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.98%
||
7 Day CHG+0.05%
Published-10 Dec, 2025 | 09:01
Updated-11 May, 2026 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: glib: buffer underflow in gvariant parser leads to heap corruption

A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.

Action-Not Available
Vendor-The GNOME ProjectRed Hat, Inc.
Product-glibenterprise_linuxRed Hat Enterprise Linux 10Red Hat Enterprise Linux 6glibRed Hat Enterprise Linux 8Red Hat Hardened ImagesRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-65803
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.41%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 00:00
Updated-17 Dec, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow in the psdParser::ReadImageData function of FreeImage v3.18.0 and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted PSD file.

Action-Not Available
Vendor-freeimage_projectn/a
Product-freeimagen/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-62467
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.81%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-16 Apr, 2026 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Integer overflow or wraparound in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 21H2Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2019Windows 11 Version 25H2Windows 10 Version 1809
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64894
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 3.33%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this issue to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64783
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.05%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-14308
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-10||CRITICAL
EPSS-0.08% / 23.17%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 07:44
Updated-05 Jan, 2026 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Robocode's Buffer Write Method

An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.

Action-Not Available
Vendor-robocodeRobocode Project
Product-robocodeRobocode
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-48637
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.79%
||
7 Day CHG~0.00%
Published-08 Dec, 2025 | 16:57
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-55753
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.11%
||
7 Day CHG~0.00%
Published-05 Dec, 2025 | 10:12
Updated-10 Dec, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache HTTP Server: mod_md (ACME), unintended retry intervals

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-http_serverApache HTTP Server
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-34297
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.6||HIGH
EPSS-0.02% / 6.95%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:18
Updated-23 Mar, 2026 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

Action-Not Available
Vendor-mborgerding/kissfft
Product-mborgerding/kissfft
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-3500
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-9||CRITICAL
EPSS-0.05% / 16.10%
||
7 Day CHG+0.01%
Published-01 Dec, 2025 | 16:09
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Avast Antiviurs 25.1.981.6 on Windows may result in privilege escalation

Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.

Action-Not Available
Vendor-avastAvastMicrosoft Corporation
Product-antiviruswindowsAntivirus
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 61
  • 62
  • Next