CWE-191

Integer Underflow

77 CVEs Avg CVSS 6.6 MITRE
4
CRITICAL
39
HIGH
25
MEDIUM
8
LOW
14
POC
0
KEV

Monthly

CVE-2026-5188 LOW Monitor

Integer underflow in wolfSSL's ASN.1 certificate parser allows remote attackers to trigger information disclosure and potential memory access violations when processing malformed X.509 certificates with oversized Subject Alternative Name extensions. The vulnerability affects wolfSSL versions up to 5.9.0 but only impacts systems using the non-default original ASN.1 parsing implementation; no public exploit code or active exploitation has been identified at time of analysis.

Information Disclosure Integer Overflow Wolfssl
NVD GitHub VulDB
CVSS 4.0
2.3
EPSS
0.0%
CVE-2026-5778 LOW Monitor

Integer underflow in wolfSSL's packet sniffer (versions up to 5.9.0) allows remote attackers to crash applications during AEAD decryption by sending malformed TLS Application Data records with insufficient length for the explicit IV and authentication tag. The vulnerability wraps a 16-bit length value to an unexpectedly large integer, triggering an out-of-bounds read in decryption routines. While the CVSS score is low (2.1) due to limited practical impact (availability only), the attack requires no victim interaction beyond network exposure and affects any system passively inspecting encrypted TLS traffic through wolfSSL's ssl_DecodePacket function.

Buffer Overflow Integer Overflow
NVD GitHub VulDB
CVSS 4.0
2.1
EPSS
0.1%
CVE-2026-39314 MEDIUM This Month

Denial of service in OpenPrinting CUPS 2.4.16 and prior allows unprivileged local users to crash the cupsd root process via integer underflow in _ppdCreateFromIPP() by supplying a negative job-password-supported IPP attribute, which wraps to a large size_t value and triggers a stack buffer overflow in memset(). When combined with systemd's automatic restart mechanism, an attacker can sustain repeated crashes without requiring elevated privileges or user interaction.

Denial Of Service Integer Overflow
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2026-33184 HIGH This Week

Integer underflow in Nimiq core-rs-albatross <1.3.0 enables unauthenticated remote attackers to trigger deterministic denial-of-service via crafted peer handshake. Attackers send limit=0 during discovery handshake, causing arithmetic underflow (0-1 wraps to usize::MAX) when session transitions to Established state, resulting in capacity overflow panic when allocating peer contact vector. Upstream fix available (PR/commit); released patched version 1.3.0 confirmed. No public exploit identified at time of analysis, but EPSS indicates low exploitation probability and attack is trivially reproducible given simple network message crafting.

Buffer Overflow Integer Overflow
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-34165 MEDIUM PATCH GHSA This Month

Maliciously crafted `.idx` files in go-git v5 cause asymmetric memory consumption leading to Denial of Service through integer overflow vulnerabilities. Exploitation requires local write access to the `.git` directory, limiting attack surface to scenarios where an attacker has already compromised repository access or can inject files into a shared repository. No public exploit code or active exploitation has been confirmed; however, the low CVSS complexity and requirement for only low-privilege local access make this a moderate operational concern for development environments and CI/CD systems that process untrusted repositories.

Denial Of Service Integer Overflow
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2026-25075 HIGH POC PATCH This Week

Unauthenticated remote attackers can crash strongSwan versions 4.5.0 through 6.0.4 via integer underflow in the EAP-TTLS AVP parser during IKEv2 authentication by sending malformed AVP packets with invalid length fields. Public exploit code exists for this denial of service vulnerability, which triggers memory corruption in the charon daemon with no available patch. Organizations running affected strongSwan versions are vulnerable to service disruption without authentication or user interaction required.

Denial Of Service Integer Overflow Suse
NVD VulDB
CVSS 4.0
8.7
EPSS
0.1%
CVE-2026-1005 LOW Monitor

Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket.

Buffer Overflow Integer Overflow
NVD GitHub VulDB
CVSS 4.0
2.1
EPSS
0.1%
CVE-2026-2369 MEDIUM PATCH This Month

libsoup versions prior to the patched release contain an integer underflow vulnerability in zero-length resource processing that enables unauthenticated remote attackers to read adjacent memory or trigger denial of service. The vulnerability stems from improper bounds checking during content handling, affecting any application using the vulnerable libsoup library for HTTP operations. No public exploit code has been identified, and the low EPSS score (0.04%, percentile 11%) indicates exploitation is unlikely in practice despite the moderate CVSS score of 6.5.

Denial Of Service Redhat Suse
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-32775 HIGH This Week

A critical integer underflow vulnerability in libexif library versions up to 0.6.25 allows attackers to cause buffer overflows when processing malformed EXIF MakerNotes data in image files. This vulnerability can lead to arbitrary code execution or information disclosure when a victim opens a maliciously crafted image file containing specially crafted EXIF metadata. While not currently listed in CISA KEV or showing high EPSS scores, the vulnerability has a published fix and affects a widely-used image metadata processing library.

Information Disclosure Integer Overflow Libexif
NVD GitHub VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-3084 HIGH This Week

CVE-2026-3084 is an integer underflow vulnerability in GStreamer's H.266 codec parser that allows remote code execution when processing malicious media files. The vulnerability affects all versions of GStreamer (CPE indicates wildcard versioning) and can be exploited through user interaction with specially crafted H.266 video content, allowing attackers to execute arbitrary code in the context of the application. No active exploitation (not in KEV) or public POC has been reported, and the relatively high CVSS score (7.8) is tempered by the local attack vector and user interaction requirement.

RCE Integer Overflow Gstreamer
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-5188
EPSS 0% CVSS 2.3
LOW Monitor

Integer underflow in wolfSSL's ASN.1 certificate parser allows remote attackers to trigger information disclosure and potential memory access violations when processing malformed X.509 certificates with oversized Subject Alternative Name extensions. The vulnerability affects wolfSSL versions up to 5.9.0 but only impacts systems using the non-default original ASN.1 parsing implementation; no public exploit code or active exploitation has been identified at time of analysis.

Information Disclosure Integer Overflow Wolfssl
NVD GitHub VulDB
CVE-2026-5778
EPSS 0% CVSS 2.1
LOW Monitor

Integer underflow in wolfSSL's packet sniffer (versions up to 5.9.0) allows remote attackers to crash applications during AEAD decryption by sending malformed TLS Application Data records with insufficient length for the explicit IV and authentication tag. The vulnerability wraps a 16-bit length value to an unexpectedly large integer, triggering an out-of-bounds read in decryption routines. While the CVSS score is low (2.1) due to limited practical impact (availability only), the attack requires no victim interaction beyond network exposure and affects any system passively inspecting encrypted TLS traffic through wolfSSL's ssl_DecodePacket function.

Buffer Overflow Integer Overflow
NVD GitHub VulDB
CVE-2026-39314
EPSS 0% CVSS 4.0
MEDIUM This Month

Denial of service in OpenPrinting CUPS 2.4.16 and prior allows unprivileged local users to crash the cupsd root process via integer underflow in _ppdCreateFromIPP() by supplying a negative job-password-supported IPP attribute, which wraps to a large size_t value and triggers a stack buffer overflow in memset(). When combined with systemd's automatic restart mechanism, an attacker can sustain repeated crashes without requiring elevated privileges or user interaction.

Denial Of Service Integer Overflow
NVD GitHub
CVE-2026-33184
EPSS 0% CVSS 7.5
HIGH This Week

Integer underflow in Nimiq core-rs-albatross <1.3.0 enables unauthenticated remote attackers to trigger deterministic denial-of-service via crafted peer handshake. Attackers send limit=0 during discovery handshake, causing arithmetic underflow (0-1 wraps to usize::MAX) when session transitions to Established state, resulting in capacity overflow panic when allocating peer contact vector. Upstream fix available (PR/commit); released patched version 1.3.0 confirmed. No public exploit identified at time of analysis, but EPSS indicates low exploitation probability and attack is trivially reproducible given simple network message crafting.

Buffer Overflow Integer Overflow
NVD GitHub
CVE-2026-34165
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

Maliciously crafted `.idx` files in go-git v5 cause asymmetric memory consumption leading to Denial of Service through integer overflow vulnerabilities. Exploitation requires local write access to the `.git` directory, limiting attack surface to scenarios where an attacker has already compromised repository access or can inject files into a shared repository. No public exploit code or active exploitation has been confirmed; however, the low CVSS complexity and requirement for only low-privilege local access make this a moderate operational concern for development environments and CI/CD systems that process untrusted repositories.

Denial Of Service Integer Overflow
NVD GitHub
CVE-2026-25075
EPSS 0% CVSS 8.7
HIGH POC PATCH This Week

Unauthenticated remote attackers can crash strongSwan versions 4.5.0 through 6.0.4 via integer underflow in the EAP-TTLS AVP parser during IKEv2 authentication by sending malformed AVP packets with invalid length fields. Public exploit code exists for this denial of service vulnerability, which triggers memory corruption in the charon daemon with no available patch. Organizations running affected strongSwan versions are vulnerable to service disruption without authentication or user interaction required.

Denial Of Service Integer Overflow Suse
NVD VulDB
CVE-2026-1005
EPSS 0% CVSS 2.1
LOW Monitor

Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket.

Buffer Overflow Integer Overflow
NVD GitHub VulDB
CVE-2026-2369
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

libsoup versions prior to the patched release contain an integer underflow vulnerability in zero-length resource processing that enables unauthenticated remote attackers to read adjacent memory or trigger denial of service. The vulnerability stems from improper bounds checking during content handling, affecting any application using the vulnerable libsoup library for HTTP operations. No public exploit code has been identified, and the low EPSS score (0.04%, percentile 11%) indicates exploitation is unlikely in practice despite the moderate CVSS score of 6.5.

Denial Of Service Redhat Suse
NVD VulDB
CVE-2026-32775
EPSS 0% CVSS 7.4
HIGH This Week

A critical integer underflow vulnerability in libexif library versions up to 0.6.25 allows attackers to cause buffer overflows when processing malformed EXIF MakerNotes data in image files. This vulnerability can lead to arbitrary code execution or information disclosure when a victim opens a maliciously crafted image file containing specially crafted EXIF metadata. While not currently listed in CISA KEV or showing high EPSS scores, the vulnerability has a published fix and affects a widely-used image metadata processing library.

Information Disclosure Integer Overflow Libexif
NVD GitHub VulDB
CVE-2026-3084
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2026-3084 is an integer underflow vulnerability in GStreamer's H.266 codec parser that allows remote code execution when processing malicious media files. The vulnerability affects all versions of GStreamer (CPE indicates wildcard versioning) and can be exploited through user interaction with specially crafted H.266 video content, allowing attackers to execute arbitrary code in the context of the application. No active exploitation (not in KEV) or public POC has been reported, and the relatively high CVSS score (7.8) is tempered by the local attack vector and user interaction requirement.

RCE Integer Overflow Gstreamer
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy