You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
A high severity vulnerability has been discovered in your project.
Project Name: tesTrivy1
Scanner Name: trivy
Cwe ID: 190
Cwe Name: Integer Overflow of Wraparound
Cwe Link: https://cwe.mitre.org/data/definitions/190.html
CVE ID: CVE-2022-22827
Target: kondukto/nodejsscan:v0.2.8 (debian 10.10)
Packages:
References:
Training(Secure Code Warrior):
Name: Integer Overflow or Wraparound
Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Link: https://portal.securecodewarrior.com/?utm_source=partner-integration:kondukto#/website-trial/web/memory/integer
Videos:
Tool Description: storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Custom Description: sdaadadad
The text was updated successfully, but these errors were encountered: