CWE-119: Buffer Overflow
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Yearly Trend
Top Affected Vendors
All Buffer Overflow CVEs (1,187)
A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects wat...
Feb 11, 2026This CVE describes a buffer overlap vulnerability in iccDEV's CIccTagMultiProcessElement::Apply() function where SrcPixel and DestPixel stack buffers ...
Feb 6, 2026This vulnerability in iccDEV allows attackers to trigger an out-of-bounds read by providing a malformed ICC color profile. This can lead to memory dis...
Feb 4, 2026A heap buffer overflow vulnerability in iccDEV's CIccIO::WriteUInt16Float() function allows attackers to cause denial of service or potentially execut...
Feb 4, 2026A heap buffer overflow vulnerability exists in iccDEV's CIccFileIO::Read8() function when processing malformed ICC profile files. This allows attacker...
Feb 4, 2026A stack-buffer-overflow vulnerability in iccDEV's CIccTagFloatNum::GetValues() function allows memory corruption when processing malformed ICC color p...
Feb 4, 2026CVE-2026-1260 is an invalid memory access vulnerability in Sentencepiece versions before 0.2.1 that occurs when processing specially crafted model fil...
Jan 22, 2026This vulnerability allows malicious apps to corrupt coprocessor memory on Apple iOS and iPadOS devices. It affects users running iOS/iPadOS versions b...
Jan 16, 2026CVE-2025-12771 is a stack-based buffer overflow vulnerability in IBM Concert versions 1.0.0 through 2.1.0. A local authenticated user could exploit th...
Dec 26, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of pdfforge PDF Architect by tricking user...
Dec 23, 2025A stack-based buffer overflow vulnerability exists in the Nixdorf Wincor PORT IO Driver's IOCTL handler (wnport.sys). This allows local attackers to e...
Oct 18, 2025This memory corruption vulnerability in macOS audio file processing allows attackers to execute arbitrary code or cause denial of service by tricking ...
Jul 30, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running IrfanView with the CADImage plugin when users open malicious D...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Att...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plug...
Jul 21, 2025A critical memory corruption vulnerability in RT-Thread's device driver functions allows local attackers to potentially execute arbitrary code or cras...
Jun 26, 2025A memory buffer overflow vulnerability in Arm GPU drivers allows non-privileged user processes to access memory outside allocated bounds via GPU opera...
Jun 2, 2025A memory corruption vulnerability in Simcenter Femap allows attackers to execute arbitrary code by tricking users into opening malicious .NEU files. T...
Mar 13, 2025A buffer overflow vulnerability in X.Org and Xwayland allows attackers to execute arbitrary code or cause denial of service by exploiting improper mem...
Feb 25, 2025This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 programming software installations. Attackers can ...
Jan 30, 2025This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 programming software installations by tricking use...
Jan 30, 2025About Buffer Overflow (CWE-119)
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Our database tracks 1,187 CVEs classified as CWE-119, with 134 rated critical and 863 rated high severity. The average CVSS score for Buffer Overflow vulnerabilities is 8.0.
External reference: View CWE-119 on MITRE CWE →
Monitor Buffer Overflow Vulnerabilities
Get alerted when new Buffer Overflow CVEs affect your infrastructure.
Start Monitoring Free