CWE-119: Buffer Overflow
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Yearly Trend
Top Affected Vendors
All Buffer Overflow CVEs (1,189)
This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 programming software installations. Attackers can ...
Jan 30, 2025This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 programming software installations by tricking use...
Jan 30, 2025This vulnerability allows remote attackers to execute arbitrary code on Luxion KeyShot Viewer installations by tricking users into opening malicious K...
Jan 13, 2025This vulnerability allows local attackers to cause memory corruption in WLAN drivers by sending specially crafted IOCTL calls. It affects devices usin...
Dec 2, 2024This vulnerability allows memory corruption when user-space applications make IOCTL calls to read WLAN diagnostic information. Attackers could potenti...
Dec 2, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files in Tungsten Automation Power P...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Trimble SketchUp Viewer. At...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. The memory corru...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView when users open malicious DWG...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. The memory corru...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ac...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files in IrfanView. The flaw exists ...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious RLE files in IrfanView. Attackers can ga...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView. Attackers can exploit this b...
Nov 22, 2024A memory corruption vulnerability in Autodesk AutoCAD allows attackers to execute arbitrary code by tricking users into opening malicious SLDPRT files...
Oct 29, 2024This vulnerability allows attackers to exploit a memory corruption flaw in AutoCAD by tricking users into opening malicious DWG files. Successful expl...
Oct 29, 2024A memory corruption vulnerability in Autodesk AutoCAD's ACTranslators.exe allows attackers to execute arbitrary code by tricking users into opening ma...
Oct 29, 2024A memory corruption vulnerability in Simcenter Femap allows attackers to execute arbitrary code by tricking users into opening malicious BDF files. Th...
Oct 8, 2024This vulnerability allows memory corruption when parsing specially crafted WRL files in Siemens Teamcenter Visualization and Tecnomatix Plant Simulati...
Oct 8, 2024This vulnerability allows memory corruption when parsing malicious WRL files in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation softw...
Oct 8, 2024This vulnerability allows remote code execution through memory corruption when parsing malicious WRL files in Siemens Teamcenter Visualization and Tec...
Oct 8, 2024This vulnerability allows memory corruption in Qualcomm's keymaster component when importing shared keys, potentially leading to arbitrary code execut...
Aug 5, 2024This CVE describes a memory buffer overflow vulnerability in Arm's Valhall and 5th Gen GPU firmware that allows a local non-privileged user to perform...
Jul 1, 2024This CVE describes an out-of-bounds memory access vulnerability in multiple Apple operating systems that could allow a remote attacker to crash applic...
Jun 10, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Kofax Power PDF by tricking users into ...
Jun 6, 2024This vulnerability allows a malicious OS attacker to corrupt arbitrary SMRAM memory through the SMI handler in Huawei Matebook D16's ThisiServicesSmm ...
May 28, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious J2K files in Kofax Power PDF. Attackers ...
May 3, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of PDF-XChange Editor by tricking users in...
May 3, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 files in PDF-XChange Editor. The fla...
May 3, 2024This vulnerability in Kofax Power PDF allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw e...
May 3, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PCX files in Kofax Power PDF. The flaw e...
May 3, 2024This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's SCMI (System Control and Management Interface) reset domains sub...
Apr 28, 2024A use-after-free vulnerability in the Linux kernel's i915 graphics driver allows local attackers to cause a kernel panic (denial of service) or potent...
Apr 28, 2024A vulnerability in the Linux kernel's BPF subsystem allows integer overflow during hashtable bucket calculation on 32-bit architectures. This can lead...
Apr 17, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files in Kofax Power PDF. The flaw e...
Apr 3, 2024This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's PWM (Pulse Width Modulation) subsystem. When args->args_count eq...
Feb 23, 2024This CVE describes a buffer overflow vulnerability in the Linux kernel's EDAC driver for ThunderX processors. The bug occurs when strncat() is incorre...
Feb 23, 2024A directory entry corruption vulnerability in the Linux kernel's F2FS filesystem allows attackers to corrupt directory structures during rename operat...
Feb 22, 2024A memory access vulnerability in the Linux kernel's BPF JIT compiler for LoongArch architecture allows out-of-bounds memory access when processing lar...
Feb 22, 2024A buffer overflow vulnerability in the Linux kernel's ksmbd component allows attackers to overflow session key buffers during NTLMSSP authentication. ...
Feb 21, 2024This AMD Secure Processor vulnerability allows a malicious Trusted Application (TA) to read from or write to the ASP Secure OS kernel virtual address ...
Feb 13, 2024A memory corruption vulnerability in Simcenter Femap allows attackers to execute arbitrary code by tricking users into opening malicious Catia MODEL f...
Feb 13, 2024This is a memory corruption vulnerability in macOS that could allow an attacker to execute arbitrary code or cause application crashes by processing a...
Jan 23, 2024CVE-2023-51257 is an invalid memory write vulnerability in Jasper-Software Jasper v4.1.1 and earlier that allows local attackers to execute arbitrary ...
Jan 16, 2024About Buffer Overflow (CWE-119)
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Our database tracks 1,189 CVEs classified as CWE-119, with 135 rated critical and 864 rated high severity. The average CVSS score for Buffer Overflow vulnerabilities is 8.0.
External reference: View CWE-119 on MITRE CWE →
Monitor Buffer Overflow Vulnerabilities
Get alerted when new Buffer Overflow CVEs affect your infrastructure.
Start Monitoring Free