CWE-120: Buffer Copy without Size Check
The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Yearly Trend
Top Affected Vendors
All Buffer Copy without Size Check CVEs (1,240)
CVE-2020-4701 is a buffer overflow vulnerability in IBM DB2 that allows a local attacker to execute arbitrary code with root privileges. This affects ...
Nov 19, 2020This CVE describes a buffer overflow vulnerability in Qualcomm Snapdragon chipsets where improper API usage during UIE initialization could allow memo...
Nov 2, 2020A buffer overflow vulnerability in Pulse Secure Desktop Client for Linux versions before 9.1R9 allows local attackers to execute arbitrary code with e...
Oct 28, 2020This vulnerability allows attackers to execute arbitrary code on Verifone VerixV Pinpad Payment Terminals by exploiting a buffer overflow in the Run s...
Oct 23, 2020This vulnerability allows attackers to execute arbitrary code or crash applications by tricking users into opening malicious USD (Universal Scene Desc...
Oct 22, 2020This CVE describes a buffer overflow vulnerability in Apple's USD file processing that could allow arbitrary code execution when opening malicious fil...
Oct 22, 2020This CVE describes a buffer overflow vulnerability in Apple's USD file processing that could allow arbitrary code execution. Attackers can exploit thi...
Oct 22, 2020A buffer overflow vulnerability in LibRaw's GetNormalizedModel function allows attackers to execute arbitrary code by providing specially crafted imag...
Sep 16, 2020GnuPG 2.2.21-2.2.22 has a buffer overflow vulnerability when processing OpenPGP keys with AEAD preferences. An attacker can cause a crash or potential...
Sep 3, 2020This CVE describes a buffer overflow vulnerability in Adobe Acrobat and Reader that could allow attackers to execute arbitrary code on affected system...
Aug 19, 2020This CVE describes a buffer overflow vulnerability in Adobe Acrobat and Reader that could allow attackers to execute arbitrary code on affected system...
Aug 19, 2020This CVE describes a buffer overflow vulnerability in Adobe Acrobat and Reader that could allow attackers to execute arbitrary code on affected system...
Aug 19, 2020CVE-2020-8729 is a buffer overflow vulnerability in Intel server firmware that allows authenticated local attackers to execute arbitrary code with ele...
Aug 13, 2020A buffer overflow vulnerability in Intel Server Boards, Server Systems, and Compute Modules allows authenticated local attackers to potentially escala...
Aug 13, 2020This CVE describes a buffer copy without checking size of input vulnerability in Qualcomm Snapdragon chipsets. It allows attackers to cause device mis...
Jul 30, 2020This CVE describes a buffer overflow vulnerability in IBM DB2 database software that allows a local attacker to execute arbitrary code with root privi...
Jul 1, 2020This is a buffer overflow vulnerability in Qualcomm Snapdragon chipsets that occurs when querying DSP capabilities. Attackers could exploit this to ex...
Jun 2, 2020This vulnerability allows authenticated remote attackers with VPN access to cause Cisco ASA/FTD devices to crash and reload by sending specially craft...
Mar 4, 2026This vulnerability in IEIT NF5280M6 server UEFI firmware allows attackers with local NVRAM variable access to exploit a pool overflow via improper gRT...
Apr 29, 2024CVE-2023-49287 is a buffer overflow vulnerability in TinyDir's tinydir_file_open() function that could allow attackers to execute arbitrary code or cr...
Dec 4, 2023CVE-2025-9557 is a buffer overflow vulnerability in Zephyr RTOS that allows attackers to write beyond allocated memory boundaries. This can lead to ar...
Nov 26, 2025CVE-2025-9558 is a buffer overflow vulnerability in Zephyr RTOS's Bluetooth provisioning code that allows attackers to write data beyond allocated mem...
Nov 26, 2025A buffer overflow vulnerability exists in the Zephyr RTOS IEEE 802.15.4 nRF 15.4 driver, allowing attackers to execute arbitrary code or cause denial ...
Oct 13, 2023A buffer overflow vulnerability exists in the Zephyr RTOS CAN bus subsystem, allowing attackers to execute arbitrary code or cause denial of service. ...
Oct 6, 2023This vulnerability allows remote attackers to execute arbitrary code on affected Samsung mobile devices via a crafted 5G network message. It affects S...
Mar 13, 2023A buffer overflow vulnerability in the RTSP server component of Eufy Indoor 2K Indoor Camera allows local attackers to execute arbitrary code remotely...
May 31, 2022This vulnerability allows an authenticated attacker to trigger a buffer overflow on NETGEAR R8000 routers. It affects users with administrative access...
Dec 26, 2021This vulnerability allows attackers with physical access to NCR SelfServ ATMs to inject malicious payloads via USB HID communications to the currency ...
Aug 21, 2020CVE-2019-25353 is a buffer overflow vulnerability in Foscam Video Management System that allows attackers to cause denial of service by sending a spec...
Feb 18, 2026CVE-2019-25349 is a buffer overflow vulnerability in ScadaApp for iOS that allows attackers to cause a denial of service by crashing the application. ...
Feb 18, 2026CVE-2025-69807 is a buffer overflow vulnerability in p2r3 Bareiron that allows unauthenticated remote attackers to send specially crafted packets to c...
Feb 12, 2026CVE-2020-37213 is a buffer overflow vulnerability in TextCrawler Pro that allows attackers to cause denial of service by crashing the application. Att...
Feb 11, 2026CVE-2020-37209 is a buffer overflow vulnerability in SpotFTP 3.0.0.0 that allows attackers to crash the application by entering a 1000-character paylo...
Feb 11, 2026CVE-2020-37210 is a buffer overflow vulnerability in SpotIE 2.9.5 that allows attackers to cause denial of service by crashing the application. Attack...
Feb 11, 2026SpotMSN 2.4.6 contains a buffer overflow vulnerability in the registration name field that allows attackers to crash the application by inputting a 10...
Feb 11, 2026NetworkSleuth 3.0.0.0 contains a buffer overflow vulnerability in the registration key validation that allows attackers to crash the application by su...
Feb 11, 2026RemShutdown 2.9.0.0 contains a buffer overflow vulnerability in its registration key input field that allows attackers to crash the application via de...
Feb 11, 2026CVE-2020-37205 is a buffer overflow vulnerability in RemShutdown 2.9.0.0 that allows attackers to crash the application by sending overly long input t...
Feb 11, 2026CVE-2020-37207 is a buffer overflow vulnerability in SpotDialup's registration key field that allows attackers to crash the application by pasting a 1...
Feb 11, 2026CVE-2020-37197 is a buffer overflow vulnerability in Dnss Domain Name Search Software that allows attackers to cause denial of service by crashing the...
Feb 11, 2026NBMonitor 1.6.6.0 contains a buffer overflow vulnerability in its registration key input field that allows attackers to crash the application by pasti...
Feb 11, 2026CVE-2020-37191 is a buffer overflow vulnerability in Top Password Software Dialup Password Recovery 1.30 that allows attackers to crash the applicatio...
Feb 11, 2026CVE-2020-37193 is a denial of service vulnerability in ZIP Password Recovery 2.30 where attackers can crash the application by providing a specially c...
Feb 11, 2026BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration name input field that allows attackers to crash the application via d...
Feb 11, 2026CVE-2020-37185 is a buffer overflow vulnerability in Backup Key Recovery 2.2.5 that allows attackers to crash the application by sending overly long i...
Feb 11, 2026CVE-2020-37188 is a buffer overflow vulnerability in SpotOutlook 1.2.6 that allows attackers to cause denial of service by crashing the application. A...
Feb 11, 2026TaskCanvas 1.4.0 contains a buffer overflow vulnerability in the registration code input field that allows attackers to cause denial of service by cra...
Feb 11, 2026CVE-2020-37180 is a denial of service vulnerability in GTalk Password Finder 2.2.1 where attackers can crash the application by supplying an oversized...
Feb 11, 2026A NULL pointer dereference vulnerability in Trend Micro Apex Central allows remote attackers to cause denial-of-service without authentication. This a...
Jan 8, 2026An out-of-bounds read vulnerability in Trend Micro Apex Central allows remote attackers to cause denial-of-service conditions without authentication. ...
Jan 8, 2026About Buffer Copy without Size Check (CWE-120)
The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Our database tracks 1,240 CVEs classified as CWE-120, with 393 rated critical and 677 rated high severity. The average CVSS score for Buffer Copy without Size Check vulnerabilities is 8.2.
External reference: View CWE-120 on MITRE CWE →
Monitor Buffer Copy without Size Check Vulnerabilities
Get alerted when new Buffer Copy without Size Check CVEs affect your infrastructure.
Start Monitoring Free