CWE-680: CWE-680
Yearly Trend
Top Affected Vendors
All CWE-680 CVEs (40)
An integer overflow vulnerability in ExecuTorch model loading causes insufficient memory allocation, potentially leading to heap corruption and arbitr...
Aug 8, 2025CVE-2024-33078 is a critical buffer overflow vulnerability in Tencent Libpag v4.3 that allows remote code execution when processing crafted images. Th...
May 1, 2024This vulnerability allows remote code execution in Genivia gSOAP's WS-Addressing plugin. Attackers can exploit it by sending a specially crafted SOAP ...
Mar 25, 2021A remote code execution vulnerability exists in the WS-Addressing plugin of Genivia gSOAP 2.8.107. Attackers can exploit this by sending a specially c...
Feb 10, 2021A memory corruption vulnerability in the SAIL Image Decoding Library's WebP animation decoder allows remote code execution via specially crafted .webp...
Aug 25, 2025A memory corruption vulnerability in SAIL Image Decoding Library's BMPv3 palette decoding allows remote code execution when processing malicious .bmp ...
Aug 25, 2025A memory corruption vulnerability in SAIL Image Decoding Library's BMPv3 decoder allows remote code execution via specially crafted BMP files. When th...
Aug 25, 2025This integer overflow vulnerability in GPAC's MPEG-4 decoder allows heap-based buffer overflow via specially crafted video files. Attackers can achiev...
Aug 25, 2021This vulnerability allows remote code execution through a specially crafted MPEG-4 video file. Attackers can exploit an integer overflow in GPAC's MPE...
Aug 25, 2021An integer overflow vulnerability in GPAC's MPEG-4 decoder allows heap-based buffer overflow via specially crafted video files. Attackers can exploit ...
Aug 25, 2021This vulnerability allows remote code execution through a specially crafted MPEG-4 video file. Attackers can exploit it by tricking users into opening...
Aug 25, 2021This vulnerability allows remote code execution through integer truncation in GPAC's MPEG-4 decoder. Attackers can exploit it by tricking users into o...
Aug 18, 2021This vulnerability allows remote code execution through integer overflow in GPAC's MPEG-4 decoder. Attackers can exploit it by tricking users into ope...
Aug 18, 2021CVE-2021-21858 is an integer overflow vulnerability in GPAC's MPEG-4 decoder that can lead to heap-based buffer overflow and memory corruption when pr...
Aug 18, 2021This vulnerability allows attackers to execute arbitrary code or cause denial of service by tricking users into opening specially crafted MPEG-4 video...
Aug 18, 2021This vulnerability allows attackers to execute arbitrary code or cause denial of service by tricking users into opening specially crafted MPEG-4 video...
Aug 18, 2021This vulnerability allows remote code execution through a heap-based buffer overflow in the GPAC library's MPEG-4 decoder. Attackers can exploit it by...
Aug 18, 2021This vulnerability allows remote code execution through a heap-based buffer overflow in GPAC's MPEG-4 decoder. Attackers can exploit it by tricking us...
Aug 18, 2021This vulnerability allows remote code execution through a heap-based buffer overflow in the GPAC library's MPEG-4 decoder. Attackers can exploit it by...
Aug 18, 2021This vulnerability allows attackers to execute arbitrary code or cause denial of service by tricking users into opening specially crafted MPEG-4 video...
Aug 18, 2021An integer truncation vulnerability in GPAC's MPEG-4 decoder allows memory corruption when processing specially crafted video files. Attackers can exp...
Aug 16, 2021CVE-2021-21861 is an integer truncation vulnerability in GPAC's MPEG-4 decoder that allows heap-based buffer overflow via specially crafted video file...
Aug 16, 2021An unauthenticated remote attacker can exploit a buffer overflow vulnerability in Cisco ASA and FTD web services by sending a crafted HTTP request. Th...
Aug 14, 2025This vulnerability allows remote code execution on Amazon Kindle e-readers through a crafted PDF file. An attacker can exploit an integer overflow in ...
Sep 1, 2021A heap buffer overflow vulnerability in xls2csv utility version 0.95 allows memory corruption when processing specially crafted Excel files. Attackers...
Jun 2, 2025This vulnerability allows memory corruption in the High-Level Operating System (HLOS) when user-space applications make specific IOCTL calls to Qualco...
Dec 5, 2023This vulnerability allows attackers to execute arbitrary code or cause denial of service on affected Qualcomm WLAN chipsets due to memory corruption d...
Mar 10, 2023This vulnerability allows memory corruption while loading ELF segments in the Trusted Execution Environment (TEE) kernel. Attackers could potentially ...
Dec 5, 2023This vulnerability allows memory corruption in Qualcomm chipsets when processing packet mapping information with invalid header payload sizes. Attacke...
Apr 7, 2025This vulnerability allows memory corruption in Qualcomm's User Identity Module due to an integer overflow that leads to buffer overflow when processin...
Feb 12, 2023This vulnerability allows remote code execution through a heap buffer overflow when Graphisoft BIMx Desktop Viewer parses malicious files. Attackers c...
Apr 18, 2022This vulnerability in the Bytes library allows integer overflow in the BytesMut::reserve function, which can cause memory corruption and out-of-bounds...
Feb 4, 2026A buffer overflow vulnerability in the codec module could allow attackers to crash affected systems, potentially causing denial of service. This affec...
Apr 7, 2025This vulnerability in Automotive Telematics systems allows attackers to cause a Denial of Service (DoS) by sending specially crafted messages that tri...
Apr 1, 2024This CVE describes an integer underflow vulnerability in Zephyr's IEEE 802.15.4 fragment reassembly header removal code. When exploited, it can lead t...
Oct 12, 2021CVE-2021-32625 is an integer overflow vulnerability in Redis versions 6.0+ that allows remote attackers to corrupt heap memory via the STRALGO LCS com...
Jun 2, 2021An integer overflow vulnerability in the glTF model loading component of a 3D engine module allows attackers to cause denial of service by crashing th...
Jan 8, 2025This CVE describes a memory corruption vulnerability in Redis hyperloglog operations that allows authenticated users to trigger out-of-bounds writes. ...
Jul 7, 2025This CVE describes an out-of-bounds write vulnerability in a file system module that could allow attackers to write data beyond allocated memory bound...
Feb 6, 2026The bson_strfreev function in MongoDB's C driver library contains an integer overflow vulnerability that can cause memory corruption when freeing memo...
Jul 2, 2024About CWE-680 (CWE-680)
Our database tracks 40 CVEs classified as CWE-680, with 4 rated critical and 34 rated high severity. The average CVSS score for CWE-680 vulnerabilities is 8.3.
External reference: View CWE-680 on MITRE CWE →
Monitor CWE-680 Vulnerabilities
Get alerted when new CWE-680 CVEs affect your infrastructure.
Start Monitoring Free