CWE-787: Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Yearly Trend
Top Affected Vendors
All Out-of-bounds Write CVEs (3,377)
This vulnerability in Android 11 allows local privilege escalation through an out-of-bounds write in the RW_SendRawFrame function. Attackers can gain ...
Dec 15, 2020This CVE describes a heap buffer overflow vulnerability in Android's NFC stack that allows local privilege escalation. An attacker could exploit this ...
Dec 15, 2020CVE-2020-27905 is a memory corruption vulnerability in Apple's iOS, iPadOS, tvOS, and watchOS that allows a malicious application to execute arbitrary...
Dec 8, 2020CVE-2020-27916 is an out-of-bounds write vulnerability in Apple's audio file processing that could allow arbitrary code execution when processing mali...
Dec 8, 2020CVE-2020-27930 is a memory corruption vulnerability in Apple's font processing that allows arbitrary code execution when processing malicious fonts. A...
Dec 8, 2020CVE-2020-10017 is an out-of-bounds write vulnerability in Apple's audio file processing that could allow arbitrary code execution when a malicious aud...
Dec 8, 2020This CVE describes a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privi...
Dec 8, 2020This CVE describes a buffer overflow vulnerability in the dlt-daemon component of GENIVI Diagnostic Log and Trace. The flaw allows arbitrary code exec...
Nov 30, 2020This vulnerability in PDFResurrect before version 0.20 allows attackers to cause a heap buffer overflow via specially crafted PDF files due to insuffi...
Nov 20, 2020This CVE describes a stack-based buffer overflow vulnerability in ImageMagick's XPM image processing function. Attackers can exploit this by crafting ...
Nov 20, 2020This vulnerability allows remote code execution through an out-of-bounds write when a malicious configuration file is imported into IGSS Definition so...
Nov 19, 2020This vulnerability allows remote code execution through an out-of-bounds write when a malicious CGF file is imported into IGSS Definition software. At...
Nov 19, 2020This vulnerability allows remote code execution through an out-of-bounds write in Schneider Electric's IGSS Definition software. Attackers can exploit...
Nov 19, 2020This CVE describes a buffer overflow/underflow vulnerability in Qualcomm Snapdragon chipsets where improper type casting leads to memory corruption. I...
Nov 12, 2020This vulnerability allows out-of-bounds memory access in Qualcomm Snapdragon MHI command processing due to insufficient validation of channel ID value...
Nov 2, 2020This vulnerability in IBM i2 Analyst Notebook allows local attackers to execute arbitrary code through memory corruption when a victim opens a special...
Oct 29, 2020This vulnerability in IBM i2 Analyst Notebook allows local attackers to execute arbitrary code through memory corruption when a victim opens a special...
Oct 29, 2020This is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with kernel privileges. It affects macOS High ...
Oct 27, 2020This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Oct 27, 2020This memory corruption vulnerability in Apple operating systems allows malicious applications to execute arbitrary code with system privileges. It aff...
Oct 27, 2020CVE-2019-8776 is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with system privileges. This affects ...
Oct 27, 2020This memory corruption vulnerability in macOS allows malicious applications to execute arbitrary code with kernel privileges, potentially taking full ...
Oct 27, 2020This memory corruption vulnerability in Apple's iOS, iPadOS, watchOS, and tvOS allows malicious applications to execute arbitrary code with kernel pri...
Oct 27, 2020This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Oct 27, 2020This macOS kernel vulnerability allows malicious applications to execute arbitrary code with kernel privileges through memory corruption. It affects m...
Oct 22, 2020CVE-2020-9937 is an out-of-bounds write vulnerability in Apple's image processing components that could allow arbitrary code execution when processing...
Oct 22, 2020This is a memory corruption vulnerability in Apple's iOS, iPadOS, macOS, tvOS, and watchOS that allows an application to execute arbitrary code with k...
Oct 22, 2020This CVE describes a buffer overflow vulnerability in Apple's image processing components across multiple platforms. Attackers can exploit it by craft...
Oct 22, 2020This vulnerability allows arbitrary code execution on macOS systems by viewing a malicious JPEG file. Attackers can exploit memory corruption in the i...
Oct 22, 2020This vulnerability allows arbitrary code execution by processing a maliciously crafted image due to an out-of-bounds write memory corruption issue. It...
Oct 22, 2020CVE-2020-24411 is an out-of-bounds write vulnerability in Adobe Illustrator that allows arbitrary code execution when processing malicious PDF files. ...
Oct 20, 2020CVE-2020-16915 is a memory corruption vulnerability in Windows Media Foundation that allows attackers to execute arbitrary code with full user rights....
Oct 16, 2020CVE-2020-9936 is an out-of-bounds write vulnerability in Apple's image processing components, allowing arbitrary code execution when a malicious image...
Oct 16, 2020CVE-2020-9907 is a memory corruption vulnerability in Apple iOS, iPadOS, and tvOS that allows malicious applications to execute arbitrary code with ke...
Oct 16, 2020This vulnerability allows attackers to execute arbitrary code by tricking users into processing a malicious audio file. It affects Apple devices runni...
Oct 16, 2020This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...
Oct 13, 2020This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JPEG2000 images in Foxit Reader. Attacke...
Oct 13, 2020This CVE describes a buffer overflow vulnerability in HUAWEI P30 Pro smartphones. An attacker who has already obtained root permissions can send speci...
Oct 12, 2020This vulnerability in NVIDIA Windows GPU Display Driver allows attackers to execute arbitrary code or cause denial of service through specially crafte...
Oct 2, 2020This vulnerability in the MSI AmbientLink MsIo64 driver allows local attackers to execute arbitrary code with kernel privileges via buffer overflow in...
Oct 2, 2020This CVE describes an out-of-bounds write vulnerability in Android's NFC stack that could allow local privilege escalation. Attackers could gain Syste...
Sep 18, 2020This vulnerability in Android's hwservicemanager allows local privilege escalation through an out-of-bounds write caused by freeing a wild pointer. At...
Sep 18, 2020This vulnerability in Android's libmpeg2dec library allows an out-of-bounds write due to missing bounds checks. An attacker could potentially escalate...
Sep 17, 2020This vulnerability in cryptsetup's LUKS2 validation code allows an attacker to craft a malicious LUKS2 container that triggers a heap-based buffer ove...
Sep 16, 2020This vulnerability allows remote attackers to cause heap corruption in Kingsoft WPS Office by embedding a specially crafted PNG image with a malicious...
Sep 13, 2020This is a remote code execution vulnerability in the Windows Camera Codec Pack that allows attackers to run arbitrary code by tricking users into open...
Sep 11, 2020CVE-2020-24999 is an invalid memory access vulnerability in Xpdf's fprintf function that can be triggered by processing a malicious PDF file. This all...
Sep 3, 2020This vulnerability allows a local attacker to execute a stack-based buffer overflow in IBM Sterling Connect:Direct for UNIX, potentially gaining root ...
Aug 24, 2020This vulnerability allows remote attackers to execute arbitrary code by exploiting a memory corruption flaw in Foxit Studio Photo when processing mali...
Aug 20, 2020This CVE describes an out-of-bounds write vulnerability in Adobe Acrobat and Reader that could allow attackers to execute arbitrary code on affected s...
Aug 19, 2020About Out-of-bounds Write (CWE-787)
The product writes data past the end, or before the beginning, of the intended buffer.
Our database tracks 3,377 CVEs classified as CWE-787, with 842 rated critical and 2,322 rated high severity. The average CVSS score for Out-of-bounds Write vulnerabilities is 8.3.
External reference: View CWE-787 on MITRE CWE →
Monitor Out-of-bounds Write Vulnerabilities
Get alerted when new Out-of-bounds Write CVEs affect your infrastructure.
Start Monitoring Free