CWE-787: Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Yearly Trend
Top Affected Vendors
All Out-of-bounds Write CVEs (3,377)
This vulnerability allows local privilege escalation on Android devices through an out-of-bounds write in the Bluetooth GATT server component. An atta...
May 14, 2020This vulnerability allows local privilege escalation on Android devices through an out-of-bounds write in the ExifUtils library. Attackers can exploit...
May 14, 2020This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows remote attackers to execute arbitrary code through memory corruption when vict...
May 14, 2020CVE-2020-4288 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows remote code execution. An attacker can ex...
May 14, 2020CVE-2020-4343 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform that allows remote code execution. Attackers can exploit it...
May 14, 2020CVE-2020-4422 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows remote code execution. Attackers can expl...
May 14, 2020CVE-2020-4468 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform that allows remote code execution. Attackers can exploit it...
May 14, 2020CVE-2020-4257 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows local attackers to execute arbitrary code...
May 14, 2020This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows a local attacker to execute arbitrary code through memory corruption. By trick...
May 14, 2020This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows a local attacker to execute arbitrary code through memory corruption. By trick...
May 14, 2020This vulnerability in Samsung's Quram image codec library allows attackers to execute arbitrary code by sending specially crafted JPEG images. When pr...
May 11, 2020This vulnerability allows remote attackers to execute arbitrary code by exploiting a memory corruption flaw in Foxit PhantomPDF's handling of U3D obje...
Apr 22, 2020This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...
Apr 22, 2020CVE-2020-0078 is an out-of-bounds write vulnerability in Android's DRM framework that allows local privilege escalation without user interaction. Atta...
Apr 17, 2020A heap overflow vulnerability in Autodesk FBX-SDK versions 2019.2 and earlier allows attackers to execute arbitrary code on affected systems. This aff...
Apr 17, 2020This vulnerability allows remote code execution through specially crafted Adobe Type 1 PostScript fonts. Attackers can exploit improper handling in Wi...
Apr 15, 2020This vulnerability allows a malicious application to exploit memory corruption issues to execute arbitrary code with kernel privileges. It affects App...
Apr 1, 2020Adobe Bridge 10.0 contains an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on affected systems. This affects...
Mar 25, 2020This CVE describes a heap overflow vulnerability in the knox_kap driver on Samsung mobile devices running Android 9.0 (Pie). The vulnerability allows ...
Mar 24, 2020This CVE describes a stack overflow vulnerability in Wi-Fi kernel drivers on Samsung mobile devices with Android 9.0 (Pie) using Exynos chipsets. Succ...
Mar 24, 2020This is a stack buffer overflow vulnerability in the iocheckd service of WAGO PFC 200 industrial controllers. An attacker can send specially crafted p...
Mar 12, 2020This is a stack buffer overflow vulnerability in the iocheckd service of WAGO PFC 200 industrial controllers. An attacker can send specially crafted p...
Mar 12, 2020This vulnerability allows remote code execution on WAGO PFC 200 devices through a stack buffer overflow in the iocheckd service. Attackers can exploit...
Mar 11, 2020This vulnerability allows local privilege escalation on Android devices through a heap buffer overflow in the DRM plugin. Attackers can exploit this w...
Mar 10, 2020CVE-2020-0069 is a local privilege escalation vulnerability in MediaTek Command Queue driver ioctl handlers on Android devices. It allows attackers to...
Mar 10, 2020This CVE describes a buffer overflow vulnerability in Qualcomm Snapdragon chipsets affecting 32-bit architectures. An attacker could execute arbitrary...
Mar 5, 2020This CVE describes a stack buffer overflow vulnerability in Qualcomm Snapdragon hardware accelerated effects due to a misplaced instance ID in the mak...
Mar 5, 2020CVE-2020-3845 is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with system privileges. This affects ...
Feb 27, 2020CVE-2020-3858 is a memory corruption vulnerability in iOS and iPadOS that allows malicious applications to execute arbitrary code with kernel privileg...
Feb 27, 2020This memory corruption vulnerability in Apple watchOS allows malicious applications to execute arbitrary code with kernel privileges, potentially taki...
Feb 27, 2020This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...
Feb 27, 2020This is a memory corruption vulnerability (CWE-787) in Apple operating systems that allows an application to execute arbitrary code with kernel privil...
Feb 27, 2020CVE-2020-9005 is a memory corruption vulnerability in Valve Dota 2's meshsystem.dll that allows remote attackers to execute arbitrary code or cause de...
Feb 17, 2020This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JPG2000 image files in Foxit Reader. Att...
Feb 14, 2020CVE-2020-8850 is a remote code execution vulnerability in Foxit Reader that allows attackers to execute arbitrary code by tricking users into opening ...
Feb 14, 2020This vulnerability in Foxit PhantomPDF allows remote attackers to execute arbitrary code by tricking users into opening malicious HTML files or visiti...
Feb 14, 2020This vulnerability allows remote attackers to execute arbitrary code on affected Foxit PhantomPDF installations by tricking users into opening malicio...
Feb 8, 2020CVE-2014-8140 is a heap-based buffer overflow vulnerability in Info-ZIP UnZip that allows remote attackers to execute arbitrary code by tricking users...
Jan 31, 2020This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...
Jan 29, 2020This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...
Jan 29, 2020This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...
Jan 29, 2020This CVE describes a stack-based buffer overflow vulnerability in Sudo when the pwfeedback option is enabled. Attackers can exploit this by providing ...
Jan 29, 2020CVE-2020-7951 is a memory corruption vulnerability in Valve Dota 2's meshsystem.dll that allows remote attackers to execute arbitrary code or cause de...
Jan 27, 2020This vulnerability in GNU Coreutils' sort utility allows attackers to trigger a heap-based buffer overflow via specially crafted long UTF-8 strings. T...
Jan 24, 2020This vulnerability allows attackers to execute arbitrary code on systems running vulnerable Microsoft Office software by exploiting memory corruption ...
Jan 14, 2020CVE-2013-5656 is a local buffer overflow vulnerability in FuzeZip 1.0.0.131625 that allows attackers to execute arbitrary code by exploiting improper ...
Jan 7, 2020This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of XnView. Attackers can exploit it by tri...
Jan 2, 2020CVE-2013-3246 is a stack-based buffer overflow vulnerability in XnView's xnview.exe that allows remote attackers to execute arbitrary code by crafting...
Jan 2, 2020This vulnerability allows user-assisted attackers to execute arbitrary code through multiple stack-based buffer overflows in Toshiba ConfigFree Utilit...
Dec 27, 2019A heap-based buffer overflow in virglrenderer's vrend_renderer_transfer_write_iov function allows guest OS users to cause denial of service or potenti...
Dec 23, 2019About Out-of-bounds Write (CWE-787)
The product writes data past the end, or before the beginning, of the intended buffer.
Our database tracks 3,377 CVEs classified as CWE-787, with 842 rated critical and 2,322 rated high severity. The average CVSS score for Out-of-bounds Write vulnerabilities is 8.3.
External reference: View CWE-787 on MITRE CWE →
Monitor Out-of-bounds Write Vulnerabilities
Get alerted when new Out-of-bounds Write CVEs affect your infrastructure.
Start Monitoring Free