CWE-787: Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

3,377
Total CVEs
842
Critical
2,322
High
8.3
Avg CVSS
6
In CISA KEV

Yearly Trend

2026
99
2025
520
2024
596
2023
545
2022
364

Top Affected Vendors

1 Google 404
2 Adobe 290
3 Apple 247
4 Linux 232
5 Debian 195
6 Tenda 189
7 Fedoraproject 136
8 Microsoft 89
9 Samsung 78
10 Mozilla 78

All Out-of-bounds Write CVEs (3,377)

CVE-2020-0102
7.8

This vulnerability allows local privilege escalation on Android devices through an out-of-bounds write in the Bluetooth GATT server component. An atta...

May 14, 2020
CVE-2020-0094
7.8

This vulnerability allows local privilege escalation on Android devices through an out-of-bounds write in the ExifUtils library. Attackers can exploit...

May 14, 2020
CVE-2020-4285
7.8

This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows remote attackers to execute arbitrary code through memory corruption when vict...

May 14, 2020
CVE-2020-4288
7.8

CVE-2020-4288 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows remote code execution. An attacker can ex...

May 14, 2020
CVE-2020-4343
7.8

CVE-2020-4343 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform that allows remote code execution. Attackers can exploit it...

May 14, 2020
CVE-2020-4422
7.8

CVE-2020-4422 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows remote code execution. Attackers can expl...

May 14, 2020
CVE-2020-4468
7.8

CVE-2020-4468 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform that allows remote code execution. Attackers can exploit it...

May 14, 2020
CVE-2020-4257
7.8

CVE-2020-4257 is a memory corruption vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 that allows local attackers to execute arbitrary code...

May 14, 2020
CVE-2020-4261
7.8

This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows a local attacker to execute arbitrary code through memory corruption. By trick...

May 14, 2020
CVE-2020-4263
7.8

This vulnerability in IBM i2 Intelligent Analysis Platform 9.2.1 allows a local attacker to execute arbitrary code through memory corruption. By trick...

May 14, 2020
CVE-2020-12751
7.8

This vulnerability in Samsung's Quram image codec library allows attackers to execute arbitrary code by sending specially crafted JPEG images. When pr...

May 11, 2020
CVE-2020-10904
7.8

This vulnerability allows remote attackers to execute arbitrary code by exploiting a memory corruption flaw in Foxit PhantomPDF's handling of U3D obje...

Apr 22, 2020
CVE-2020-10897
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...

Apr 22, 2020
CVE-2020-0078
7.8

CVE-2020-0078 is an out-of-bounds write vulnerability in Android's DRM framework that allows local privilege escalation without user interaction. Atta...

Apr 17, 2020
CVE-2020-7085
7.8

A heap overflow vulnerability in Autodesk FBX-SDK versions 2019.2 and earlier allows attackers to execute arbitrary code on affected systems. This aff...

Apr 17, 2020
CVE-2020-0938
7.8

This vulnerability allows remote code execution through specially crafted Adobe Type 1 PostScript fonts. Attackers can exploit improper handling in Wi...

Apr 15, 2020
CVE-2020-9785
7.8

This vulnerability allows a malicious application to exploit memory corruption issues to execute arbitrary code with kernel privileges. It affects App...

Apr 1, 2020
CVE-2020-9551
7.8

Adobe Bridge 10.0 contains an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on affected systems. This affects...

Mar 25, 2020
CVE-2019-20538
7.8

This CVE describes a heap overflow vulnerability in the knox_kap driver on Samsung mobile devices running Android 9.0 (Pie). The vulnerability allows ...

Mar 24, 2020
CVE-2019-20541
7.8

This CVE describes a stack overflow vulnerability in Wi-Fi kernel drivers on Samsung mobile devices with Android 9.0 (Pie) using Exynos chipsets. Succ...

Mar 24, 2020
CVE-2019-5178
7.8

This is a stack buffer overflow vulnerability in the iocheckd service of WAGO PFC 200 industrial controllers. An attacker can send specially crafted p...

Mar 12, 2020
CVE-2019-5180
7.8

This is a stack buffer overflow vulnerability in the iocheckd service of WAGO PFC 200 industrial controllers. An attacker can send specially crafted p...

Mar 12, 2020
CVE-2019-5166
7.8

This vulnerability allows remote code execution on WAGO PFC 200 devices through a stack buffer overflow in the iocheckd service. Attackers can exploit...

Mar 11, 2020
CVE-2020-0046
7.8

This vulnerability allows local privilege escalation on Android devices through a heap buffer overflow in the DRM plugin. Attackers can exploit this w...

Mar 10, 2020
CVE-2020-0069
7.8

CVE-2020-0069 is a local privilege escalation vulnerability in MediaTek Command Queue driver ioctl handlers on Android devices. It allows attackers to...

Mar 10, 2020
CVE-2019-14050
7.8

This CVE describes a buffer overflow vulnerability in Qualcomm Snapdragon chipsets affecting 32-bit architectures. An attacker could execute arbitrary...

Mar 5, 2020
CVE-2019-10569
7.8

This CVE describes a stack buffer overflow vulnerability in Qualcomm Snapdragon hardware accelerated effects due to a misplaced instance ID in the mak...

Mar 5, 2020
CVE-2020-3845
7.8

CVE-2020-3845 is a memory corruption vulnerability in macOS that allows an application to execute arbitrary code with system privileges. This affects ...

Feb 27, 2020
CVE-2020-3858
7.8

CVE-2020-3858 is a memory corruption vulnerability in iOS and iPadOS that allows malicious applications to execute arbitrary code with kernel privileg...

Feb 27, 2020
CVE-2020-3834
7.8

This memory corruption vulnerability in Apple watchOS allows malicious applications to execute arbitrary code with kernel privileges, potentially taki...

Feb 27, 2020
CVE-2020-3837
7.8

This is a memory corruption vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It a...

Feb 27, 2020
CVE-2020-3842
7.8

This is a memory corruption vulnerability (CWE-787) in Apple operating systems that allows an application to execute arbitrary code with kernel privil...

Feb 27, 2020
CVE-2020-9005
7.8

CVE-2020-9005 is a memory corruption vulnerability in Valve Dota 2's meshsystem.dll that allows remote attackers to execute arbitrary code or cause de...

Feb 17, 2020
CVE-2020-8848
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JPG2000 image files in Foxit Reader. Att...

Feb 14, 2020
CVE-2020-8850
7.8

CVE-2020-8850 is a remote code execution vulnerability in Foxit Reader that allows attackers to execute arbitrary code by tricking users into opening ...

Feb 14, 2020
CVE-2020-8853
7.8

This vulnerability in Foxit PhantomPDF allows remote attackers to execute arbitrary code by tricking users into opening malicious HTML files or visiti...

Feb 14, 2020
CVE-2019-13333
7.8

This vulnerability allows remote attackers to execute arbitrary code on affected Foxit PhantomPDF installations by tricking users into opening malicio...

Feb 8, 2020
CVE-2014-8140
7.8

CVE-2014-8140 is a heap-based buffer overflow vulnerability in Info-ZIP UnZip that allows remote attackers to execute arbitrary code by tricking users...

Jan 31, 2020
CVE-2020-3710
7.8

This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...

Jan 29, 2020
CVE-2020-3712
7.8

This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...

Jan 29, 2020
CVE-2020-3714
7.8

This memory corruption vulnerability in Adobe Illustrator CC allows attackers to execute arbitrary code on affected systems. Users running Illustrator...

Jan 29, 2020
CVE-2019-18634
7.8

This CVE describes a stack-based buffer overflow vulnerability in Sudo when the pwfeedback option is enabled. Attackers can exploit this by providing ...

Jan 29, 2020
CVE-2020-7951
7.8

CVE-2020-7951 is a memory corruption vulnerability in Valve Dota 2's meshsystem.dll that allows remote attackers to execute arbitrary code or cause de...

Jan 27, 2020
CVE-2015-4041
7.8

This vulnerability in GNU Coreutils' sort utility allows attackers to trigger a heap-based buffer overflow via specially crafted long UTF-8 strings. T...

Jan 24, 2020
CVE-2020-0652
7.8

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable Microsoft Office software by exploiting memory corruption ...

Jan 14, 2020
CVE-2013-5656
7.8

CVE-2013-5656 is a local buffer overflow vulnerability in FuzeZip 1.0.0.131625 that allows attackers to execute arbitrary code by exploiting improper ...

Jan 7, 2020
CVE-2013-3939
7.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of XnView. Attackers can exploit it by tri...

Jan 2, 2020
CVE-2013-3246
7.8

CVE-2013-3246 is a stack-based buffer overflow vulnerability in XnView's xnview.exe that allows remote attackers to execute arbitrary code by crafting...

Jan 2, 2020
CVE-2012-4980
7.8

This vulnerability allows user-assisted attackers to execute arbitrary code through multiple stack-based buffer overflows in Toshiba ConfigFree Utilit...

Dec 27, 2019
CVE-2019-18389
7.8

A heap-based buffer overflow in virglrenderer's vrend_renderer_transfer_write_iov function allows guest OS users to cause denial of service or potenti...

Dec 23, 2019

About Out-of-bounds Write (CWE-787)

The product writes data past the end, or before the beginning, of the intended buffer.

Our database tracks 3,377 CVEs classified as CWE-787, with 842 rated critical and 2,322 rated high severity. The average CVSS score for Out-of-bounds Write vulnerabilities is 8.3.

External reference: View CWE-787 on MITRE CWE →

Monitor Out-of-bounds Write Vulnerabilities

Get alerted when new Out-of-bounds Write CVEs affect your infrastructure.

Start Monitoring Free