Search Results

Updated 8m ago
337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
24,786 results for "buffer overflow" Clear all
CVE-2024-26736 7.8 HIGH EPSS 0.00
Linux Kernel < 5.4.270 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in afs_update_volume_status() The max length of volume->vid value is 20 characters. So increase idbuf[] size up to 24 to avoid overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE. [DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()]
CWE-787 Apr 03, 2024
CVE-2017-7982 5.5 MEDIUM EPSS 0.00
Libimobiledevice Libplist < 1.12 - Integer Overflow
Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
CWE-190 Apr 20, 2017
CVE-2024-55605 7.5 HIGH EPSS 0.00
Oisf Suricata < 7.0.8 - Denial of Service
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8.
CWE-400 Jan 06, 2025
CVE-2014-7185 EPSS 0.01
Python <2.7.8 - Info Disclosure
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
CWE-189 Oct 08, 2014
CVE-2012-5143 EPSS 0.02
Google Chrome <23.0.1271.97 - DoS
Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.
CWE-190 Dec 12, 2012
CVE-2012-2845 EPSS 0.01
libjpeg <0.6.20 - DoS/Info Disclosure
Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.
CWE-189 Jul 13, 2012
CVE-2026-22262 5.9 MEDIUM 1 Writeup EPSS 0.00
Oisf Suricata < 7.0.14 - Out-of-Bounds Write
Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options.
CWE-121 Jan 27, 2026
CVE-2025-54804 6.5 MEDIUM 1 Writeup EPSS 0.00
Russh < 0.54.1 - Integer Overflow
Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1.
CWE-190 Aug 05, 2025
CVE-2016-5221 6.3 MEDIUM EPSS 0.00
Google Chrome < 54.0.2840.99 - Integer Overflow
Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.
CWE-190 Jan 19, 2017
CVE-2026-30909 EPSS 0.00
Crypt::NaCl::Sodium <=2.002 - Memory Corruption
Crypt::NaCl::Sodium versions through 2.002 for Perl has potential integer overflows. bin2hex, encrypt, aes256gcm_encrypt_afternm and seal functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex() the bin_len would have to be > SIZE_MAX / 2 For encrypt() the msg_len would need to be > SIZE_MAX - 16U For aes256gcm_encrypt_afternm() the msg_len would need to be > SIZE_MAX - 16U For seal() the enc_len would need to be > SIZE_MAX - 64U
CWE-190 Mar 08, 2026
CVE-2021-40526 4.8 MEDIUM EPSS 0.01
Peleton TTR01 <PTV55G - DoS
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike
CWE-131 Oct 25, 2021
CVE-2021-32627 7.5 HIGH 1 Writeup EPSS 0.01
Redis < 5.0.14 - Integer Overflow
Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer-limit configuration parameters to very large values and constructing specially crafted very large stream elements. The problem is fixed in Redis 6.2.6, 6.0.16 and 5.0.14. For users unable to upgrade an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CWE-190 Oct 04, 2021
CVE-2025-14087 5.6 MEDIUM EPSS 0.00
Gnome Glib < 2.86.3 - Integer Overflow
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
CWE-190 Dec 10, 2025
CVE-2025-39718 5.5 MEDIUM EPSS 0.00
Linux Kernel < 6.1.149 - Out-of-Bounds Write
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
CWE-787 Sep 05, 2025
CVE-2004-2731 EPSS 0.00
Linux Kernel - Numeric Error
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
CWE-189 Dec 31, 2004
CVE-2006-1168 EPSS 0.10
ncompress 4.2.4 - liblzw - DoS/Buffer Overflow
The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.
Aug 14, 2006
CVE-2004-0575 2 PoCs Analysis EPSS 0.72
Microsoft Windows - RCE
Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.
Nov 03, 2004
CVE-2007-6725 EPSS 0.06
Ghostscript <8.62 - DoS/Buffer Overflow
The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
CWE-119 Apr 08, 2009
CVE-2016-5261 8.8 HIGH EPSS 0.01
Mozilla Firefox < 47.0.1 - Integer Overflow
Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
CWE-190 Aug 05, 2016
CVE-2025-59089 5.9 MEDIUM 1 Writeup EPSS 0.00
kdcproxy - DoS
If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.
CWE-770 Nov 12, 2025