Filtered by CWE-787
Total 12951 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-20695 3 Google, Mediatek, Openwrt 14 Android, Mt6639, Mt6653 and 11 more 2025-07-14 6.5 Medium
In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09741871; Issue ID: MSV-3317.
CVE-2023-52725 2 Linuxfoundation, Open Networking Foundation 2 Onos-kpimon, Sd-ran Onos 2025-07-14 6.5 Medium
Open Networking Foundation SD-RAN ONOS onos-kpimon 0.4.7 allows blocking of the errCh channel within the Start function of the monitoring package.
CVE-2023-52727 1 Linuxfoundation 1 Onos-lib-go 2025-07-14 8.1 High
Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in parseAlignBits.
CVE-2023-52724 1 Linuxfoundation 1 Onos-kpimon 2025-07-14 8.1 High
Open Networking Foundation SD-RAN onos-kpimon 0.4.7 allows out-of-bounds array access in the processIndicationFormat1 function.
CVE-2025-20682 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-07-13 9.8 Critical
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445.
CVE-2025-30312 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2025-07-13 7.8 High
Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-20684 1 Mediatek 4 Mt7615, Mt7622, Mt7663 and 1 more 2025-07-13 9.8 Critical
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422.
CVE-2025-47124 2 Adobe, Microsoft 2 Framemaker, Windows 2025-07-13 7.8 High
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43594 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-13 7.8 High
InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-47127 2 Adobe, Microsoft 2 Framemaker, Windows 2025-07-13 7.8 High
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49530 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-13 7.8 High
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-47129 2 Adobe, Microsoft 2 Framemaker, Windows 2025-07-13 7.8 High
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-47126 2 Adobe, Microsoft 2 Framemaker, Windows 2025-07-13 7.8 High
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49526 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-13 7.8 High
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-13170 1 Ivanti 1 Endpoint Manager 2025-07-13 7.5 High
An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service.
CVE-2024-39840 1 Factorio 1 Factorio 2025-07-13 8.8 High
Factorio before 1.1.101 allows a crafted server to execute arbitrary code on clients via a custom map that leverages the ability of certain Lua base module functions to execute bytecode and generate fake objects.
CVE-2024-57850 1 Linux 1 Linux Kernel 2025-07-13 7.8 High
In the Linux kernel, the following vulnerability has been resolved: jffs2: Prevent rtime decompress memory corruption The rtime decompression routine does not fully check bounds during the entirety of the decompression pass and can corrupt memory outside the decompression buffer if the compressed data is corrupted. This adds the required check to prevent this failure mode.
CVE-2025-26519 1 Musl-libc 1 Musl 2025-07-13 8.1 High
musl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8.
CVE-2024-47398 1 Openharmony 1 Openharmony 2025-07-12 8.8 High
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.
CVE-2021-47475 1 Linux 1 Linux Kernel 2025-07-12 4.9 Medium
In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix transfer-buffer overflows The driver uses endpoint-sized USB transfer buffers but up until recently had no sanity checks on the sizes. Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize of usb endpoints found") inadvertently fixed NULL-pointer dereferences when accessing the transfer buffers in case a malicious device has a zero wMaxPacketSize. Make sure to allocate buffers large enough to handle also the other accesses that are done without a size check (e.g. byte 18 in vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond the buffers, for example, when doing descriptor fuzzing. The original driver was for a low-speed device with 8-byte buffers. Support was later added for a device that uses bulk transfers and is presumably a full-speed device with a maximum 64-byte wMaxPacketSize.