Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-122 (堆缓冲区溢出) — Vulnerability Class 1837

1837 vulnerabilities classified as CWE-122 (堆缓冲区溢出). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2024-12179 DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software — Navisworks Freedom 7.8 High2024-12-17
CVE-2024-49775 Siemens Opcenter Execution Foundation 安全漏洞 — Opcenter Execution Foundation 9.8 Critical2024-12-16
CVE-2024-8798 Bluetooth: classic: avdtp: missing buffer length check — Zephyr 7.5 High2024-12-15
CVE-2024-53957 Substance3D - Painter | Heap-based Buffer Overflow (CWE-122) — Substance3D - Painter 7.8 High2024-12-10
CVE-2024-53956 Premiere Pro | Heap-based Buffer Overflow (CWE-122) — Premiere Pro 7.8 High2024-12-10
CVE-2024-52999 Substance3D - Modeler | Heap-based Buffer Overflow (CWE-122) — Substance3D - Modeler 7.8 High2024-12-10
CVE-2024-52996 Substance3D - Sampler | Heap-based Buffer Overflow (CWE-122) — Substance3D - Sampler 7.8 High2024-12-10
CVE-2024-52995 Substance3D - Sampler | Heap-based Buffer Overflow (CWE-122) — Substance3D - Sampler 7.8 High2024-12-10
CVE-2024-49545 InDesign Desktop | Heap-based Buffer Overflow (CWE-122) — InDesign Desktop 7.8 High2024-12-10
CVE-2024-49552 Media Encoder | Heap-based Buffer Overflow (CWE-122) — Media Encoder 7.8 High2024-12-10
CVE-2024-49138 Windows Common Log File System Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2024-12-10
CVE-2024-49080 Windows IP Routing Management Snapin Remote Code Execution Vulnerability — Windows 10 Version 1809 8.8 High2024-12-10
CVE-2024-49081 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.6 Medium2024-12-10
CVE-2024-49072 Windows Task Scheduler Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2024-12-10
CVE-2024-49125 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability — Windows Server 2019 8.8 High2024-12-10
CVE-2024-49104 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability — Windows 10 Version 1809 8.8 High2024-12-10
CVE-2024-49102 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability — Windows 10 Version 1809 8.8 High2024-12-10
CVE-2024-49094 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.6 Medium2024-12-10
CVE-2024-49086 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability — Windows Server 2019 8.8 High2024-12-10
CVE-2024-54094 Siemens Solid Edge 安全漏洞 — Solid Edge SE2024 7.8 High2024-12-10
CVE-2024-54093 Siemens Solid Edge 安全漏洞 — Solid Edge SE2024 7.8 High2024-12-10
CVE-2024-11608 Autodesk Revit 安全漏洞 — Revit 7.8 High2024-12-09
CVE-2024-40763 SonicWALL SMA100 安全漏洞 — SMA100 8.8 -2024-12-05
CVE-2024-11933 Fuji Electric Monitouch V-SFT X1 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFT 7.8 -2024-11-27
CVE-2024-11233 Single byte overread with convert.quoted-printable-decode filter — PHP 4.8 Medium2024-11-24
CVE-2024-7508 Trimble SketchUp Viewer SKP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — SketchUp Viewer 7.8 -2024-11-22
CVE-2024-8025 Nikon NEF Codec Thumbnail Provider NRW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — NEF Codec 7.8 -2024-11-22
CVE-2024-9734 Tungsten Automation Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — Power PDF 7.8 -2024-11-22
CVE-2024-9741 Tungsten Automation Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — Power PDF 7.8 -2024-11-22
CVE-2024-9742 Tungsten Automation Power PDF PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — Power PDF 7.8 -2024-11-22

Vulnerabilities classified as CWE-122 (堆缓冲区溢出) represent 1837 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.