Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-787 (跨界内存写) — Vulnerability Class 2188

2188 vulnerabilities classified as CWE-787 (跨界内存写). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2024-10487 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2024-10-29
CVE-2024-7991 Autodesk AutoCAD DWG Out-of-Bounds Write Code Execution Vulnerability — AutoCAD 7.8 High2024-10-29
CVE-2024-9996 Autodesk AutoCAD DWG File Parsing Out-Of-Bounds Write Code Execution Vulnerability — AutoCAD 7.8 High2024-10-29
CVE-2024-8596 Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Code Execution Vulnerability — AutoCAD 7.8 High2024-10-29
CVE-2024-8593 Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Write Code Execution Vulnerability — AutoCAD 7.8 High2024-10-29
CVE-2024-7993 Out-of-Bounds Write Vulnerability in Autodesk Revit — Revit 7.8 High2024-10-16
CVE-2024-47963 Out-of-bounds Write vulnerability in Delta Electronics CNCSoft-G2 — CNCSoft-G2 8.8AIHighAI2024-10-10
CVE-2024-9468 PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet — Cloud NGFW 7.5AIHighAI2024-10-09
CVE-2024-45141 Substance3D - Stager | Out-of-bounds Write (CWE-787) — Substance3D - Stager 7.8 High2024-10-09
CVE-2024-45152 Substance3D - Stager | Out-of-bounds Write (CWE-787) — Substance3D - Stager 7.8 High2024-10-09
CVE-2024-45140 Substance3D - Stager | Out-of-bounds Write (CWE-787) — Substance3D - Stager 7.8 High2024-10-09
CVE-2024-45144 Substance3D - Stager | Out-of-bounds Write (CWE-787) — Substance3D - Stager 7.8 High2024-10-09
CVE-2024-45150 Dimension | Out-of-bounds Write (CWE-787) — Dimension 7.8 High2024-10-09
CVE-2024-45471 Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 7.8 High2024-10-08
CVE-2024-45470 Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 7.8 High2024-10-08
CVE-2024-45469 Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 7.8 High2024-10-08
CVE-2024-45382 Liteos_a has an Out-of-bounds Write vulnerability — OpenHarmony 3.3 Low2024-10-08
CVE-2024-20099 MediaTek 芯片 安全漏洞 — MT6768, MT6833, MT6853, MT6877, MT6893, MT8532 6.7 -2024-10-07
CVE-2024-20098 MediaTek 芯片 安全漏洞 — MT6768, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8188, MT8532, MT8675, MT8766, MT8768, MT8781, MT8786, MT8788 6.7 -2024-10-07
CVE-2024-20103 MediaTek 芯片 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7927, MT8183, MT8512, MT8678, MT8695, MT8698, MT8796, MT8893 9.8 -2024-10-07
CVE-2024-20101 MediaTek 芯片 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7927, MT8183, MT8512, MT8676, MT8678, MT8695, MT8698, MT8755, MT8775, MT8792, MT8796 9.8 -2024-10-07
CVE-2024-20100 MediaTek 芯片 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7927, MT8183, MT8365, MT8512, MT8676, MT8678, MT8695, MT8698, MT8755, MT8775, MT8792, MT8796 9.8 -2024-10-07
CVE-2024-20092 MediaTek 芯片 安全漏洞 — MT6761, MT6765, MT6768, MT6779, MT6785, MT6853, MT6873, MT6885, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789 6.7 -2024-10-07
CVE-2024-20090 MediaTek 芯片 安全漏洞 — MT6761, MT6765, MT6768, MT6779, MT6785, MT6853, MT6873, MT6885, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789 6.7 -2024-10-07
CVE-2024-9482 Out of Bounds write on scan of malformed Mach-O file may crash the application — Antivirus 5.1 Medium2024-10-04
CVE-2024-9481 Out of Bounds write on scan of malformed eml file may crash the application — Antivirus 5.1 Medium2024-10-04
CVE-2024-6442 Bluetooth: ASCS Unchecked tailroom of the response buffer — Zephyr 6.3 Medium2024-10-04
CVE-2024-47134 JTEKT Kostac PLC Programming Software 安全漏洞 — Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) 7.8 High2024-10-03
CVE-2024-20501 Cisco AnyConnect VPN 安全漏洞 — Cisco Meraki MX Firmware 8.6 High2024-10-02
CVE-2024-20499 Cisco Meraki Z Series Teleworker Gateway和Cisco Meraki MX 安全漏洞 — Cisco Meraki MX Firmware 8.6 High2024-10-02

Vulnerabilities classified as CWE-787 (跨界内存写) represent 2188 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.