2925 vulnerabilities classified as CWE-125 (跨界内存读). AI Chinese analysis included.
CWE-125, Out-of-bounds Read, is a memory safety weakness where software accesses memory locations outside the designated buffer boundaries, either before its start or past its end. This vulnerability typically arises from insufficient bounds checking during array indexing or pointer arithmetic, allowing attackers to read sensitive data such as stack canaries, cryptographic keys, or internal application state. By leveraging this flaw, adversaries can achieve information disclosure or potentially facilitate further exploitation techniques like heap spraying. Developers mitigate this risk by implementing rigorous input validation, utilizing static analysis tools to detect unsafe memory access patterns, and adopting safer programming languages or libraries that enforce automatic bounds checking. Additionally, employing compiler protections like Address Sanitizer during development helps identify these errors early, ensuring that memory reads remain strictly within allocated limits to prevent unauthorized data exposure.
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-49541 | Illustrator | Out-of-bounds Read (CWE-125) — Illustrator | 5.5 | Medium | 2024-12-10 |
| CVE-2024-49532 | Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader | 5.5 | Medium | 2024-12-10 |
| CVE-2024-49534 | Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader | 5.5 | Medium | 2024-12-10 |
| CVE-2024-49533 | Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader | 5.5 | Medium | 2024-12-10 |
| CVE-2024-49113 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability — Windows 10 Version 1809 | 7.5 | High | 2024-12-10 |
| CVE-2024-49110 | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.8 | Medium | 2024-12-10 |
| CVE-2024-49109 | Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.6 | Medium | 2024-12-10 |
| CVE-2024-49083 | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.8 | Medium | 2024-12-10 |
| CVE-2024-49065 | Microsoft Office Remote Code Execution Vulnerability — Microsoft SharePoint Enterprise Server 2016 | 5.5 | Medium | 2024-12-10 |
| CVE-2024-49111 | Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.6 | Medium | 2024-12-10 |
| CVE-2024-49101 | Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.6 | Medium | 2024-12-10 |
| CVE-2024-49099 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability — Windows 10 Version 1809 | 4.3 | Medium | 2024-12-10 |
| CVE-2024-49098 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability — Windows 10 Version 1809 | 4.3 | Medium | 2024-12-10 |
| CVE-2024-49092 | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 | 6.8 | Medium | 2024-12-10 |
| CVE-2024-53242 | Siemens Teamcenter Visualization和Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 | 7.8 | High | 2024-12-10 |
| CVE-2024-11268 | PDF File Parsing Vulnerability in Autodesk Revit — Revit | 5.5 | Medium | 2024-12-09 |
| CVE-2024-12130 | Rockwell Automation Arena® Out of Bounds Read Vulnerability — Arena® | 8.4 | - | 2024-12-05 |
| CVE-2024-52545 | Lorex 2K Indoor Wi-Fi Security Camera - Out of bounds heap read — 2K Indoor Wi-Fi Security Camera | 6.5 | Medium | 2024-12-03 |
| CVE-2024-9978 | Liteos_a has an out-of-bounds read vulnerability — OpenHarmony | 5.5 | Medium | 2024-12-03 |
| CVE-2024-12082 | Ability Runtime has an out-of-bounds read permission bypass vulnerability — OpenHarmony | 5.5 | Medium | 2024-12-03 |
| CVE-2024-20138 | MediaTek Chipsets 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7925, MT7927, MT8195, MT8370, MT8390 | 7.5 | - | 2024-12-02 |
| CVE-2024-20116 | MediaTek Chipsets 安全漏洞 — MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798 | 4.4 | - | 2024-12-02 |
| CVE-2024-20136 | MediaTek Chipsets 安全漏洞 — MT2737, MT6781, MT6789, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8195, MT8370, MT8390, MT8673, MT8676, MT8678, MT8755, MT8775, MT8781, MT8795T, MT8796, MT8798, MT8893 | 5.5 | - | 2024-12-02 |
| CVE-2024-20127 | MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T | 7.5 | - | 2024-12-02 |
| CVE-2024-20128 | MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T | 7.5 | - | 2024-12-02 |
| CVE-2024-20129 | MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T | 7.5 | - | 2024-12-02 |
| CVE-2024-38658 | Fuji Electric V-Server和Fuji Electric V-Server Lite 缓冲区错误漏洞 — V-Server | 7.8AI | HighAI | 2024-11-28 |
| CVE-2024-38389 | Fuji Electric TELLUS和Fuji Electric TELLUS Lite 缓冲区错误漏洞 — TELLUS | 7.8AI | HighAI | 2024-11-28 |
| CVE-2024-41125 | Out-of-bounds read in SNMP when decoding a string in Contiki-NG — contiki-ng | 8.4 | High | 2024-11-27 |
| CVE-2024-41126 | Out-of-bounds read when decoding SNMP messages in Contiki-NG — contiki-ng | 8.4 | High | 2024-11-27 |
Vulnerabilities classified as CWE-125 (跨界内存读) represent 2925 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.