目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-787 跨界内存写 类漏洞列表 2200

CWE-787 跨界内存写 类弱点 2200 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-787 越界写入是一种严重的内存安全漏洞,指程序向缓冲区边界之外或起始位置之前写入数据。攻击者利用此缺陷可覆盖相邻内存,导致程序崩溃、数据损坏,甚至通过精心构造的 payload 实现任意代码执行,从而完全控制目标系统。开发者应避免此类风险,需严格实施边界检查,使用安全的内存管理函数,启用编译器防护机制,并遵循最小权限原则,确保所有内存访问均在合法范围内。

MITRE CWE 官方描述
CWE:CWE-787 Out-of-bounds Write 英文:The product writes data past the end, or before the beginning, of the intended buffer. 译文:产品将数据写入预期缓冲区(buffer)的末尾之外或起始位置之前。
常见影响 (3)
IntegrityModify Memory, Execute Unauthorized Code or Commands
Write operations could cause memory corruption. In some cases, an adversary can modify control data such as return addresses in order to execute unexpected code.
AvailabilityDoS: Crash, Exit, or Restart
Attempting to access out-of-range, invalid, or unauthorized memory could cause the product to crash.
OtherUnexpected State
Subsequent write operations can produce undefined or unexpected results.
缓解措施 (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer. Be wary that a lan…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.
Operation, Build and CompilationUse automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking. D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses…
Effectiveness: Defense in Depth
ImplementationConsider adhering to the following rules when allocating and managing an application's memory: Double check that the buffer is as large as specified. When using functions that accept a number of bytes to copy, such as strncpy(), be aware that if the destination buffer size is equal to the source buffer size, it may not NULL-terminate the string. Check buffer boundaries if accessing the buffer in a…
Operation, Build and CompilationRun or compile the software using features or extensions that randomly arrange the positions of a program's executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code. Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported…
Effectiveness: Defense in Depth
代码示例 (2)
The following code attempts to save four different identification numbers into an array.
int id_sequence[3]; /* Populate the id array. */ id_sequence[0] = 123; id_sequence[1] = 234; id_sequence[2] = 345; id_sequence[3] = 456;
Bad · C
In the following code, it is possible to request that memcpy move a much larger segment of memory than assumed:
int returnChunkSize(void *) { /* if chunk info is valid, return the size of usable memory, * else, return -1 to indicate an error */ ... } int main() { ... memcpy(destBuf, srcBuf, (returnChunkSize(destBuf)-1)); ... }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2026-3703 Wavlink NU516U1 缓冲区错误漏洞 — NU516U1 9.8 Critical2026-03-08
CVE-2018-25198 Gaijin eToolz 缓冲区错误漏洞 — eToolz 6.2 Medium2026-03-06
CVE-2026-1678 Zephyr 安全漏洞 — Zephyr 9.4 Critical2026-03-05
CVE-2026-20023 Cisco Secure Firewall Adaptive Security Appliance和Cisco Secure Firewall Threat Defense 缓冲区错误漏洞 — Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 6.1 Medium2026-03-04
CVE-2026-20067 Cisco IOS XE和Cisco Secure Firewall Threat Defense 缓冲区错误漏洞 — Cisco Cyber Vision 5.8 Medium2026-03-04
CVE-2026-3094 Delta Electronics CNCSoft-G2 安全漏洞 — CNCSoft-G2 7.8 High2026-03-04
CVE-2026-27622 OpenEXR 缓冲区错误漏洞 — openexr 7.7AIHighAI2026-03-03
CVE-2026-3342 WatchGuard Fireware OS 安全漏洞 — Fireware OS 7.2AIHighAI2026-03-03
CVE-2025-59603 Qualcomm Chipsets 缓冲区错误漏洞 — Snapdragon 7.8 High2026-03-02
CVE-2025-47373 Qualcomm Chipsets 缓冲区错误漏洞 — Snapdragon 7.8 High2026-03-02
CVE-2026-20416 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20444 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20441 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20434 MediaTek Chipsets 安全漏洞 — MediaTek chipset 8.0AIHighAI2026-03-02
CVE-2026-20430 MediaTek Chipsets 安全漏洞 — MediaTek chipset 8.8AIHighAI2026-03-02
CVE-2026-20428 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20427 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20426 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-20425 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-03-02
CVE-2026-22716 VMware Workstation 安全漏洞 — Workstation 5.0 Medium2026-02-27
CVE-2026-26965 FreeRDP 缓冲区错误漏洞 — FreeRDP 8.8 High2026-02-25
CVE-2026-26955 FreeRDP 缓冲区错误漏洞 — FreeRDP 8.8 High2026-02-25
CVE-2026-25986 ImageMagick 缓冲区错误漏洞 — ImageMagick 5.3 Medium2026-02-24
CVE-2026-2940 Tiny Web Server 缓冲区错误漏洞 — tiny_web_server 7.3 High2026-02-22
CVE-2026-2048 GIMP 缓冲区错误漏洞 — GIMP 7.8AIHighAI2026-02-20
CVE-2026-2045 GIMP 缓冲区错误漏洞 — GIMP 7.8AIHighAI2026-02-20
CVE-2026-2681 blst 安全漏洞 5.3 Medium2026-02-19
CVE-2019-25362 Alloksoft WMV to AVI MPEG DVD WMV Converter 缓冲区错误漏洞 — WMV to AVI MPEG DVD WMV Convertor 9.8 Critical2026-02-18
CVE-2026-0665 QEMU 安全漏洞 6.5 Medium2026-02-18
CVE-2026-0875 Autodesk Shared Components 缓冲区错误漏洞 — Shared Components 7.8 High2026-02-18

CWE-787(跨界内存写) 是常见的弱点类别,本平台收录该类弱点关联的 2200 条 CVE 漏洞。