Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Vulnerability Database
CWE List
CWE-788 - Access of Memory Location After End of Buffer
Description
The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer.
Latest vulnerabilities for CWE-788
Denial of service in Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances
2024-10-25
High
Yes
Denial of service in Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL VPN
2024-10-23
Medium
Yes
Multiple vulnerabilities in Dell PowerFlex Appliance
2024-08-21
High
Yes
Multiple vulnerabilities in Dell APEX Cloud Platform for Red Hat OpenShift and Dell APEX Cloud Platform Foundation Software
2024-08-01
High
Yes
Access of Memory Location After End of Buffer in Dell PowerEdge Server BIOS and Dell Precision Rack BIOS
2024-08-01
Low
Yes
Access of Memory Location After End of Buffer in Dell PowerEdge Server BIOS and Dell Precision Rack BIOS
2024-08-01
Low
Yes
Access of memory location after end of buffer in Junos OS Evolved and Juniper Junos OS
2024-04-11
Medium
Yes
Multiple vulnerabilities in NVIDIA Virtual GPU Manager
2024-02-29
Medium
Yes
Multiple vulnerabilities in NVIDIA GPU display driver for Windows and Linux
2024-02-29
Low
Yes
Multiple vulnerabilities in Fuji Electric V-Server, V-Server Lite, TELLUS and TELLUS Lite
2023-06-08
High
Yes
References
Description of CWE-788 on Mitre website