CWE-129
High likelihoodImproper Validation of Array Index
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
556 vulnerabilities with CWE-129
CVE-2024-38631
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-38623
CRITICAL
Linux Kernel - Info Disclosure
CVSS 9.8
CVE-2024-38587
MEDIUM
Linux kernel - Buffer Overflow
CVSS 5.3
CVE-2024-38569
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-38568
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-38562
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-38556
HIGH
Linux kernel - Use After Free
CVSS 7.8
CVE-2024-38552
HIGH
Linux kernel - Memory Corruption
CVSS 7.8
CVE-2024-38542
HIGH
Linux Kernel - Buffer Overflow
CVSS 7.1
CVE-2024-36740
HIGH
OneFlow-Inc Oneflow <0.9.1 - DoS
CVSS 7.5
CVE-2024-36743
HIGH
OneFlow-Inc. Oneflow <0.9.1 - DoS
CVSS 7.5
CVE-2024-36921
HIGH
Linux Kernel < 6.6.31 - Improper Array Index Validation
CVSS 7.8
CVE-2024-36015
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-22181
HIGH
libigl <2.5.0 - Memory Corruption
CVSS 7.8
CVE-2024-35905
HIGH
Linux Kernel < 5.10.215 - Integer Overflow
CVSS 7.8
CVE-2024-27042
HIGH
Linux Kernel - Memory Corruption
CVSS 7.8
CVE-2024-26981
HIGH
Linux kernel - Buffer Overflow
CVSS 7.8
CVE-2024-26971
MEDIUM
Linux kernel - Memory Corruption
CVSS 5.5
CVE-2024-26969
MEDIUM
Linux kernel - Buffer Overflow
CVSS 5.5
CVE-2024-26968
MEDIUM
Linux kernel - Buffer Overflow
CVSS 5.5
CVE-2024-26967
MEDIUM
Linux kernel - Buffer Overflow
CVSS 5.5
CVE-2024-26966
MEDIUM
Linux kernel - Buffer Overflow
CVSS 5.5
CVE-2024-34050
HIGH
Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 - Memory C...
CVSS 7.5
CVE-2024-34048
CRITICAL
O-RAN RIC I-Release e2mgr - Buffer Overflow
CVSS 9.8
CVE-2024-34047
MEDIUM
O-RAN RIC I-Release - Buffer Overflow
CVSS 4.3
Details
Vulnerabilities
556
Exploit Likelihood
High