Vulnerabilities > Improper Validation of Array Index
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-06 | CVE-2019-10512 | Improper Validation of Array Index vulnerability in Qualcomm products Payload size is not checked before using it as array index in audio in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SXR1130 | 7.8 |
2019-11-05 | CVE-2019-17212 | Improper Validation of Array Index vulnerability in Mbed 5.13.2/5.14.0 Buffer overflows were discovered in the CoAP library in Arm Mbed OS 5.14.0. | 9.8 |
2019-09-30 | CVE-2019-10499 | Improper Validation of Array Index vulnerability in Qualcomm products Improper validation of read and write index of tx and rx fifo`s before using for data copy from fifo can lead to out-of-bound access. | 7.8 |
2019-08-29 | CVE-2019-14437 | Improper Validation of Array Index vulnerability in multiple products The xiph_SplitHeaders function in modules/demux/xiph.h in VideoLAN VLC media player 3.0.7.1 does not check array bounds properly. | 7.8 |
2019-08-29 | CVE-2019-15784 | Improper Validation of Array Index vulnerability in Srtalliance Secure Reliable Transport Secure Reliable Transport (SRT) through 1.3.4 has a CSndUList array overflow if there are many SRT connections. | 9.8 |
2019-08-12 | CVE-2019-13418 | Improper Validation of Array Index vulnerability in Search-Guard Search Guard Search Guard versions before 24.0 had an issue that values of string arrays in documents are not properly anonymized. | 7.5 |
2019-07-25 | CVE-2019-2346 | Improper Validation of Array Index vulnerability in Qualcomm products Firmware is getting into loop of overwriting memory when scan command is given from host because of improper validation. | 7.8 |
2019-07-25 | CVE-2019-2326 | Improper Validation of Array Index vulnerability in Qualcomm products Data token is received from ADSP and is used without validation as an index into the array leads to out of bound access in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 | 7.8 |
2019-07-25 | CVE-2019-2239 | Improper Validation of Array Index vulnerability in Qualcomm products Sanity checks are missing in layout which can lead to SUI Corruption or can lead to Denial of Service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, Snapdragon_High_Med_2016, SXR1130 | 5.5 |
2019-06-27 | CVE-2018-17478 | Improper Validation of Array Index vulnerability in Google Chrome Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | 8.8 |