182 vulnerabilities classified as CWE-129 (对数组索引的验证不恰当). AI Chinese analysis included.
CWE-129 represents an improper validation of array index weakness where software fails to verify that untrusted input falls within the valid bounds of an array. This vulnerability typically allows attackers to exploit the flaw by supplying malicious values that cause the application to read or write memory outside the intended array boundaries. Such out-of-bounds access can lead to critical security breaches, including data corruption, denial of service, or arbitrary code execution, depending on the memory layout and context. To prevent this issue, developers must implement rigorous input validation checks before using any external data as an array index. This involves ensuring that indices are strictly greater than or equal to zero and less than the array’s defined length. Additionally, utilizing safe programming languages with automatic bounds checking or employing static analysis tools can help identify and mitigate these risks during the development lifecycle.
public String getValue(int index) { return array[index]; }private void buildList ( int untrustedListSize ){ if ( 0 > untrustedListSize ){ die("Negative value supplied for list size, die evil hacker!"); } Widget[] list = new Widget [ untrustedListSize ]; list[0] = new Widget(); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-5319 | 多款Dell产品输入验证错误漏洞 — Unity | 7.5 | High | 2020-02-06 |
| CVE-2019-1837 | Cisco Unified Communications Manager Denial of Service Vulnerability — Cisco Unified Communications Manager | 7.5 | - | 2019-04-18 |
Vulnerabilities classified as CWE-129 (对数组索引的验证不恰当) represent 182 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.