22 vulnerabilities classified as CWE-114 (流程控制). AI Chinese analysis included.
CWE-114 represents a critical process control weakness where applications execute commands or load libraries from untrusted sources or environments. Attackers typically exploit this vulnerability by manipulating input to alter the specific command a program executes or by injecting malicious code into the execution environment. This allows adversaries to run arbitrary payloads with the privileges of the affected application, potentially leading to full system compromise. To mitigate these risks, developers must rigorously validate and sanitize all inputs before passing them to system calls. Implementing strict allowlists for permitted commands and libraries, rather than relying on blocklists, ensures that only authorized operations proceed. Additionally, isolating application processes and minimizing environmental variables can significantly reduce the attack surface, preventing unauthorized control over the execution flow and safeguarding system integrity against malicious interference.
... System.loadLibrary("library.dll"); ...... RegQueryValueEx(hkey, "APPHOME", 0, 0, (BYTE*)home, &size); char* lib=(char*)malloc(strlen(home)+strlen(INITLIB)); if (lib) { strcpy(lib,home); strcat(lib,INITCMD); LoadLibrary(lib); } ...Vulnerabilities classified as CWE-114 (流程控制) represent 22 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.