5 vulnerabilities classified as CWE-1173 (验证框架使用不当). AI Chinese analysis included.
CWE-1173 represents a design weakness where developers fail to leverage built-in or third-party input validation frameworks, opting instead for manual, error-prone checks. This oversight typically leads to vulnerabilities such as injection attacks or buffer overflows, as attackers exploit inconsistent or incomplete validation logic to bypass security controls. By ignoring standardized frameworks, applications lack robust, automated safeguards against malformed or malicious inputs, increasing the attack surface significantly. To mitigate this risk, developers should integrate established validation libraries that enforce strict schema compliance and automatically sanitize data. Utilizing these tools ensures consistent application of security rules across all input vectors, reducing human error and enhancing overall system resilience against common exploitation techniques.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-33674 | PrestaShop: Improper Use of Validation Framework — PrestaShop | 2.0 | Low | 2026-03-26 |
| CVE-2025-3940 | Improper Use of Validation Framework — Niagara Framework | 5.3 | Medium | 2025-05-22 |
| CVE-2023-30949 | CVE-2023-30949 — com.palantir.slate:slate | 4.3 | Medium | 2023-07-26 |
| CVE-2022-1414 | Red Hat 3scale 输入验证错误漏洞 — 3scale-amp-system | 8.8 | - | 2022-10-19 |
| CVE-2020-1640 | Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash. — Junos OS | 7.5 | High | 2020-07-17 |
Vulnerabilities classified as CWE-1173 (验证框架使用不当) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.