Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-130 (长度参数不一致性处理不恰当) — Vulnerability Class 71

71 vulnerabilities classified as CWE-130 (长度参数不一致性处理不恰当). AI Chinese analysis included.

CWE-130 represents a critical logic flaw where software fails to validate that a declared length parameter matches the actual size of the associated data buffer. This inconsistency typically arises during the parsing of formatted messages or structured inputs, allowing attackers to manipulate length fields to deceive the application. By exploiting this discrepancy, adversaries can trigger buffer overflows, memory corruption, or unexpected control flow alterations, potentially leading to remote code execution or denial of service. To mitigate this vulnerability, developers must implement rigorous input validation that strictly verifies the integrity of length fields against actual data sizes before processing. Employing safe string handling libraries, enforcing strict type checking, and utilizing bounds-checking mechanisms ensures that the application correctly interprets data structures, thereby preventing attackers from leveraging length mismatches to compromise system stability or security.

MITRE CWE Description
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. If an attacker can manipulate the length parameter associated with an input such that it is inconsistent with the actual length of the input, this can be leveraged to cause the target application to behave in unexpected, and possibly, malicious ways. One of the possible motives for doing so is to pass in arbitrarily large input to the application. Another possible motivation is the modification of application state by including invalid data for subsequent properties of the application. Such weaknesses commonly lead to attacks such as buffer overflows and execution of arbitrary code.
Common Consequences (1)
Confidentiality, IntegrityRead Memory, Modify Memory, Varies by Context
Mitigations (3)
ImplementationWhen processing structured incoming data containing a size field followed by raw data, ensure that you identify and resolve any inconsistencies between the size field and the actual size of the data.
ImplementationDo not let the user control the size of the buffer.
ImplementationValidate that the length of the user-supplied data is consistent with the buffer size.
Examples (1)
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-5766 Potential denial-of-service vulnerability in ASGI requests via file upload limit bypass — Django 5.3 Medium2026-05-05
CVE-2026-33846 Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly — Red Hat Hardened Images 7.5 High2026-05-04
CVE-2026-3868 Moxa EDR-8010 Series和Moxa EDR-G9010 Series 安全漏洞 — EDR-8010 Series 7.5AIHighAI2026-04-27
CVE-2026-5265 Ovn: ovn: heap over-read in icmp error response generation - security issue — Fast Datapath for Red Hat Enterprise Linux 8 6.5 Medium2026-04-24
CVE-2026-5367 Ovn: ovn: information disclosure via crafted dhcpv6 packets — Fast Datapath for Red Hat Enterprise Linux 8 8.6 High2026-04-24
CVE-2026-41035 Rsync 安全漏洞 — rsync 7.4 High2026-04-16
CVE-2026-33555 HAProxy 安全漏洞 — HAProxy 4.0 Medium2026-04-13
CVE-2026-40199 Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypass — Net::CIDR::Lite 7.5 -2026-04-10
CVE-2026-34831 Rack: Content-Length mismatch in Rack::Files error responses — rack 4.8 Medium2026-04-02
CVE-2026-25572 Siemens SICAM SIAPP SDK 安全漏洞 — SICAM SIAPP SDK 5.1 Medium2026-03-10
CVE-2026-25571 Siemens SICAM SIAPP SDK 安全漏洞 — SICAM SIAPP SDK 5.1 Medium2026-03-10
CVE-2025-48022 Yokogawa Electric Vnet/IP Interface 安全漏洞 — Vnet/IP Interface Package 7.5AIHighAI2026-02-13
CVE-2025-14847 Zlib compressed protocol header length confusion may allow memory read — MongoDB Server 7.5 High2025-12-19
CVE-2025-8531 Mitsubishi Electric MELSEC-Q Series 安全漏洞 — MELSEC-Q Series Q03UDVCPU 6.8 Medium2025-09-19
CVE-2025-10458 Bluetooth: le_conn_rsp does not sanitize CID, MTU, MPS values — Zephyr 7.6 High2025-09-19
CVE-2025-5514 Denial-of-Service(DoS) Vulnerability in Web server function on MELSEC iQ-F Series CPU module — MELSEC iQ-F Series FX5U-32MT/ES 5.3 Medium2025-08-25
CVE-2025-54646 Huawei HarmonyOS和Huawei EMUI 安全漏洞 — HarmonyOS 5.1 Medium2025-08-06
CVE-2023-53157 Rosenpass 安全漏洞 — rosenpass 5.3 Medium2025-07-27
CVE-2025-52949 Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash — Junos OS 6.5 Medium2025-07-11
CVE-2025-53604 web-push crate 安全漏洞 — web-push 4.0 Medium2025-07-05
CVE-2025-23247 NVIDIA CUDA toolkit 安全漏洞 — NVIDIA CUDA Toolkit 4.4 Medium2025-05-27
CVE-2025-29784 NamelessMC Has Lack of Length Validation for s Parameter in GET Requests — Nameless 7.5 High2025-04-18
CVE-2025-29931 Siemens TeleControl Server Basic 安全漏洞 — TeleControl Server Basic 3.7 Low2025-04-17
CVE-2025-30659 Junos OS: SRX Series: A device configured for vector routing crashes when receiving malformed traffic — Junos OS 7.5 High2025-04-09
CVE-2025-32366 ConnMan 安全漏洞 — ConnMan 4.8 Medium2025-04-05
CVE-2024-53856 rPGP Panics on Malformed Untrusted Input — rpgp 7.5 High2024-12-05
CVE-2024-47293 Huawei HarmonyOS 安全漏洞 — HarmonyOS 4.7 Medium2024-09-27
CVE-2024-20416 Cisco RV340 和 Cisco RV345 安全漏洞 — Cisco Small Business RV Series Router Firmware 6.5 Medium2024-07-17
CVE-2024-38010 Secure Boot Security Feature Bypass Vulnerability — Windows 10 Version 1809 8.0 High2024-07-09
CVE-2024-38011 Secure Boot Security Feature Bypass Vulnerability — Windows 10 Version 1809 8.0 High2024-07-09

Vulnerabilities classified as CWE-130 (长度参数不一致性处理不恰当) represent 71 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.