2 vulnerabilities classified as CWE-144 (行分隔符转义处理不恰当). AI Chinese analysis included.
CWE-144 represents an input validation weakness where software fails to properly sanitize line delimiter characters, such as carriage returns or newlines, within data received from upstream components. This vulnerability typically allows attackers to inject unexpected control sequences that downstream parsers interpret as structural boundaries rather than data content. Consequently, this manipulation can trigger logic errors, cause data corruption, or facilitate injection attacks like log forging or header injection by altering the expected flow of information processing. To mitigate this risk, developers must implement rigorous input validation strategies that explicitly filter or escape line-breaking characters before processing. Utilizing standardized libraries for parsing and enforcing strict schema definitions ensures that only expected data formats are accepted, thereby preventing malicious actors from exploiting delimiter ambiguities to compromise system integrity or confidentiality.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-24367 | Cacti allows Arbitrary File Creation leading to RCE — cacti | 8.8 | - | 2025-01-27 |
| CVE-2023-39212 | Zoom Rooms 代码问题漏洞 — Zoom Rooms for Windows | 7.9 | High | 2023-08-08 |
Vulnerabilities classified as CWE-144 (行分隔符转义处理不恰当) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.