目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-166 缺失特殊元素净化处理不恰当 类漏洞列表 2

CWE-166 缺失特殊元素净化处理不恰当 类弱点 2 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-166属于输入验证缺陷,指程序接收上游输入时,未正确处理或完全忽略预期特殊元素的缺失。攻击者常通过构造缺失关键标识或标记的数据包,诱导系统进入未定义状态,从而引发逻辑错误、服务中断或越权访问。开发者应避免假设输入完整性,实施严格的输入校验机制,对缺失元素设置默认安全值或明确拒绝处理,确保程序在异常输入下仍能稳定运行。

MITRE CWE 官方描述
CWE:CWE-166 缺少特殊元素时的处理不当 英文:产品从上游组件接收输入,但在预期的特殊元素缺失时,未进行处理或处理不当。
常见影响 (1)
AvailabilityDoS: Crash, Exit, or Restart
缓解措施 (3)
Developers should anticipate that special elements will be removed in the input vectors of their product. Use an appropriate combination of denylists and allowlists to ensure only valid, expected and appropriate input is processed by the system.
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
CVE ID标题CVSS风险等级Published
CVE-2026-21218 Microsoft .NET 安全漏洞 — .NET 10.0 7.5 High2026-02-10
CVE-2024-38091 Microsoft WS-Discovery 安全漏洞 — Windows 10 Version 1809 7.5 High2024-07-09

CWE-166(缺失特殊元素净化处理不恰当) 是常见的弱点类别,本平台收录该类弱点关联的 2 条 CVE 漏洞。