1 vulnerabilities classified as CWE-182 (数据的崩溃导致不安全数值). AI Chinese analysis included.
CWE-182 represents a data handling weakness where input filtering mechanisms inadvertently reduce or collapse data into an unsafe value, violating expected security properties. This flaw typically arises when sanitization processes are overly aggressive or incorrectly implemented, stripping essential characters or normalizing data in ways that bypass validation checks. Attackers exploit this by crafting inputs that appear safe after filtering but retain malicious intent or trigger unintended behavior, such as injection attacks or privilege escalation. Developers can prevent this by ensuring filtering logic preserves data integrity while strictly enforcing security constraints. Implementing allow-list validation, using robust encoding libraries, and conducting thorough threat modeling help identify edge cases where data collapse might occur. Regular code reviews and automated security testing further ensure that filtering mechanisms do not introduce vulnerabilities by compromising the semantic meaning of the processed data.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-7921 | Administrative action may disable enforcement of per-user IP whitelisting — MongoDB Server | 4.6 | Medium | 2020-05-06 |
Vulnerabilities classified as CWE-182 (数据的崩溃导致不安全数值) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.