23 vulnerabilities classified as CWE-391 (未经检查的错误条件). AI Chinese analysis included.
CWE-391 represents a critical software weakness where developers fail to properly handle or verify error conditions, such as ignored exceptions or unchecked return values. This oversight allows attackers to induce unexpected application behavior without detection, potentially leading to denial of service, data corruption, or further exploitation. By neglecting to validate the outcome of critical operations, systems remain vulnerable to state manipulation or resource exhaustion. To mitigate this risk, developers must implement robust error handling strategies that explicitly check for failures and respond appropriately. This includes validating function return codes, catching specific exceptions, and ensuring that security-sensitive operations are verified before proceeding. Adhering to these practices ensures that errors are logged, reported, or handled securely, preventing attackers from exploiting silent failures to compromise system integrity or availability.
try { doExchange(); } catch (RareException e) { // this can never happen }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-52316 | Apache Tomcat: Authentication bypass when using Jakarta Authentication API — Apache Tomcat | 9.1 | - | 2024-11-18 |
| CVE-2022-20849 | Cisco IOS XR Software Broadband Network Gateway PPPoE Denial of Service Vulnerability — Cisco IOS XR Software | 6.1 | Medium | 2024-11-15 |
| CVE-2024-23326 | Envoy incorrectly accepts HTTP 200 response for entering upgrade mode — envoy | 5.9 | Medium | 2024-06-04 |
| CVE-2023-32871 | MediaTek 芯片 安全漏洞 — MT2737, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798 | 7.8AI | HighAI | 2024-05-06 |
| CVE-2023-0572 | Unchecked Error Condition in froxlor/froxlor — froxlor/froxlor | 5.3 | Medium | 2023-01-29 |
| CVE-2022-22160 | Junos OS: MX Series: The bbe-smgd process crashes if an unsupported configuration exists and a PPPoE client sends a specific message — Junos OS | 6.5 | Medium | 2022-01-19 |
| CVE-2020-14383 | Samba 安全漏洞 — samba | 6.5 | - | 2020-12-02 |
| CVE-2019-14853 | python-ecdsa 安全漏洞 — python-ecdsa | 7.5 | - | 2019-11-26 |
| CVE-2016-10526 | gh-pages 安全漏洞 — grunt-gh-pages node module | 8.6 | - | 2018-05-31 |
| CVE-2018-1091 | Linux kernel 缓冲区错误漏洞 — Linux kernel v4.13 and newer | 5.5 | - | 2018-03-27 |
| CVE-2017-12186 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12187 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12185 | xorg-x11-server 安全漏洞 — n/a | 9.8 | - | 2018-01-24 |
| CVE-2017-12184 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12183 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12182 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12181 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12180 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12179 | xorg-x11-server 数字错误漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12178 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12177 | xorg-x11-server 数字错误漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-12176 | xorg-x11-server 安全漏洞 — xorg-x11-server | 9.8 | - | 2018-01-24 |
| CVE-2017-7496 | fedora-arm-installer 权限许可和访问控制漏洞 — fedora-arm-installer | 7.0 | - | 2017-06-26 |
Vulnerabilities classified as CWE-391 (未经检查的错误条件) represent 23 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.