2 vulnerabilities classified as CWE-622 (函数挂钩参数的验证不恰当). AI Chinese analysis included.
CWE-622 represents a critical input validation weakness where software integrates hooks into user-accessible API functions without adequately verifying the arguments passed to them. This flaw is typically exploited by attackers who manipulate these function calls to bypass security controls or directly compromise the hooking application itself. In privileged defensive software, such as antivirus programs or firewalls that intercept kernel calls, unvalidated arguments can allow malicious actors to evade detection mechanisms or trigger internal vulnerabilities. Developers mitigate this risk by implementing rigorous argument checking routines within the hook logic. By ensuring that all inputs meet expected formats, ranges, and types before processing, developers prevent attackers from injecting malicious payloads. This strict validation safeguards the integrity of the hooking mechanism, ensuring that the defensive software remains resilient against manipulation and maintains its intended protective posture against external threats.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-0312 | Skyhigh Client Proxy 安全漏洞 — Skyhigh Client Proxy | 5.5 | Medium | 2024-03-14 |
| CVE-2024-0311 | Skyhigh Client Proxy 安全漏洞 — Skyhigh Client Proxy | 5.5 | Medium | 2024-03-14 |
Vulnerabilities classified as CWE-622 (函数挂钩参数的验证不恰当) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.