2 vulnerabilities classified as CWE-628 (使用不正确指定参数的函数调用). AI Chinese analysis included.
CWE-628 represents a critical programming error where a function is invoked with improperly specified arguments, resulting in unpredictable and often maliciously exploitable behavior. This weakness typically manifests through mismatched argument counts, incorrect data types, swapped parameter orders, or passing invalid references, which can lead to memory corruption, logic bypasses, or application crashes. Attackers frequently exploit these flaws by crafting inputs that trigger type confusion or buffer overflows, allowing them to execute arbitrary code or escalate privileges. To mitigate this risk, developers must enforce strict type checking and utilize static analysis tools to detect signature mismatches during compilation. Additionally, adopting strongly typed languages and comprehensive unit testing ensures that function calls align precisely with expected interfaces, thereby preventing the introduction of incorrect arguments and maintaining system integrity against potential exploitation vectors.
function authenticate($username, $password) { // authenticate user ... } authenticate($_POST['password'], $_POST['username']);sub ReportAuth { my ($username, $result, $fatal) = @_; PrintLog("auth: username=%s, result=%d", $username, $result); if (($result ne "success") && $fatal) { die "Failed!\n"; } } sub PrivilegedFunc { my $result = CheckAuth($username); ReportAuth($username, $result, 0); DoReallyImportantStuff(); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-14844 | MIT krb5 安全漏洞 — krb5 | 7.5 | - | 2019-09-26 |
| CVE-2019-7303 | Snapd seccomp filter TIOCSTI ioctl bypass — snapd | 5.3 | - | 2019-04-23 |
Vulnerabilities classified as CWE-628 (使用不正确指定参数的函数调用) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.