Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-691 (不充分的控制流管理) — Vulnerability Class 11

11 vulnerabilities classified as CWE-691 (不充分的控制流管理). AI Chinese analysis included.

CWE-691 represents a critical architectural weakness where software fails to properly manage its execution path, allowing control flow to be altered unexpectedly. This vulnerability typically arises when applications lack robust state management or error handling mechanisms, enabling attackers to manipulate internal logic by injecting malicious inputs or exploiting race conditions. By bypassing intended security checks or triggering unintended code paths, adversaries can achieve unauthorized access, data corruption, or denial of service. To mitigate this risk, developers must implement strict state validation and enforce deterministic execution models. Utilizing formal verification techniques, comprehensive input sanitization, and rigorous exception handling ensures that the application’s control flow remains predictable and secure. Additionally, adopting defensive programming practices and conducting thorough code reviews helps identify and rectify logic flaws before deployment, thereby preventing attackers from exploiting these structural inconsistencies.

MITRE CWE Description
The code does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways.
Common Consequences (1)
OtherAlter Execution Logic
Examples (2)
The following function attempts to acquire a lock in order to perform operations on a shared resource.
void f(pthread_mutex_t *mutex) { pthread_mutex_lock(mutex); /* access shared resource */ pthread_mutex_unlock(mutex); }
Bad · C
int f(pthread_mutex_t *mutex) { int result; result = pthread_mutex_lock(mutex); if (0 != result) return result; /* access shared resource */ return pthread_mutex_unlock(mutex); }
Good · C
In this example, the programmer has indented the statements to call Do_X() and Do_Y(), as if the intention is that these functions are only called when the condition is true. However, because there are no braces to signify the block, Do_Y() will always be executed, even if the condition is false.
if (condition==true) Do_X(); Do_Y();
Bad · C

Vulnerabilities classified as CWE-691 (不充分的控制流管理) represent 11 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.