Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-707 (对消息或数据结构的处理不恰当) — Vulnerability Class 192

192 vulnerabilities classified as CWE-707 (对消息或数据结构的处理不恰当). AI Chinese analysis included.

CWE-707 represents a critical input validation weakness where software fails to properly sanitize structured data before processing or transmission. This flaw typically allows attackers to inject malicious payloads, such as SQL injection strings or cross-site scripting code, by exploiting the system’s inability to distinguish between legitimate data and executable commands. When malformed messages are misinterpreted, they can trigger unintended behaviors, leading to data breaches, system compromise, or denial of service. Developers mitigate this risk by implementing rigorous neutralization techniques, including strict input validation, output encoding, and parameterized queries. By ensuring that all structured messages are well-formed and adhere to expected security properties before being handled by downstream components, engineers can effectively prevent attackers from manipulating the application’s logic and maintain the integrity of the data flow.

MITRE CWE Description
The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. If a message is malformed, it may cause the message to be incorrectly interpreted. Neutralization is an abstract term for any technique that ensures that input (and output) conforms with expectations and is "safe." This can be done by: checking that the input/output is already "safe" (e.g. validation) transformation of the input/output to be "safe" using techniques such as filtering, encoding/decoding, escaping/unescaping, quoting/unquoting, or canonicalization preventing the input/output from being directly provided by an attacker (e.g. "indirect selection" that maps externally-provided values to internally-controlled values) preventing the input/output from being processed at all This weakness typically applies in cases where the product prepares a control message that another process must act on, such as a command or query, and malicious input that was intended as data, can enter the control plane instead. However, this weakness also applies to more general cases where there are not always control implications.
Common Consequences (1)
OtherOther
CVE IDTitleCVSSSeverityPublished
CVE-2022-3473 SourceCodester Human Resource Management System getstatecity.php sql injection — Human Resource Management System 6.3 Medium2022-10-12
CVE-2022-3452 SourceCodester Book Store Management System category.php cross site scripting — Book Store Management System 3.5 Low2022-10-11
CVE-2022-3453 SourceCodester Book Store Management System transcation.php cross site scripting — Book Store Management System 3.5 Low2022-10-11
CVE-2022-3442 Crealogix EBICS ebics.aspx cross site scripting — EBICS 3.5 Low2022-10-10
CVE-2022-3434 SourceCodester Web-Based Student Clearance System add-student.php prepare cross site scripting — Web-Based Student Clearance System 3.5 Low2022-10-08
CVE-2022-3414 SourceCodester Web-Based Student Clearance System POST Parameter login.php sql injection — Web-Based Student Clearance System 5.0 Medium2022-10-07
CVE-2022-3333 Zephyr Project Manager REST Call cross site scripting — Project Manager 3.5 Low2022-09-28
CVE-2022-3332 SourceCodester Food Ordering Management System POST Parameter router.php sql injection — Food Ordering Management System 6.3 Medium2022-09-28
CVE-2022-23004 Algorithm incorrectly returning error and Invalid unreduced value written to output buffer — Sweet B Library 5.3 Medium2022-07-29
CVE-2020-11080 Denial of service in nghttp2 — nghttp2 3.7 Low2020-06-03
CVE-2020-11026 Specially crafted filenames in WordPress leading to XSS — WordPress 8.7 High2020-04-30
CVE-2020-11030 Cross-site scripting (XSS) in Search block in WordPress — WordPress 6.4 Medium2020-04-30

Vulnerabilities classified as CWE-707 (对消息或数据结构的处理不恰当) represent 192 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.