1 vulnerabilities classified as CWE-768 (不正确的快捷方式验证). AI Chinese analysis included.
CWE-768 represents a logical flaw where short-circuit evaluation prevents necessary side effects in conditional statements. This weakness occurs when a program relies on non-leading expressions to modify state, but the primary condition evaluates to false, causing the interpreter to skip the remaining checks. Attackers typically exploit this by manipulating input to trigger the short-circuit path, thereby bypassing critical security checks or validation logic. This allows unauthorized access or data corruption without triggering expected error handling mechanisms. To prevent this, developers must ensure that critical operations are not dependent on the order of evaluation within short-circuit operators. Instead, they should separate logical checks from state-modifying actions, using explicit sequential statements or ensuring that all necessary validations are performed regardless of the initial condition’s outcome, thus guaranteeing consistent program behavior.
#define PRIV_ADMIN 0 #define PRIV_REGULAR 1 typedef struct{ int privileges; int id; } user_t; user_t *Add_Regular_Users(int num_users){ user_t* users = (user_t*)calloc(num_users, sizeof(user_t)); int i = num_users; while( --i && (users[i].privileges = PRIV_REGULAR) ){ users[i].id = i; } return users; } int main(){ user_t* test; int i; test = Add_Regular_Users(25); for(i = 0; i < 25; i++) printf("user %d has privilege level %d\n", test[i].id, test[i].privileges); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-35378 | uutils coreutils expr Local Denial of Service via Eager Evaluation of Parenthesized Subexpressions — coreutils | 3.3 | Low | 2026-04-22 |
Vulnerabilities classified as CWE-768 (不正确的快捷方式验证) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.