Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-253 (对函数返回值的检查不正确) — Vulnerability Class 13

13 vulnerabilities classified as CWE-253 (对函数返回值的检查不正确). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2026-35340 uutils coreutils chown and chgrp False Success Exit Code in Recursive Mode — coreutils 5.5 Medium2026-04-22
CVE-2026-35339 uutils coreutils chmod False Success Exit Code in Recursive Mode — coreutils 5.5 Medium2026-04-22
CVE-2026-35091 Corosync: corosync: denial of service and information disclosure via crafted udp packet — Red Hat Enterprise Linux 10 8.2 High2026-04-01
CVE-2026-0648 Eclipse ThreadX USBX 安全漏洞 — Eclipse ThreadX 7.8 High2026-01-27
CVE-2025-57767 Asterisk can crash from a specifically malformed Authorization header in an incoming SIP request — asterisk 7.5 High2025-08-28
CVE-2025-54090 Apache HTTP Server: 'RewriteCond expr' always evaluates to true in 2.4.64 — Apache HTTP Server 7.5 -2025-07-23
CVE-2024-43521 Windows Hyper-V Denial of Service Vulnerability — Windows Server 2019 7.5 High2024-10-08
CVE-2024-32475 Envoy RELEASE_ASSERT using auto_sni with :authority header > 255 bytes — envoy 7.5 High2024-04-18
CVE-2024-1622 Routinator terminates when RTR connection is reset too quickly after opening — Routinator 7.5 High2024-02-26
CVE-2023-24487 Arbitrary file read — Citrix ADC and Citrix Gateway  6.3 Medium2023-07-10
CVE-2022-24880 Potential Captcha Validate Bypass in flask-session-captcha — flask-session-captcha 5.3 Medium2022-04-25
CVE-2020-6107 F2fs.Fsck 代码问题漏洞 — F2fs-Tools 5.5 -2020-10-15
CVE-2017-7474 Red Hat Keycloak Node.js adapter 安全漏洞 — Keycloak Node.js adapter 9.8 -2017-05-12

Vulnerabilities classified as CWE-253 (对函数返回值的检查不正确) represent 13 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.