VYPR

CWE-233

Improper Handling of Parameters

BaseIncomplete

Description

The product does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined.

Hierarchy (View 1000)

Related attack patterns (CAPEC)

CAPEC-39

CVEs mapped to this weakness (5)

CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2023-20514Hig0.570.00Feb 11, 2026Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code execution
CVE-2018-25233Med0.406.20.00Mar 30, 2026WebDrive 18.00.5057 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the username field during Secure WebDAV connection setup. Attackers can input a buffer-overflow payload of 5000 bytes in the username parameter and trigger a connection test to cause the application to crash.
CVE-2026-22626Med0.324.90.00Jan 30, 2026Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can cause abnormal device behavior by crafting specific messages.
CVE-2023-1419Med0.315.90.00Nov 17, 2024A script injection vulnerability was found in the Debezium database connector, where it does not properly sanitize some parameters. This flaw allows an attacker to send a malicious request to inject a parameter that may allow the viewing of unauthorized data.
CVE-2026-33585Low0.253.80.00May 13, 2026Improper management of the idle timeout parameter in the Keycloak interface of the Arqit SKA-Platform enables an attacker to impersonate an authenticated tenant user via an unexpired browser session. This issue affects Symmetric Key Agreement Platform: before 26.03.