angler-fishThe Vulnerability History Project

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

"The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere." - Entry from the Common Weakness Enumeration For more info visit <a href="https://cwe.mitre.org/data/definitions/829.html" target="_blank" rel="noopener noreferrer">CWE-829</a>

Examples


    There are no articles here... yet

expand_less