angler-fishThe Vulnerability History Project

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

"The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere." - Entry from the Common Weakness Enumeration

For more info visit CWE-829

Examples


    There are no articles here... yet

expand_less