![]() ![]() This is not a perfect solution, since 100% accuracy and coverage are not feasible. Many modern techniques use data flow analysis to minimize the number of false positives. Use automated static analysis tools that target this type of weakness. Refactor your program so that you do not have to dynamically generate code. ![]() The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. Xunlei Thunder before 7.2.6 allows remote attackers to execute arbitrary code via a crafted file, related to a "DLL injection vulnerability."ĬWE-94 : Improper Control of Generation of Code ('Code Injection') ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |