Home / Vulnerability Database / 1C : Code injection
1C

1C : Code injection

Overview

The application uses external code, which may have originated from an untrusted source. Interpretation and execution of the data from an untrusted source at runtime allows an attacker to execute malicious code in the context of the application.

Client side code injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.

MEDIUM

DerScanner Severity Score

Do you want to fix 1C : Code injection in your application?

See also

1C

1C : Null encryption key

1C

1C : Memory leak

1C

1C : Empty encryption key