Home / Vulnerability Database / 1C : Resource injection
1C

1C : Resource injection

Classification

Overview

Running an external report or processing from an untrusted source allows an attacker to execute a file of an external module in a software way, bypassing the regular access control system.

LOW

DerScanner Severity Score

Do you want to fix 1C : Resource injection in your application?

See also

1C

1C : Null encryption key

1C

1C : Memory leak

1C

1C : Empty encryption key