Description
The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.
Latest vulnerabilities for CWE-624
No vulnerabilities found using your search criteria
References
Description of CWE-624 on Mitre website