CWE-624 - Executable Regular Expression Error

Description

The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.

Latest vulnerabilities for CWE-624

No vulnerabilities found using your search criteria

References

Description of CWE-624 on Mitre website