CWE-627 - Dynamic Variable Evaluation

Description

In a language where the user can influence the name of a variable at runtime, if the variable names are not controlled, an attacker can read or write to arbitrary variables, or access arbitrary functions.

Latest vulnerabilities for CWE-627

References

Description of CWE-627 on Mitre website