Cloud Defense Logo

Products

Solutions

Company

CWE-152: Tainted Input to Command

Learn about CWE-152 with recommendations for developers during the implementation phase to avoid susceptibility to injection, removal, or manipulation of macro symbols.

Is your System Free of Underlying Vulnerabilities?
Find Out Now