CWE-646: SFP Secondary Cluster - Tainted Input to Command
This entry belongs to the SFP Secondary Cluster, focusing on Tainted Input to Command, highlighting risks associated with insufficient verification of data authenticity.
Is your System Free of Underlying Vulnerabilities? Find Out Now