| Code Inclusion |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Serialized Data External Linking |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| DTD Injection |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Local Code Inclusion |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| PHP Local File Inclusion |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Remote Code Inclusion |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Force Use of Corrupted Files |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Open-Source Library Manipulation |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Local Execution of Code |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Inclusion of Code in Existing Process |
|
CWE-114
|
Process Control
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Root/Jailbreak Detection Evasion via Hooking |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Repo Jacking |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Install Malicious Extension |
|
CWE-507
|
Trojan Horse
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|