CWE-81: SFP Secondary Cluster - Tainted Input to Command
This CWE entry discusses the vulnerability related to tainted input to command and the importance of avoiding user-controlled input in error pages during implementation.
Is your System Free of Underlying Vulnerabilities? Find Out Now