Skip to content

Conversation

sameer6pre
Copy link
Owner

Vulnerability Details

  • File Path: Lab_19/main.cpp
  • Vulnerability Type: Command Injection
  • Risk Level: High

Explanation:
The use of the system function with hardcoded commands like cls and pause can be exploited if the input to system is manipulated or if the environment is compromised. This can lead to command injection vulnerabilities, especially if the commands are dynamically constructed or influenced by user input.

Please review and address the issue accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant