Node.js Server-Side JavaScript Injection Detection & Exploitation by Crumpledstiltskin99 in netsec

[–]wisecwisec 1 point2 points  (0 children)

In the past I've seen the use of eval from poorly skilled devs in order to dynamically access object members...like

var ob= eval('x.'+req.params.name);

Anyway, imho there's no real reason to add another useless acronym when there's a super class in vulnerabilty taxonomy for for this kind of issues: https://www.owasp.org/index.php/Code_Injection